Skip to content

Commit 7e05f66

Browse files
committed
Merge branch 'afd-cipher' of https://github.com/halkazwini/azure-docs-pr into afd-cipher
2 parents a35f943 + 7376d9b commit 7e05f66

File tree

2 files changed

+5
-13
lines changed

2 files changed

+5
-13
lines changed

articles/frontdoor/standard-premium/tls-policy-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.date: 03/18/2025
1313
> [!IMPORTANT]
1414
> TLS policy is currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
1515
16-
Azure Front Door offers two mechanisms for controlling TLS policy. You can use either a predefined policy or a custom policy per your own needs.
16+
Azure Front Door Standard and Premium offers two mechanisms for controlling TLS policy. You can use either a predefined policy or a custom policy per your own needs. If you use Azure Front Door (classic) and Microsoft CDN (classic), you will continue to use the minimum TLS 1.2 version.
1717

1818
- Azure Front Door offers several predefined TLS policies. You can configure your AFD with any of these policies to get the appropriate level of security. These predefined policies are configured keeping in mind the best practices and recommendations from the Microsoft Security team. We recommend that you use the newest TLS policies to ensure the best TLS security.
1919

articles/frontdoor/standard-premium/tls-policy.md

Lines changed: 4 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: halkazwini
55
ms.author: halkazwini
66
ms.service: azure-frontdoor
77
ms.topic: concept-article
8-
ms.date: 03/18/2025
8+
ms.date: 03/25/2025
99
---
1010

1111
# Azure Front Door TLS policy (preview)
@@ -18,9 +18,9 @@ Azure Front Door supports [end-to-end TLS encryption](../end-to-end-tls.md). Whe
1818
Azure Front Door supports two versions of the TLS protocol: TLS versions 1.2 and 1.3. Currently, Azure Front Door doesn't support client/mutual authentication (mTLS).
1919

2020
> [!NOTE]
21-
> As of March 1, 2025, TLS 1.0 and 1.1 are disallowed on Azure Front Door. If you didn't disable TLS 1.0 and 1.1 on legacy settings before this date, they'll still work temporarily but will be disabled in the future.
21+
> As of March 1, 2025, TLS 1.0 and 1.1 are disallowed on Azure Front Door. If you didn't disable TLS 1.0 and 1.1 on legacy settings before this date, they'll still work temporarily but will be disabled in April 2025.
2222
23-
Azure Front Door offers two mechanisms for controlling TLS policy. You can use either a predefined policy or a custom policy per your own needs.
23+
Azure Front Door Standard and Premium offer two mechanisms for controlling TLS policy. You can use either a predefined policy or a custom policy per your own needs. If you use Azure Front Door (classic) and Microsoft CDN (classic), you will continue to use the minimum TLS 1.2 version.
2424

2525
- Azure Front Door offers several predefined TLS policies. You can configure your AFD with any of these policies to get the appropriate level of security. These predefined policies are configured keeping in mind the best practices and recommendations from the Microsoft Security team. We recommend that you use the newest TLS policies to ensure the best TLS security.
2626
- If a TLS policy needs to be configured for your own business and security requirements, you can use a Custom TLS policy. With a custom TLS policy, you have complete control over the minimum TLS protocol version to support, and the supported cipher suites.
@@ -38,7 +38,7 @@ Azure Front Door offers several predefined TLS policies. You can configure your
3838

3939
The following table shows the list of cipher suites and minimum protocol version support for each predefined policy. The ordering of the cipher suites determines the priority order during TLS negotiation.
4040

41-
By default, TLSv1.2_2023 will be selected. TLSv1.2_2022 maps to the minimum TLS 1.2 version in previous design.
41+
By default, TLSv1.2_2023 will be selected. TLSv1.2_2022 maps to the minimum TLS 1.2 version in previous design. Some might see a read-only TLSv1.0/1.1_2019 which maps to the minimum TLS 1.0/1.1 version in previous design, because they doesn't specifically switch to minimum TLS 1.2 version. The TLSv1.0/1.1_2019 policy for such will be totally removed and disabled in April 2025.
4242

4343
| **OpenSSL** | **Cipher** **Suite** | **TLSv1.2_2023** | **TLSv1.2_2022** |
4444
|---|---|---|---|
@@ -48,10 +48,6 @@ By default, TLSv1.2_2023 will be selected. TLSv1.2_2022 maps to the minimum TLS
4848
| **TLS_AES_128_GCM_SHA256** | TLS_AES_128_GCM_SHA256 | Yes | Yes |
4949
| **ECDHE-RSA-AES256-GCM-SHA384** | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 | Yes | Yes |
5050
| **ECDHE-RSA-AES128-GCM-SHA256** | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | Yes | Yes |
51-
| **AES256-GCM-SHA384** | TLS_RSA_WITH_AES_256_GCM_SHA384 | | Yes |
52-
| **AES128-GCM-SHA256** | TLS_RSA_WITH_AES_128_GCM_SHA256 | | Yes |
53-
| **AES256-SHA256** | TLS_RSA_WITH_AES_256_CBC_SHA256 | | Yes |
54-
| **AES128-SHA256** | TLS_RSA_WITH_AES_128_CBC_SHA256 | | Yes |
5551
| **DHE-RSA-AES256-GCM-SHA384** | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 | | Yes |
5652
| **DHE-RSA-AES128-GCM-SHA256** | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 | | Yes |
5753
| **ECDHE-RSA-AES256-SHA384** | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 | | Yes |
@@ -74,10 +70,6 @@ Azure Front Door supports the following cipher suites from which you can choose
7470
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
7571
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
7672
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
77-
- TLS_RSA_WITH_AES_256_GCM_SHA384
78-
- TLS_RSA_WITH_AES_128_GCM_SHA256
79-
- TLS_RSA_WITH_AES_256_CBC_SHA256
80-
- TLS_RSA_WITH_AES_128_CBC_SHA256
8173
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
8274
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
8375

0 commit comments

Comments
 (0)