Skip to content

Commit 7cc8ee5

Browse files
authored
Update iot-hub-tls-support.md
1 parent 6c608ce commit 7cc8ee5

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/iot-hub/iot-hub-tls-support.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -47,16 +47,16 @@ Root CA migrations are extremely rare, you should always prepare your IoT soluti
4747
## Cipher Suites
4848
To comply with Azure security policy for a secure connection, IoT Hub supports the following cipher suites:
4949

50-
| Cipher Suites | TLS Version |
50+
| Cipher Suites | Description |
5151
|-------------------------------------------|------------------------------|
52-
| `TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256` | TLS 1.2 Strong Cipher Suites |
53-
| `TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384` | TLS 1.2 Strong Cipher Suites |
54-
| `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256` | TLS 1.2 Strong Cipher Suites |
55-
| `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384` | TLS 1.2 Strong Cipher Suites |
56-
| `TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256` | ECC-only Cipher Suites |
57-
| `TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384` | ECC-only Cipher Suite |
58-
| `TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256` | ECC-only Cipher Suite |
59-
| `TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384` | ECC-only Cipher Suite |
52+
| `TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256` | TLS 1.2, 1.3 RSA cipher suites |
53+
| `TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384` | TLS 1.2, 1.3 RSA cipher suites |
54+
| `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256` | TLS 1.2, 1.3 RSA cipher suites |
55+
| `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384` | TLS 1.2, 1.3 RSA cipher suites |
56+
| `TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256` | TLS 1.2, 1.3 ECDSA cipher suites |
57+
| `TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384` | TLS 1.2, 1.3 ECDSA cipher suites |
58+
| `TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256` | TLS 1.2, 1.3 ECDSA cipher suites |
59+
| `TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384` | TLS 1.2, 1.3 ECDSA cipher suites |
6060

6161
The following cipher suites are weak and no longer recommended, and these cipher suites will be retired in accordance with the Azure TLS end of support.
6262

0 commit comments

Comments
 (0)