Skip to content

Commit 9d5639e

Browse files
authored
Merge pull request #296715 from MicrosoftDocs/main
3/20/2025 PM Publish
2 parents 126e42b + 7705988 commit 9d5639e

File tree

251 files changed

+2772
-2199
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

251 files changed

+2772
-2199
lines changed
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
---
2+
title: TLS 1.0 and 1.1 retirement on Azure Application Gateway
3+
description: Guidance for managing your Application Gateway with the upcoming retirement of TLS 1.0 and 1.1.
4+
services: application gateway
5+
author: jaesoni
6+
ms.service: azure-application-gateway
7+
ms.topic: concept-article
8+
ms.date: 03/04/2025
9+
ms.author: greglin
10+
---
11+
12+
# Managing your Application Gateway with TLS 1.0 and 1.1 retirement
13+
14+
Starting **31st August 2025**, Azure Application Gateway will no longer support **TLS (Transport Layer Security) versions 1.0 and 1.1**. This change aligns with the [Azure-wide retirement](https://azure.microsoft.com/updates?id=update-retirement-tls1-0-tls1-1-versions-azure-services) of these TLS versions to enhance the security. As the owner of an Application Gateway resource, you should review both the Frontend clients and Backend servers TLS connections that may be using these older versions.
15+
16+
## Frontend TLS connections
17+
18+
With deprecation of TLS versions 1.0 and 1.1, the **older Predefined TLS policies** and certain cipher suites from the **Custom TLS policy** will be removed.
19+
20+
### Predefined policies for V2 SKUs
21+
22+
The predefined policies 20150501 and 20170401 that support TLS v1.0 and 1.1 will be discontinued and can no longer be associated with an Application Gateway resource after August 2025. It's advised to transition to one of the recommended TLS policies, 20220101 or 20220101S. Alternatively, the 20170401S policy may be used if specific cipher suites are required.
23+
24+
![A diagram showing predefined policies for V2 SKUs.](media/application-gateway-tls-version-retirement/v2-retiring-tls-policies.png)
25+
26+
### Custom policies for V2 SKUs
27+
28+
Azure Application Gateway V2 SKU offers two types of custom policies: Custom and CustomV2. The retirement of these TLS versions affects only the "Custom" policy. The newer "CustomV2" policy comes with TLS v1.3. Beyond August 2025, the older Custom policy will support only TLS v1.2 and the following cipher suites won't be supported.
29+
30+
| Unsupported cipher suites |
31+
| ---------- |
32+
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
33+
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
34+
| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 |
35+
| TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 |
36+
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA |
37+
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA |
38+
| TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 |
39+
| TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 |
40+
| TLS_DHE_DSS_WITH_AES_256_CBC_SHA |
41+
| TLS_DHE_DSS_WITH_AES_128_CBC_SHA |
42+
| TLS_RSA_WITH_3DES_EDE_CBC_SHA |
43+
| TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA |
44+
45+
### Predefined policies for V1 SKUs
46+
47+
The V1 SKU will only support the 20170401S policy after the older policies with TLS versions 1.0 and 1.1 are discontinued. The newer 20220101 or 20220101S policies won't be available for the soon-to-be-retired V1 SKU.
48+
49+
![A diagram showing predefined policies for V1 SKUs.](media/application-gateway-tls-version-retirement/v1-retiring-tls-policies.png)
50+
51+
### Custom policies for V1 SKUs
52+
53+
Application Gateway V1 SKU only supports the older "Custom" policy. Beyond August 2025, this older Custom policy will support only TLS v1.2 and the following cipher suites won't be supported.
54+
55+
| Unsupported cipher suites |
56+
| ---------- |
57+
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
58+
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
59+
| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 |
60+
| TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 |
61+
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA |
62+
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA |
63+
| TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 |
64+
| TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 |
65+
| TLS_DHE_DSS_WITH_AES_256_CBC_SHA |
66+
| TLS_DHE_DSS_WITH_AES_128_CBC_SHA |
67+
| TLS_RSA_WITH_3DES_EDE_CBC_SHA |
68+
| TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA |
69+
70+
## Backend TLS connections
71+
72+
You don't need to configure anything on your Application Gateway for the backend connection's TLS version as the selection of TLS policy has no control over the backend TLS connections. After retirement, the connections to backend servers will always be with preferred TLS v1.3 and up to TLS v1.2. You must ensure that your servers in the backend pools are compatible with these updated protocol versions. This compatibility avoids any disruptions when establishing a TLS/HTTPS connection with those backend servers.
73+
74+
## Next steps
75+
76+
Learn about [TLS policy types and configurations](application-gateway-ssl-policy-overview.md)
77+
Visit Azure Updates for [retirement notice](https://azure.microsoft.com/updates?searchterms=application+gateway)
57.3 KB
Loading
38.4 KB
Loading

articles/application-gateway/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,6 +95,8 @@
9595
href: ssl-certificate-management.md
9696
- name: Security baseline
9797
href: /security/benchmark/azure/baselines/application-gateway-security-baseline?toc=/azure/application-gateway/toc.json
98+
- name: TLS 1.0 and 1.1 retirement
99+
href: application-gateway-tls-version-retirement.md
98100
- name: Network security blog
99101
href: https://techcommunity.microsoft.com/category/azure-network-security/blog/azurenetworksecurityblog
100102
- name: Deploy

articles/azure-cache-for-redis/monitor-cache-reference.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,6 @@ description: This article contains important reference material you need when yo
44
ms.date: 05/13/2024
55
ms.custom: horz-monitor, ignite-2024
66
ms.topic: reference
7-
author: rboucher
8-
ms.author: robb
97
---
108

119
# Azure Cache for Redis monitoring data reference

articles/azure-cache-for-redis/monitor-cache.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,6 @@ description: Start here to learn how to monitor Azure Cache for Redis.
44
ms.date: 03/21/2024
55
ms.custom: horz-monitor
66
ms.topic: conceptual
7-
author: robb
8-
ms.author: robb
9-
107
---
118

129
# Monitor Azure Cache for Redis

articles/communication-services/how-tos/calling-sdk/includes/events/events-web.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -325,7 +325,7 @@ call.on('mutedByOthers', () => {
325325
326326
### Event: `callerInfoChanged`
327327
328-
The `callerInfoChanged` event happens when caller information was updated.
328+
The `callerInfoChanged` event happens when caller information was updated. This occurs when a caller changes their display name.
329329
330330
**How might your application react to the event?**
331331
Application can update caller information.
@@ -340,7 +340,7 @@ call.on('callerInfoChanged', () => {
340340
341341
### Event: `transferorInfoChanged`
342342
343-
The `transferorInfoChanged` event happens when transferor information was updated.
343+
The `transferorInfoChanged` event happens when transferor information was updated. This occurs when a transferor changes their display name.
344344
345345
**How might your application react to the event?**
346346
Application can update transferor information.

articles/communication-services/how-tos/calling-sdk/includes/transfer-calls/transfer-calls-web.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -148,8 +148,7 @@ transfer.on('stateChanged', () => {
148148
```
149149

150150
### Initial Caller and Transferor information
151-
In case of call transfer or forward scenario incoming call object contains information about initial caller and transferor agents.
152-
Transferor agent could be Azure Communication Calling user or Teams user or Voice Application (Call Queue and etc.)
151+
When forwarding or transferring a call, `transferInfo` is populated with information about the prior call state. This includes `callerInfo` which describes the initial caller and `transferorInfo` which describes the entity transferring or forwarding the call. For example, if an ACS user places a call to a Teams call queue which then distributes the call to a M365 user, the `callerInfo` would specify the ACS user and the `transferorInfo` would specify the Teams call queue. Callers and transferors have the ability to update their displayName, and if this occurs the callerInfoChanged or transferorInfoChanged events will fire. For more information on change events see [Event: callerInfoChanged](../../events.md?pivots=platform-web#event-callerinfochanged) and [Event: transferorInfoChanged](../../events.md?pivots=platform-web#event-transferorinfochanged). This applies to all calls and for any identity (BYOI or M365).
153152
```js
154153
const incomingCallHandler = async (args: { incomingCall: IncomingCall }) => {
155154
const incomingCall = args.incomingCall;

articles/communications-gateway/connect-operator-connect.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
---
22
title: Connect Azure Communications Gateway to Operator Connect or Teams Phone Mobile
33
description: After deploying Azure Communications Gateway, you can configure it to connect to the Operator Connect and Teams Phone Mobile environments.
4-
author: GemmaWakeford
5-
ms.author: gwakeford
64
ms.service: azure-communications-gateway
75
ms.topic: integration
86
ms.date: 03/22/2024

articles/communications-gateway/connect-teams-direct-routing.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
---
22
title: Connect Azure Communications Gateway to Microsoft Teams Direct Routing
33
description: After deploying Azure Communications Gateway, you can configure it to connect to the Microsoft Phone System for Microsoft Teams Direct Routing.
4-
author: GemmaWakeford
5-
ms.author: gwakeford
64
ms.service: azure-communications-gateway
75
ms.topic: integration
86
ms.date: 03/22/2024

0 commit comments

Comments
 (0)