Skip to content

Commit 835f63f

Browse files
authored
Merge pull request #103642 from ArvindHarinder1/patch-80
Add TLS Requirements
2 parents 6c0b091 + 080ba2d commit 835f63f

File tree

1 file changed

+28
-0
lines changed

1 file changed

+28
-0
lines changed

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -724,6 +724,34 @@ This section provides example SCIM requests emitted by the Azure AD SCIM client
724724

725725
*HTTP/1.1 204 No Content*
726726

727+
### Security requirements
728+
**TLS Protocol Versions**
729+
730+
The only acceptable TLS protocol versions are TLS 1.2 and TLS 1.3. No other versions of TLS are permitted. No version of SSL is permitted.
731+
- RSA keys must be at least 2,048 bits.
732+
- ECC keys must be at least 256 bits, generated using an approved elliptic curve
733+
734+
735+
**Key Lengths**
736+
737+
All services must use X.509 certificates generated using cryptographic keys of sufficient length, meaning:
738+
739+
**Cipher Suites**
740+
741+
All services must be configured to use the following cipher suites, in the exact order specified below. Note that if you only have an RSA certificate, installed the ECDSA cipher suites do not have any effect. </br>
742+
743+
TLS 1.2 Cipher Suites minimum bar:
744+
745+
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
746+
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
747+
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
748+
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
749+
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
750+
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
751+
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
752+
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
753+
754+
727755
## Step 3: Build a SCIM endpoint
728756

729757
By creating a SCIM web service that interfaces with Azure Active Directory, you can enable automatic user provisioning for virtually any application or identity store.

0 commit comments

Comments
 (0)