Skip to content

Commit 5d5389e

Browse files
authored
Merge pull request #211741 from v-amallick/Sept-19-2022-TLS
TLS updates
2 parents 84a9fd5 + f235193 commit 5d5389e

File tree

1 file changed

+23
-2
lines changed

1 file changed

+23
-2
lines changed

articles/backup/transport-layer-security.md

Lines changed: 23 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Transport Layer Security in Azure Backup
33
description: Learn how to enable Azure Backup to use the encryption protocol Transport Layer Security (TLS) to keep data secure when being transferred over a network.
44
ms.topic: conceptual
5-
ms.date: 11/01/2020
5+
ms.date: 09/20/2022
66
---
77

88
# Transport Layer Security in Azure Backup
@@ -52,6 +52,27 @@ The following registry keys configure .NET Framework to support strong cryptogra
5252
"SchUseStrongCrypto" = dword:00000001
5353
```
5454

55+
## Azure TLS certificate changes
56+
57+
Azure TLS/SSL endpoints now contain updated certificates chaining up to new root CAs. Ensure that the following changes include the updated root CAs. [Learn more](../security/fundamentals/tls-certificate-changes.md#what-changed) about the possible impacts on your applications.
58+
59+
Earlier, most of the TLS certificates, used by Azure services, chained up to the following Root CA:
60+
61+
Common name of CA | Thumbprint (SHA1)
62+
--- | ---
63+
[Baltimore CyberTrust Root](https://cacerts.digicert.com/BaltimoreCyberTrustRoot.crt) | d4de20d05e66fc53fe1a50882c78db2852cae474
64+
65+
Now, TLS certificates, used by Azure services, helps to chain up to one of the following Root CAs:
66+
67+
Common name of CA | Thumbprint (SHA1)
68+
--- | ---
69+
[DigiCert Global Root G2](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt) | df3c24f9bfd666761b268073fe06d1cc8d4f82a4
70+
[DgiCert Global Root CA](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt) | a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c5436
71+
[Baltimore CyberTrust Root](https://cacerts.digicert.com/BaltimoreCyberTrustRoot.crt)| d4de20d05e66fc53fe1a50882c78db2852cae474
72+
[D-TRUST Root Class 3 CA 2 2009](https://www.d-trust.net/cgi-bin/D-TRUST_Root_Class_3_CA_2_2009.crt) | 58e8abb0361533fb80f79b1b6d29d3ff8d5f00f0
73+
[Microsoft RSA Root Certificate Authority 2017](https://www.microsoft.com/pkiops/certs/Microsoft%20RSA%20Root%20Certificate%20Authority%202017.crt) | 73a5e64a3bff8316ff0edccc618a906e4eae4d74
74+
[Microsoft ECC Root Certificate Authority 2017](https://www.microsoft.com/pkiops/certs/Microsoft%20ECC%20Root%20Certificate%20Authority%202017.crt) | 999a64c37ff47d9fab95f14769891460eec4c3c5
75+
5576
## Frequently asked questions
5677

5778
### Why enable TLS 1.2?
@@ -67,7 +88,7 @@ The highest protocol version supported by both the client and server is negotiat
6788
For improved security from protocol downgrade attacks, Azure Backup is beginning to disable TLS versions older than 1.2 in a phased manner. This is part of a long-term shift across services to disallow legacy protocol and cipher suite connections. Azure Backup services and components fully support TLS 1.2. However, Windows versions lacking required updates or certain customized configurations can still prevent TLS 1.2 protocols being offered. This can cause failures including but not limited to one or more of the following:
6889

6990
- Backup and restore operations may fail.
70-
- Backup components connections failures with error 10054 (An existing connection was forcibly closed by the remote host).
91+
- The backup components connections failures with error 10054 (An existing connection was forcibly closed by the remote host).
7192
- Services related to Azure Backup won't stop or start as usual.
7293

7394
## Additional resources

0 commit comments

Comments
 (0)