Skip to content

Commit a573b7d

Browse files
Updates
1 parent 02b6a31 commit a573b7d

File tree

1 file changed

+11
-16
lines changed

1 file changed

+11
-16
lines changed

articles/iot-hub/iot-hub-tls-support.md

Lines changed: 11 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -16,20 +16,18 @@ IoT Hub uses Transport Layer Security (TLS) to secure connections from IoT devic
1616

1717
> [!NOTE]
1818
> Azure IoT Hub will end support for TLS 1.0 and 1.1 in alignment with the Azure wide service announcement for [TLS 1.0 and 1.1 retirement](https://azure.microsoft.com/updates?id=update-retirement-tls1-0-tls1-1-versions-azure-services) on **August 31, 2025**. In addition, IoT Hub will no longer support weak cipher suites as of August 31, 2025. Only recommended strong cipher suites will be supported for both existing and new IoT Hubs.
19-
>
20-
> For customers using weak cipher suites prior to August 31, 2025, Cipher Suite Compatibility Mode may be enabled automatically to allow additional time to update devices to the recommended cipher suites.
2119
>
2220
> It's therefore essential that you properly test and validate that *all* your IoT devices and services are compatible with TLS 1.2 and the [recommended ciphers](#cipher-suites) in advance. It's highly recommended to use the [minimum TLS enforcement feature](#enforce-iot-hub-to-use-tls-12-and-strong-cipher-suites) as the mechanism for testing and compliance.
2321
2422

2523
> [!IMPORTANT]
26-
> It’s important to distinguish between **TLS 1.2 support** and **TLS 1.2 enforcement**. TLS 1.2 is supported on all IoT Hubs, meaning that IoT Hubs can handle connections using the TLS 1.2 protocol. On the other hand, TLS 1.2 enforcement ensures that IoT Hub **only** accepts connections using TLS 1.2 or higher. When TLS 1.2 enforcement is enabled, the service also enforces the use of [strong cipher suites](#cipher-suites) as described above.
24+
> It’s important to distinguish between **TLS 1.2 support** and **TLS 1.2 enforcement**. TLS 1.2 is supported on all IoT Hubs, meaning that IoT Hubs can handle connections using the TLS 1.2 protocol. On the other hand, TLS 1.2 enforcement ensures that IoT Hub **only** accepts connections using TLS 1.2 or higher. When TLS 1.2 enforcement is enabled, the service also enforces the use of [strong cipher suites](#cipher-suites).
2725
>
2826
> Currently, TLS 1.2 enforcement is supported only in select regions:
2927
>
3028
> - All public cloud regions
3129
> - US Gov Arizona
32-
> - US Gov Virginia (Note: TLS 1.0/1.1 support isn't available in this region. TLS 1.2 enforcement must be enabled, or IoT Hub creation will fail).
30+
> - US Gov Virginia (TLS 1.0/1.1 support isn't available in this region. TLS 1.2 enforcement must be enabled or IoT Hub creation fails).
3331
>
3432
> To find out the version of TLS your IoT Hub devices are running, refer to [TLS 1.0 and 1.1 end of support guide](#checking-tls-versions-for-iot-hub-devices).
3533
@@ -56,11 +54,11 @@ For links to download these certificates, see [Azure Certificate Authority detai
5654

5755
Root CA migrations are rare. You should always prepare your IoT solution for the unlikely event that a root CA is compromised and an emergency root CA migration is necessary.
5856

59-
## Cipher Suites
57+
## Cipher suites
6058

6159
Starting **August 31, 2025**, IoT Hub enforces the use of recommended strong cipher suites for all existing and new IoT Hubs. Non-recommended (weak) cipher suites aren't supported past this date.
6260

63-
To comply with Azure security policy for a secure connection, IoT Hub recommends the following RSA and ECDSA cipher suites that require minimum TLS 1.2 enforcement:
61+
To comply with Azure security policy for a secure connection, IoT Hub only supports the following RSA and ECDSA cipher suites that require minimum TLS 1.2 enforcement:
6462

6563
* TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
6664
* TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
@@ -105,29 +103,26 @@ To update IoT Hub to support TLS 1.2 and/or enforce strong cipher suites in Azur
105103
> [!NOTE]
106104
> You can update your IoT Hub to TLS 1.2 in ALL public regions. However, if you update an IoT Hub in one of the selected regions (East US, South Central US, West US 2, US Gov Arizona, and US Gov Virginia), it will enforce stronger cipher suites.
107105
108-
109106
## Enforce IoT Hub to use TLS 1.2 and strong cipher suites
110107

111108
To ensure your IoT devices are TLS 1.2 and [strong cipher suites](#cipher-suites) compliance, you can enforce compliance using minimum TLS enforcement feature in Azure IoT Hub.
112109

113-
Currently this feature is only available in the following regions and during IoT Hub creation (other Azure regions will be supported in 2025):
110+
Currently this feature is only available in the following regions and during IoT Hub creation:
114111

115-
* East US
116-
* South Central US
117-
* West US 2
112+
* Public cloud regions:
118113
* US Gov Arizona
119114
* US Gov Virginia (TLS 1.0/1.1 support isn't available in this region - TLS 1.2 enforcement must be enabled or IoT hub creation fails)
120115

121116
To enable TLS 1.2 and strong cipher suites enforcement in Azure portal:
122117

123-
1. Starting with the IoT Hub create wizard in Azure portal
124-
1. Choose a **Region** from one in the list above.
118+
1. Go to the IoT Hub create wizard in Azure portal.
119+
1. Choose a **Region** from the list of supported regions.
125120
1. Under **Management -> Advanced -> Transport Layer Security (TLS) -> Minimum TLS version**, select **1.2**. This setting only appears for IoT hub created in supported region.
126121

127122
:::image type="content" source="media/iot-hub-tls-12-enforcement.png" alt-text="Screenshot showing how to turn on TLS 1.2 enforcement during IoT hub creation.":::
128123

129124
1. Select **Create**
130-
1. Connect your IoT devices to this IoT Hub
125+
1. Connect your IoT devices to this IoT Hub.
131126

132127
To use ARM template for creation, provision a new IoT Hub in any of the supported regions and set the `minTlsVersion` property to `1.2` in the resource specification:
133128

@@ -154,10 +149,10 @@ To use ARM template for creation, provision a new IoT Hub in any of the supporte
154149
}
155150
```
156151

157-
The created IoT Hub resource using this configuration refuses device and service clients that attempt to connect using TLS versions 1.0 and 1.1. Similarly, the TLS handshake is refused if the `ClientHello` message doesn't list any of the [recommended ciphers](#cipher-suites).
152+
The created IoT hub resource using this configuration refuses device and service clients that attempt to connect using TLS versions 1.0 and 1.1. Similarly, the TLS handshake is refused if the `ClientHello` message doesn't list any of the [recommended ciphers](#cipher-suites).
158153

159154
> [!NOTE]
160-
> Upon failovers, the `minTlsVersion` property of your IoT Hub remains effective in the geo-paired region post-failover.
155+
> Upon failover, the `minTlsVersion` property of your IoT Hub remains effective in the geo-paired region post-failover.
161156
162157
## Checking TLS versions for IoT Hub devices
163158

0 commit comments

Comments
 (0)