Skip to content

Commit a50a948

Browse files
authored
Merge pull request #202641 from spelluru/sbustls0623
Java details
2 parents b50a7cc + 80d7d9b commit a50a948

File tree

1 file changed

+11
-1
lines changed

1 file changed

+11
-1
lines changed

articles/service-bus-messaging/transport-layer-security-configure-client-version.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: EldertGrootenboer
77

88
ms.service: service-bus-messaging
99
ms.topic: article
10-
ms.date: 04/22/2022
10+
ms.date: 06/23/2022
1111
ms.author: egrootenboer
1212
---
1313

@@ -48,6 +48,16 @@ The following sample shows how to enable TLS 1.2 in a .NET client using the Azur
4848
await sender.SendMessagesAsync(new ServiceBusMessage($"Message for TLS check")));
4949
}
5050
```
51+
# [Java](#tab/java)
52+
The minimum Java version for messaging SDKs is Java 8. For Java 8 installations, the default TLS version is 1.2. For Java 11 and later, the default is TLS 1.3.
53+
54+
Java Messaging SDKs use the default `SSLContext` from JDK. That's, if you configure JDK TLS using the system properties documented by the JVM, then Java messaging libraries implicitly use it. For example, For OpenJDK-based JVMs, you can use the system property `jdk.tls.client.protocols`. Example: `-Djdk.tls.client.protocols=TLSv1.2`.
55+
56+
There are a few other ways to enable TLS 1.2 include the following one:
57+
58+
```java
59+
sslSocket.setEnabledProtocols(new String[] {"TLSv1. 2"});
60+
```
5161

5262
---
5363

0 commit comments

Comments
 (0)