Skip to content

Commit a1701d8

Browse files
Merge pull request #303782 from SoniaLopezBravo/patch-6
Update iot-hub-tls-support.md
2 parents 42e5e3a + 2029d40 commit a1701d8

File tree

1 file changed

+10
-13
lines changed

1 file changed

+10
-13
lines changed

articles/iot-hub/iot-hub-tls-support.md

Lines changed: 10 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ IoT Hub uses Transport Layer Security (TLS) to secure connections from IoT devic
2929
> - US Gov Arizona
3030
> - US Gov Virginia (TLS 1.0/1.1 support isn't available in this region. TLS 1.2 enforcement must be enabled or IoT Hub creation fails).
3131
>
32-
> To find out the version of TLS your IoT Hub devices are running, refer to [TLS 1.0 and 1.1 end of support guide](#checking-tls-versions-for-iot-hub-devices).
32+
> To find out the version of TLS your IoT Hub devices are running, refer to [TLS 1.0 and 1.1 end of support guide](#checking-tls-versions-and-cipher-suites-for-iot-hub-devices).
3333
3434
## Mutual TLS support
3535

@@ -58,7 +58,7 @@ Root CA migrations are rare. You should always prepare your IoT solution for the
5858

5959
Starting **August 31, 2025**, IoT Hub enforces the use of recommended strong cipher suites for all existing and new IoT Hubs. Non-recommended (weak) cipher suites aren't supported past this date.
6060

61-
To comply with Azure security policy for a secure connection, IoT Hub only supports the following RSA and ECDSA cipher suites that require minimum TLS 1.2 enforcement:
61+
To comply with Azure security policy for a secure connection, IoT Hub only supports the following RSA and ECDSA cipher suites:
6262

6363
* TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
6464
* TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
@@ -69,7 +69,7 @@ To comply with Azure security policy for a secure connection, IoT Hub only suppo
6969
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
7070
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
7171

72-
The following non-recommended cipher suites are allowed until August 31, 2025:
72+
The following non-recommended cipher suites are allowed on hubs **without minTlsVersion:1.2** until August 31, 2025:
7373

7474
* TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
7575
* TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
@@ -154,32 +154,29 @@ The created IoT hub resource using this configuration refuses device and service
154154
> [!NOTE]
155155
> Upon failover, the `minTlsVersion` property of your IoT Hub remains effective in the geo-paired region post-failover.
156156
157-
## Checking TLS versions for IoT Hub devices
157+
## Checking TLS versions and cipher suites for IoT Hub devices
158158

159-
Azure IoT Hub provides the capability to check the TLS version and other device connection metrics to help monitor the security of IoT devices. You can either use IoT Hub metrics or diagnostic logs to track TLS version usage and other related properties like [Cipher Suites](#cipher-suites).
159+
Azure IoT Hub provides the capability to check the TLS version, cipher suites, and other device connection metrics to help monitor the security of IoT devices. You can either use IoT Hub metrics or diagnostic logs to track TLS version usage and other related properties like [Cipher Suites](#cipher-suites).
160160

161-
### Checking TLS versions using IoT Hub metrics
161+
### Checking TLS versions and cipher suites using IoT Hub metrics
162162

163-
If you want to validate that device traffic to IoT Hub is utilizing TLSv1.2, you can check IoT Hub’s metrics. This allows you to filter by TLS version or Cipher Suite and check the number of successful connections.
163+
If you want to validate that device traffic to IoT Hub is utilizing TLSv1.2 and strong cipher suites, you can check IoT Hub’s metrics. This allows you to filter by TLS version or cipher suite and check the number of successful connections.
164164

165165
1. In the [Azure portal](https://portal.azure.com), go to your IoT hub.
166166
1. In the left-side menu under **Monitoring**, select **Metrics**.
167167
1. Add the metric **Successful Connects**.
168168

169169
:::image type="content" source="./media/iot-hub-tls-support/tls-versions-support-metrics.png" alt-text="Screenshot showing how to add the Successful Connects metric.":::
170170

171-
1. Filter by TLS Version or Cipher Suite by selecting the **Add filter** button and choosing the appropriate property, TLS Version or Cipher Suite, operator, for example "=", and value, for example, TLSv1.2.
171+
1. Filter by TLS Version or cipher suite by selecting the **Add filter** button and choosing the appropriate property, TLS Version or cipher suite, operator, for example "=", and value, for example, TLSv1.2.
172172

173173
:::image type="content" source="./media/iot-hub-tls-support/tls-versions-support-metrics-filter.png" alt-text="Screenshot showing how to filter by TLS Version or Cipher Suite.":::
174174

175175
1. After applying the filter, you see the sum of devices with successful IoT Hub connections based on the filtered property and value(s).
176176

177-
> [!NOTE]
178-
> TLS version query isn't available for devices using HTTPS connections.
179-
180-
### Checking TLS versions using IoT Hub diagnostic logs
177+
### Checking TLS versions and cipher suites using IoT Hub diagnostic logs
181178

182-
Azure IoT Hub can provide diagnostic logs for several categories that can be analyzed using Azure Monitor Logs. In the connections log you can find the TLS version for your IoT Hub devices.
179+
Azure IoT Hub can provide diagnostic logs for several categories that can be analyzed using Azure Monitor Logs. In the connections log you can find the TLS version and cipher suite for your IoT Hub devices.
183180

184181
To view these logs, follow these steps:
185182

0 commit comments

Comments
 (0)