Skip to content

Commit 85b3b25

Browse files
authored
Merge pull request #119890 from polyakov-vlad/patch-1
Update end-to-end-tls.md
2 parents 0f0a29f + 38642bc commit 85b3b25

File tree

1 file changed

+9
-6
lines changed

1 file changed

+9
-6
lines changed

articles/frontdoor/end-to-end-tls.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: frontdoor
55
author: duongau
66
ms.service: frontdoor
77
ms.topic: conceptual
8-
ms.date: 02/07/2023
8+
ms.date: 02/15/2024
99
ms.author: duau
1010
zone_pivot_groups: front-door-tiers
1111
---
@@ -30,11 +30,11 @@ Azure Front Door offloads the TLS sessions at the edge and decrypts client reque
3030

3131
## Supported TLS versions
3232

33-
Azure Front Door supports three versions of the TLS protocol: TLS versions 1.0, 1.1, and 1.2. All Azure Front Door profiles created after September 2019 use TLS 1.2 as the default minimum, but TLS 1.0 and TLS 1.1 are still supported for backward compatibility.
33+
Azure Front Door supports four versions of the TLS protocol: TLS versions 1.0, 1.1, 1.2 and 1.3. All Azure Front Door profiles created after September 2019 use TLS 1.2 as the default minimum with TLS 1.3 enabled, but TLS 1.0 and TLS 1.1 are still supported for backward compatibility.
3434

35-
Although Azure Front Door supports TLS 1.2, which introduced client/mutual authentication in RFC 5246, currently, Azure Front Door doesn't support client/mutual authentication.
35+
Although Azure Front Door supports TLS 1.2, which introduced client/mutual authentication in RFC 5246, currently, Azure Front Door doesn't support client/mutual authentication (mTLS) yet.
3636

37-
You can configure the minimum TLS version in Azure Front Door in the custom domain HTTPS settings using the Azure portal or the [Azure REST API](/rest/api/frontdoorservice/frontdoor/frontdoors/createorupdate#minimumtlsversion). Currently, you can choose between 1.0 and 1.2. As such, specifying TLS 1.2 as the minimum version controls the minimum acceptable TLS version Azure Front Door will accept from a client. When Azure Front Door initiates TLS traffic to the origin, it will attempt to negotiate the best TLS version that the origin can reliably and consistently accept.
37+
You can configure the minimum TLS version in Azure Front Door in the custom domain HTTPS settings using the Azure portal or the [Azure REST API](/rest/api/frontdoorservice/frontdoor/frontdoors/createorupdate#minimumtlsversion). Currently, you can choose between 1.0 and 1.2. As such, specifying TLS 1.2 as the minimum version controls the minimum acceptable TLS version Azure Front Door will accept from a client. For minimum TLS version 1.2 the negotiation will attempt to establish TLS 1.3 and then TLS 1.2, while for minimum TLS version 1.0 all four versions will be attempted. When Azure Front Door initiates TLS traffic to the origin, it will attempt to negotiate the best TLS version that the origin can reliably and consistently accept. Supported TLS versions for origin connections are TLS 1.0, TLS 1.1, TLS 1.2 and TLS 1.3.
3838

3939
## Supported certificates
4040

@@ -105,8 +105,9 @@ For your own custom TLS/SSL certificate:
105105

106106
## Supported cipher suites
107107

108-
For TLS 1.2 the following cipher suites are supported:
109-
108+
For TLS 1.2/1.3 the following cipher suites are supported:
109+
* TLS_AES_256_GCM_SHA384 (TLS 1.3 only)
110+
* TLS_AES_128_GCM_SHA256 (TLS 1.3 only)
110111
* TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
111112
* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
112113
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
@@ -119,6 +120,8 @@ For TLS 1.2 the following cipher suites are supported:
119120
120121
When using custom domains with TLS 1.0 and 1.1 enabled, the following cipher suites are supported:
121122

123+
* TLS_AES_256_GCM_SHA384 (TLS 1.3 only)
124+
* TLS_AES_128_GCM_SHA256 (TLS 1.3 only)
122125
* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
123126
* TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
124127
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

0 commit comments

Comments
 (0)