Skip to content

Commit 7aa2bc7

Browse files
committed
format
2 parents 86a29f8 + a44981e commit 7aa2bc7

File tree

51 files changed

+753
-336
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+753
-336
lines changed
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
---
2+
title: TLS 1.0 and 1.1 retirement on Azure Application Gateway
3+
description: Guidance for managing your Application Gateway with the upcoming retirement of TLS 1.0 and 1.1.
4+
services: application gateway
5+
author: jaesoni
6+
ms.service: azure-application-gateway
7+
ms.topic: concept-article
8+
ms.date: 03/04/2025
9+
ms.author: greglin
10+
---
11+
12+
# Managing your Application Gateway with TLS 1.0 and 1.1 retirement
13+
14+
Starting **31st August 2025**, Azure Application Gateway will no longer support **TLS (Transport Layer Security) versions 1.0 and 1.1**. This change aligns with the [Azure-wide retirement](https://azure.microsoft.com/updates?id=update-retirement-tls1-0-tls1-1-versions-azure-services) of these TLS versions to enhance the security. As the owner of an Application Gateway resource, you should review both the Frontend clients and Backend servers TLS connections that may be using these older versions.
15+
16+
## Frontend TLS connections
17+
18+
With deprecation of TLS versions 1.0 and 1.1, the **older Predefined TLS policies** and certain cipher suites from the **Custom TLS policy** will be removed.
19+
20+
### Predefined policies for V2 SKUs
21+
22+
The predefined policies 20150501 and 20170401 that support TLS v1.0 and 1.1 will be discontinued and can no longer be associated with an Application Gateway resource after August 2025. It's advised to transition to one of the recommended TLS policies, 20220101 or 20220101S. Alternatively, the 20170401S policy may be used if specific cipher suites are required.
23+
24+
![A diagram showing predefined policies for V2 SKUs.](media/application-gateway-tls-version-retirement/v2-retiring-tls-policies.png)
25+
26+
### Custom policies for V2 SKUs
27+
28+
Azure Application Gateway V2 SKU offers two types of custom policies: Custom and CustomV2. The retirement of these TLS versions affects only the "Custom" policy. The newer "CustomV2" policy comes with TLS v1.3. Beyond August 2025, the older Custom policy will support only TLS v1.2 and the following cipher suites won't be supported.
29+
30+
| Unsupported cipher suites |
31+
| ---------- |
32+
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
33+
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
34+
| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 |
35+
| TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 |
36+
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA |
37+
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA |
38+
| TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 |
39+
| TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 |
40+
| TLS_DHE_DSS_WITH_AES_256_CBC_SHA |
41+
| TLS_DHE_DSS_WITH_AES_128_CBC_SHA |
42+
| TLS_RSA_WITH_3DES_EDE_CBC_SHA |
43+
| TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA |
44+
45+
### Predefined policies for V1 SKUs
46+
47+
The V1 SKU will only support the 20170401S policy after the older policies with TLS versions 1.0 and 1.1 are discontinued. The newer 20220101 or 20220101S policies won't be available for the soon-to-be-retired V1 SKU.
48+
49+
![A diagram showing predefined policies for V1 SKUs.](media/application-gateway-tls-version-retirement/v1-retiring-tls-policies.png)
50+
51+
### Custom policies for V1 SKUs
52+
53+
Application Gateway V1 SKU only supports the older "Custom" policy. Beyond August 2025, this older Custom policy will support only TLS v1.2 and the following cipher suites won't be supported.
54+
55+
| Unsupported cipher suites |
56+
| ---------- |
57+
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
58+
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
59+
| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 |
60+
| TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 |
61+
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA |
62+
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA |
63+
| TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 |
64+
| TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 |
65+
| TLS_DHE_DSS_WITH_AES_256_CBC_SHA |
66+
| TLS_DHE_DSS_WITH_AES_128_CBC_SHA |
67+
| TLS_RSA_WITH_3DES_EDE_CBC_SHA |
68+
| TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA |
69+
70+
## Backend TLS connections
71+
72+
You don't need to configure anything on your Application Gateway for the backend connection's TLS version as the selection of TLS policy has no control over the backend TLS connections. After retirement, the connections to backend servers will always be with preferred TLS v1.3 and up to TLS v1.2. You must ensure that your servers in the backend pools are compatible with these updated protocol versions. This compatibility avoids any disruptions when establishing a TLS/HTTPS connection with those backend servers.
73+
74+
## Next steps
75+
76+
Learn about [TLS policy types and configurations](application-gateway-ssl-policy-overview.md)
77+
Visit Azure Updates for [retirement notice](https://azure.microsoft.com/updates?searchterms=application+gateway)
57.3 KB
Loading
38.4 KB
Loading

articles/application-gateway/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,6 +95,8 @@
9595
href: ssl-certificate-management.md
9696
- name: Security baseline
9797
href: /security/benchmark/azure/baselines/application-gateway-security-baseline?toc=/azure/application-gateway/toc.json
98+
- name: TLS 1.0 and 1.1 retirement
99+
href: application-gateway-tls-version-retirement.md
98100
- name: Network security blog
99101
href: https://techcommunity.microsoft.com/category/azure-network-security/blog/azurenetworksecurityblog
100102
- name: Deploy

articles/azure-cache-for-redis/monitor-cache-reference.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,6 @@ description: This article contains important reference material you need when yo
44
ms.date: 05/13/2024
55
ms.custom: horz-monitor, ignite-2024
66
ms.topic: reference
7-
author: rboucher
8-
ms.author: robb
97
---
108

119
# Azure Cache for Redis monitoring data reference

articles/azure-cache-for-redis/monitor-cache.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,6 @@ description: Start here to learn how to monitor Azure Cache for Redis.
44
ms.date: 03/21/2024
55
ms.custom: horz-monitor
66
ms.topic: conceptual
7-
author: robb
8-
ms.author: robb
9-
107
---
118

129
# Monitor Azure Cache for Redis

articles/energy-data-services/how-to-generate-auth-token.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ In this article, you learn how to generate the service principal auth token, a u
1717
## Register your app with Microsoft Entra ID
1818

1919
1. To provision the Azure Data Manager for Energy platform, you must register your app on the [Azure portal app registration page](https://go.microsoft.com/fwlink/?linkid=2083908). You can use either a Microsoft account or a work or school account to register an app. For steps on how to configure, see [Register your app documentation](../active-directory/develop/quickstart-register-app.md#register-an-application).
20-
1. In the app overview section, if there are no redirect URIs specified, you can select **Add a platform** > **Web**, add `http://localhost:8080`, and select **Save**.
20+
1. In the application overview section, if no redirect Uniform Resource Identifiers (URIs) are specified, select **Add a platform** > **Web**, add `http://localhost:8080`, and then select **Save**.
2121

2222
:::image type="content" source="media/how-to-generate-auth-token/app-registration-uri.png" alt-text="Screenshot that shows adding the URI to the app.":::
2323

@@ -38,7 +38,7 @@ You can also find the parameters after the app is registered on the Azure portal
3838

3939
### Find client-id
4040

41-
A `client-id` is the same value that you use to register your application during the provisioning of your [Azure Data Manager for Energy instance](quickstart-create-microsoft-energy-data-services-instance.md). It's often referred to as `app-id`.
41+
A `client-id` is the value used to register your application during the provisioning of your [Azure Data Manager for Energy instance](quickstart-create-microsoft-energy-data-services-instance.md). It is often referred to as `app-id`.
4242

4343
1. Go to the Azure Data Manager for Energy **Overview** page. On the **Essentials** pane, find **client ID**.
4444
1. Copy the `client-id` value and paste it into an editor to be used later.
@@ -51,7 +51,7 @@ A `client-id` is the same value that you use to register your application during
5151

5252
### Find client-secret
5353

54-
A `client-secret` is a string value your app can use in place of a certificate to identify itself. It's sometimes referred to as an application password.
54+
A `client-secret` is a string value your app can use in place of a certificate to identify itself. It is sometimes called an application password.
5555

5656
1. Go to **App registrations**.
5757
1. Under the **Manage** section, select **Certificates & secrets**.
@@ -76,7 +76,7 @@ The `redirect-uri` of your app, where your app sends and receives the authentica
7676

7777
### Find the adme-url for your Azure Data Manager for Energy instance
7878

79-
1. Create an [Azure Data Manager for Energy instance](quickstart-create-microsoft-energy-data-services-instance.md) using the `client-id` generated above.
79+
1. Create an [Azure Data Manager for Energy instance](quickstart-create-microsoft-energy-data-services-instance.md) using the `client-id` obtained in the [Find client-id](#find-client-id) section.
8080
1. Go to your Azure Data Manager for Energy **Overview** page on the Azure portal.
8181
1. On the **Essentials** pane, copy the URI.
8282

@@ -159,11 +159,11 @@ The first step to get an access token for many OpenID Connect (OIDC) and OAuth 2
159159
|Parameter| Description|
160160
| --- | --- |
161161
|code|The authorization code that the app requested. The app can use the authorization code to request an access token for the target resource. Authorization codes are short lived. Typically, they expire after about 10 minutes.|
162-
|state|If a state parameter is included in the request, the same value should appear in the response. The app should verify that the state values in the request and response are identical. This check helps to detect [CSRF attacks](https://tools.ietf.org/html/rfc6749#section-10.12) against the client.|
162+
|state|If a state parameter is included in the request, the same value should appear in the response. The app should verify that the state values in the request and response are identical. This check helps to detect Cross-Site Request Forgery (CSRF) attacks. For more information, see [CSRF attacks](https://tools.ietf.org/html/rfc6749#section-10.12).|
163163
|session_state|A unique value that identifies the current user session. This value is a GUID, but it should be treated as an opaque value that's passed without examination.|
164164

165165
> [!WARNING]
166-
> Running the URL in Postman won't work because it requires extra configuration for token retrieval.
166+
> Running the URL in other GUI-based API clients doesn't work because they require extra configuration for token retrieval.
167167
168168
### Get an auth token and a refresh token
169169

articles/energy-data-services/tutorial-seismic-ddms.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -284,4 +284,5 @@ As an alternative user experience to Postman, you can use the sdutil command-lin
284284
> [!div class="nextstepaction"]
285285
> [Use sdutil to load data into Seismic Store](./tutorial-seismic-ddms-sdutil.md)
286286
>
287-
> For more information on the Seismic REST APIs in Azure Data Manager for Energy, see the OpenAPI specifications available in the [adme-samples](https://microsoft.github.io/adme-samples/) GitHub repository.
287+
288+
For more information on the Seismic REST APIs in Azure Data Manager for Energy, see the OpenAPI specifications available in the [adme-samples](https://microsoft.github.io/adme-samples/) GitHub repository.

articles/firewall/firewall-preview.md

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: duongau
66
ms.service: azure-firewall
77
ms.topic: concept-article
8-
ms.date: 01/15/2025
8+
ms.date: 03/20/2025
99
ms.author: duau
1010
---
1111

@@ -43,12 +43,6 @@ For more information, see [Resource Health overview](/azure/service-health/resou
4343

4444
You can configure Azure Firewall to autolearn both registered and private ranges every 30 minutes. For information, see [Azure Firewall SNAT private IP address ranges](snat-private-range.md#auto-learn-snat-routes-preview).
4545

46-
### Parallel IP Group updates (preview)
47-
48-
You can now update multiple IP Groups in parallel at the same time. This is useful for administrators who want to make configuration changes more quickly and at scale, especially when making those changes using a dev ops approach (templates, ARM template, CLI, and PowerShell).
49-
50-
For more information, see [IP Groups in Azure Firewall](ip-groups.md#parallel-ip-group-updates-preview).
51-
5246
### Private IP address DNAT rules (preview)
5347

5448
You can now configure a DNAT rule on Azure Firewall Policy with the private IP address of the Azure Firewall as the destination. Previously, DNAT rules only worked with Azure Firewall Public IP addresses.
@@ -67,4 +61,4 @@ For more information, see [Customer provided public IP address support in secure
6761

6862
## Next steps
6963

70-
To learn more about Azure Firewall, see [What is Azure Firewall?](overview.md).
64+
To learn more about Azure Firewall, see [What is Azure Firewall?](overview.md).

articles/firewall/ip-groups.md

Lines changed: 21 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -57,40 +57,27 @@ You can see all the IP addresses in the IP Group and the rules or resources that
5757

5858
You can now select **IP Group** as a **Source type** or **Destination type** for the IP address(es) when you create Azure Firewall DNAT, application, or network rules.
5959

60-
## Parallel IP Group updates (preview)
61-
62-
You can now update multiple IP Groups in parallel at the same time. This is particularly useful for administrators who want to make configuration changes more quickly and at scale, especially when making those changes using a dev ops approach (templates, ARM, CLI, and Azure PowerShell).
63-
64-
With this support, you can now:
65-
66-
- Update 50 IP Groups at a time
67-
- Update the firewall and firewall policy during IP Group updates
68-
- Use the same IP Group in parent and child policy
69-
- Update multiple IP Groups referenced by firewall policy or classic firewall simultaneously
70-
- Receive new and improved error messages
71-
- Fail and succeed states
72-
73-
For example, if there is an error with one IP Group update out of 20 parallel updates, the other updates proceed, and the errored IP Group fails. In addition, if the IP Group update fails, and the firewall is still healthy, the firewall remains in a *Succeeded* state. To check if the IP Group update has failed or succeeded, you can view the status on the IP Group resource.
74-
75-
To activate Parallel IP Group support, you can register the feature using either Azure PowerShell or the Azure portal.
76-
77-
### Azure PowerShell
78-
79-
Use the following Azure PowerShell commands:
80-
81-
```azurepowershell
82-
Connect-AzAccount
83-
Select-AzSubscription -Subscription <subscription_id> or <subscription_name>
84-
Register-AzProviderFeature -FeatureName AzureFirewallParallelIPGroupUpdate -ProviderNamespace Microsoft.Network
85-
Register-AzResourceProvider -ProviderNamespace Microsoft.Network
86-
```
87-
It can take several minutes for this to take effect. Once the feature is completely registered, consider performing an update on Azure Firewall for the change to take effect immediately.
88-
89-
### Azure portal
90-
91-
1. Navigate to **Preview features** in the Azure portal.
92-
1. Search and register **AzureFirewallParallelIPGroupUpdate**.
93-
1. Ensure the feature is enabled.
60+
## Parallel IP Group updates
61+
62+
You can now update multiple IP Groups in parallel at the same time. This is particularly useful for environments requiring faster changes at scale, especially when making those changes using a dev ops approach (templates, ARM, CLI, and Azure PowerShell).
63+
64+
With this support, you can perform the following:
65+
66+
- **Update 20 IP Groups at a time:** Perform simultaneous updates up to 20 IP Groups in one operation, referenced by firewall policy or classic firewall.
67+
- **Update Azure Firewall and IP Groups together:** You can update IP Groups simultaneously with the firewall or with firewall policies.
68+
- **Improved efficiency:** Parallel IP Group updates now run twice as fast.
69+
- **Receive new and improved error messages:**
70+
71+
|Error message |Description |Recommended action|
72+
|---------|---------|---------|
73+
|**In failed state (skipping update)** |Azure Firewall or Firewall Policy is in a failed state. Updates cannot proceed until the resource is healthy. |Review previous operations and correct any misconfigurations to ensure the resource is healthy.|
74+
| **Backend server could not update Firewall at this time** | The backend server was unable to successfully process the request.| Create a support request.|
75+
| **Error occurred during FW update** | The error is related to the underlying backend servers.| Retry the operation or create a support request if the issue persists.|
76+
| **Internal server error** | An unexpected backend error has occurred. | Retry the operation or create a support request.|
77+
78+
Additionally, note the following status updates:
79+
- **One or more IP Group failure:** If one IP Group update (out of 20 parallel updates) fails, the provisioning state changes to "Failed" while the remaining IP Groups will continue to update and succeed.
80+
- **Status update:** If an IP Group update fails, and if the firewall remains healthy, its state will still show as "Succeeded." To verify, check the status on the IP Group resource itself.
9481

9582
## Region availability
9683

0 commit comments

Comments
 (0)