Skip to content

Commit 7a9b0a7

Browse files
authored
Merge pull request #107781 from kummanish/master
Deleting the TLS choice changes in the public docs
2 parents fda6e3a + e5be99f commit 7a9b0a7

16 files changed

+15
-217
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49383,6 +49383,21 @@
4938349383
"source_path": "articles/media-services/latest/create-account-cli-how-to.md",
4938449384
"redirect_url": "/azure/media-services/latest/create-account-howto",
4938549385
"redirect_document_id": false
49386+
},
49387+
{
49388+
"source_path": "articles/mariadb/howto-tls-configurations.md",
49389+
"redirect_url": "/azure/mariadb/howto-configure-ssl",
49390+
"redirect_document_id": false
49391+
},
49392+
{
49393+
"source_path": "articles/mysql/howto-tls-configurations.md",
49394+
"redirect_url": "/azure/mysql/howto-configure-ssl",
49395+
"redirect_document_id": false
49396+
},
49397+
{
49398+
"source_path": "articles/postgresql/howto-tls-configurations.md",
49399+
"redirect_url": "/azure/postgresql/concepts-ssl-connection-security",
49400+
"redirect_document_id": false
4938649401
}
4938749402
]
4938849403
}

articles/mariadb/TOC.yml

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -142,10 +142,6 @@
142142
items:
143143
- name: Azure portal
144144
href: howto-deny-public-network-access.md
145-
- name: Minimum TLS configuration
146-
items:
147-
- name: Azure portal
148-
href: howto-tls-configurations.md
149145
- name: Access server logs
150146
items:
151147
- name: Slow query logs

articles/mariadb/concepts-ssl-connection-security.md

Lines changed: 0 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -20,32 +20,6 @@ Connection strings for various programming languages are shown in the Azure port
2020

2121
To learn how to enable or disable SSL connection when developing application, refer to [How to configure SSL](howto-configure-ssl.md).
2222

23-
## TLS connectivity in Azure Database for MariaDB
24-
25-
Azure Database for MariaDB supports encryption for clients connecting to your database server using Transport Layer Security (TLS). TLS is an industry standard protocol that ensures secure network connections between your database server and client applications, allowing you to adhere to compliance requirements.
26-
27-
### TLS settings
28-
29-
Azure Database for MariaDB provides the ability to enforce the TLS version for the client connections. To use the TLS option, use the **Minimum TLS version** option setting. The following values are allowed for this option setting:
30-
31-
| Minimum TLS Setting | TLS Version supported |
32-
|:---------------------------------|-------------------------------------:|
33-
| TLSEnforcementDisabled (default) | No TLS required |
34-
| TLS1_0 | TLS 1.0, TLS 1.1, TLS 1.2 and higher |
35-
| TLS1_1 | TLS 1.1, TLS 1.2 and higher |
36-
| TLS1_2 | TLS version 1.2 and higher |
37-
38-
39-
For example, setting this Minimum TLS setting version to TLS 1.0 means your server will allow connections from clients using TLS 1.0, 1.1, and 1.2+. Alternatively, setting this to 1.2 means that you only allow connections from clients using TLS 1.2 and all connections with TLS 1.0 and TLS 1.1 will be rejected.
40-
41-
> [!Note]
42-
> Azure Database for MariaDB defaults to TLS being disabled for all new servers.
43-
>
44-
> Currently the TLS versions supported byAzure Database for MariaDB are TLS 1.0, 1.1, and 1.2.
45-
46-
To learn how to set the TLS setting for your Azure Database for MariaDB, refer to [How to configure TLS setting](howto-tls-configurations.md).
47-
4823
## Next steps
4924
- Learn more about [server firewall rules](concepts-firewall-rules.md)
5025
- Learn how to [configure SSL](howto-configure-ssl.md).
51-
- Learn how to [configure TLS](howto-tls-configurations.md).

articles/mariadb/howto-tls-configurations.md

Lines changed: 0 additions & 43 deletions
This file was deleted.
Binary file not shown.
Binary file not shown.

articles/mysql/TOC.yml

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -250,10 +250,6 @@
250250
items:
251251
- name: Azure portal
252252
href: howto-deny-public-network-access.md
253-
- name: Minimum TLS configuration
254-
items:
255-
- name: Azure portal
256-
href: howto-tls-configurations.md
257253
- name: Restart server
258254
items:
259255
- name: Azure portal

articles/mysql/concepts-ssl-connection-security.md

Lines changed: 0 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -22,31 +22,6 @@ Connection strings for various programming languages are shown in the Azure port
2222

2323
To learn how to enable or disable SSL connection when developing application, refer to [How to configure SSL](howto-configure-ssl.md).
2424

25-
## TLS connectivity in Azure Database for MySQL
26-
27-
Azure Database for MySQL supports encryption for clients connecting to your database server using Transport Layer Security (TLS). TLS is an industry standard protocol that ensures secure network connections between your database server and client applications, allowing you to adhere to compliance requirements.
28-
29-
### TLS settings
30-
31-
Customers now have the ability to enforce the TLS version for the client connecting to their Azure Database for MySQL. To use the TLS option, use the **Minimum TLS Version** option setting. The following values are allowed for this option setting:
32-
33-
| Minimum TLS Setting | TLS Version supported |
34-
|:---------------------------------|-------------------------------------:|
35-
| TLSEnforcementDisabled (default) | No TLS required |
36-
| TLS1_0 | TLS 1.0, TLS 1.1, TLS 1.2 and higher |
37-
| TLS1_1 | TLS 1.1, TLS 1.2 and higher |
38-
| TLS1_2 | TLS version 1.2 and higher |
39-
40-
41-
For example, setting this minimum TLS setting version to TLS 1.0 means your server will allow connections from clients using TLS 1.0, 1.1, and 1.2+. Alternatively, setting this to 1.2 means that you only allow connections from clients using TLS 1.2 and all connections with TLS 1.0 and TLS 1.1 will be rejected.
42-
43-
> [!Note]
44-
> Azure Database for MySQL defaults to TLS being disabled for all new servers.
45-
>
46-
> Currently the TLS versions supported by Azure Database for MySQL are TLS 1.0, 1.1, and 1.2.
47-
48-
To learn how to set the TLS setting for your Azure Database for MySQL, refer to [How to configure TLS setting](howto-tls-configurations.md).
49-
5025
## Next steps
5126

5227
[Connection libraries for Azure Database for MySQL](concepts-connection-libraries.md)

articles/mysql/howto-tls-configurations.md

Lines changed: 0 additions & 43 deletions
This file was deleted.
Binary file not shown.

0 commit comments

Comments
 (0)