You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: 'About TLS encryption with Azure Front Door'
3
-
description: Learn about TLS encryption when using Azure Front Door.
2
+
title: TLS encryption with Azure Front Door
3
+
description: Learn about end-to-end TLS encryption, supported TLS versions, and supported cipher suites with Azure Front Door.
4
4
author: halkazwini
5
5
ms.author: halkazwini
6
6
ms.service: azure-frontdoor
7
7
ms.topic: concept-article
8
-
ms.date: 03/15/2024
8
+
ms.date: 03/18/2025
9
9
zone_pivot_groups: front-door-tiers
10
10
---
11
11
12
12
# About TLS encryption with Azure Front Door
13
13
14
-
> [!IMPORTANT]
15
-
> Support for TLS 1.0 and 1.1 will be discontinued on March 1, 2025.
16
-
17
14
Transport Layer Security (TLS), previously known as Secure Sockets Layer (SSL), is the standard security technology for establishing an encrypted link between a web server and a client, like a web browser. This link ensures that all data passed between the server and the client remain private and encrypted.
18
15
19
16
To meet your security or compliance requirements, Azure Front Door supports end-to-end TLS encryption. Front Door TLS/SSL offload terminates the TLS connection, decrypts the traffic at the Azure Front Door, and re-encrypts the traffic before forwarding it to the origin. When connections to the origin use the origin's public IP address, it's a good security practice to configure HTTPS as the forwarding protocol on your Azure Front Door. By using HTTPS as the forwarding protocol, you can enforce end-to-end TLS encryption for the entire processing of the request from the client to the origin. TLS/SSL offload is also supported if you deploy a private origin with Azure Front Door Premium using the [Private Link](private-link.md) feature.
@@ -32,15 +29,16 @@ Azure Front Door offloads the TLS sessions at the edge and decrypts client reque
32
29
33
30
## Supported TLS versions
34
31
35
-
Azure Front Door currently supports four versions of the TLS protocol: TLS versions 1.0, 1.1, 1.2 and 1.3. All Azure Front Door profiles created after September 2019 use TLS 1.2 as the default minimum with TLS 1.3 enabled, but TLS 1.0 and TLS 1.1 are still supported for backward compatibility. Support for TLS 1.0 and 1.1 will be discontinued on March 1, 2025.
32
+
Azure Front Door supports two versions of the TLS protocol: TLS versions 1.2 and 1.3. All Azure Front Door profiles created after September 2019 use TLS 1.2 as the default minimum with TLS 1.3 enabled, with support for TLS 1.0 and TLS 1.1 for backward compatibility. Currently, Azure Front Door doesn't support client/mutual authentication (mTLS).
36
33
37
-
Although Azure Front Door supports TLS 1.2, which introduced client/mutual authentication in RFC 5246, currently, Azure Front Door doesn't support client/mutual authentication (mTLS) yet.
34
+
> [!IMPORTANT]
35
+
> As of March 1, 2025, TLS 1.0 and 1.1 are disallowed on Azure Front Door. If you didn't disable TLS 1.0 and 1.1 on legacy settings before this date, they'll still work temporarily but will be disabled in the future.
38
36
39
-
You can configure the minimum TLS version in Azure Front Door in the custom domain HTTPS settings using the Azure portal or the [Azure REST API](/rest/api/frontdoorservice/frontdoor/frontdoors/createorupdate#minimumtlsversion). Currently, you can choose between 1.0 and 1.2. As such, specifying TLS 1.2 as the minimum version controls the minimum acceptable TLS version Azure Front Door will accept from a client. For minimum TLS version 1.2 the negotiation will attempt to establish TLS 1.3 and then TLS 1.2, while for minimum TLS version 1.0 all four versions will be attempted. When Azure Front Door initiates TLS traffic to the origin, it will attempt to negotiate the best TLS version that the origin can reliably and consistently accept. Supported TLS versions for origin connections are TLS 1.0, TLS 1.1, TLS 1.2 and TLS 1.3. Support for TLS 1.0 and 1.1 will be discontinued on March 1, 2025.
37
+
You can configure the minimum TLS version in Azure Front Door in the custom domain HTTPS settings using the Azure portal or the [Azure REST API](/rest/api/frontdoorservice/frontdoor/frontdoors/createorupdate#minimumtlsversion). For a minimum TLS version 1.2, the negotiation will attempt to establish TLS 1.3 and then TLS 1.2. When Azure Front Door initiates TLS traffic to the origin, it will attempt to negotiate the best TLS version that the origin can reliably and consistently accept. Supported TLS versions for origin connections are TLS 1.2 and TLS 1.3.
40
38
41
39
> [!NOTE]
42
-
> * Clients with TLS 1.3 enabled are required to support one of the Microsoft SDL compliant EC Curves, including Secp384r1, Secp256r1, and Secp521, in order to successfully make requests with Azure Front Door using TLS 1.3.
43
-
> * It is recommended that clients use one of these curves as their preferred curve during requests to avoid increased TLS handshake latency, which may result from multiple round trips to negotiate the supported EC curve.
40
+
> - Clients with TLS 1.3 enabled are required to support one of the Microsoft SDL compliant EC Curves, including Secp384r1, Secp256r1, and Secp521, in order to successfully make requests with Azure Front Door using TLS 1.3.
41
+
> - It is recommended that clients use one of these curves as their preferred curve during requests to avoid increased TLS handshake latency, which may result from multiple round trips to negotiate the supported EC curve.
44
42
45
43
## Supported certificates
46
44
@@ -54,12 +52,12 @@ OCSP stapling is supported by default in Azure Front Door and no configuration i
54
52
55
53
## <aname="backend-tls-connection-azure-front-door-to-origin"></a> Origin TLS connection (Azure Front Door to origin)
56
54
57
-
For HTTPS connections, Azure Front Door expects that your origin presents a certificate from a valid certificate authority (CA) with a subject name matching the origin *hostname*. As an example, if your origin hostname is set to `myapp-centralus.contosonews.net` and the certificate that your origin presents during the TLS handshake doesn't have `myapp-centralus.contosonews.net` or `*.contosonews.net` in the subject name, then Azure Front Door refuses the connection and the client sees an error.
55
+
For HTTPS connections, Azure Front Door expects that your origin presents a certificate from a valid certificate authority (CA) with a subject name matching the origin *hostname*. As an example, if your origin hostname is set to `myapp-centralus.contoso.net` and the certificate that your origin presents during the TLS handshake doesn't have `myapp-centralus.contoso.net` or `*.contoso.net` in the subject name, then Azure Front Door refuses the connection and the client sees an error.
58
56
59
57
> [!NOTE]
60
-
> The certificate must have a complete certificate chain with leaf and intermediate certificates. The root CA must be part of the [Microsoft Trusted CA List](https://ccadb-public.secure.force.com/microsoft/IncludedCACertificateReportForMSFT). If a certificate without complete chain is presented, the requests which involve that certificate are not guaranteed to work as expected.
58
+
> The certificate must have a complete certificate chain with leaf and intermediate certificates. The root CA must be part of the [Microsoft Trusted CA List](https://ccadb.my.salesforce-sites.com/microsoft/IncludedCACertificateReportForMSFT). If a certificate without complete chain is presented, the requests which involve that certificate are not guaranteed to work as expected.
61
59
62
-
In certain use cases such as for testing, as a workaround to resolve failing HTTPS connection, you can disable certificate subject name check for your Azure Front Door. Note that the origin still needs to present a certificate with a valid trusted chain, but doesn't have to match the origin host name.
60
+
In certain use cases, such as testing, you can disable certificate subject name checks for your Azure Front Door as a workaround for resolving failing HTTPS connections. Note that the origin must still present a certificate with a valid, trusted chain, but it doesn't need to match the origin hostname.
63
61
64
62
::: zone pivot="front-door-standard-premium"
65
63
@@ -100,64 +98,45 @@ For the Azure Front Door managed certificate option, the certificates are manage
100
98
101
99
For your own custom TLS/SSL certificate:
102
100
103
-
1.You set the secret version to 'Latest' for the certificate to be automatically rotated to the latest version when a newer version of the certificate is available in your key vault. For custom certificates, the certificate gets auto-rotated within 3-4 days with a newer version of certificate, no matter what the certificate expired time is.
101
+
1.Set the secret version to 'Latest' for the certificate to be automatically rotated to the latest version when a newer version of the certificate is available in your key vault. For custom certificates, the certificate gets auto-rotated within 3-4 days with a newer version of certificate, no matter what the certificate expired time is.
104
102
105
-
1. If a specific version is selected, autorotation isn’t supported. You've will have to reselect the new version manually to rotate certificate. It takes up to 24 hours for the new version of the certificate/secret to be deployed.
103
+
1. If a specific version is selected, autorotation isn’t supported. You'll have to reselect the new version manually to rotate certificate. It takes up to 24 hours for the new version of the certificate/secret to be deployed.
106
104
107
105
> [!NOTE]
108
106
> Azure Front Door (Standard and Premium) managed certificates are automatically rotated if the domain CNAME record points directly to a Front Door endpoint or points indirectly to a Traffic Manager endpoint. Otherwise, you need to re-validate the domain ownership to rotate the certificates.
109
107
110
-
You'll need to ensure that the service principal for Front Door has access to the key vault. Refer to how to grant access to your key vault. The updated certificate rollout operation by Azure Front Door won't cause any production downtime, as long as the subject name or subject alternate name (SAN) for the certificate hasn't changed.
108
+
The service principal for Front Door must have access to the key vault. The updated certificate rollout operation by Azure Front Door won't cause any production downtime, as long as the subject name or subject alternate name (SAN) for the certificate hasn't changed.
111
109
112
110
## Supported cipher suites
113
111
114
112
For TLS 1.2/1.3 the following cipher suites are supported:
115
-
* TLS_AES_256_GCM_SHA384 (TLS 1.3 only)
116
-
* TLS_AES_128_GCM_SHA256 (TLS 1.3 only)
117
-
* TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
118
-
* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
119
-
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
120
-
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
121
-
* TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
122
-
* TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
123
113
124
-
> [!NOTE]
125
-
> For Windows 10 and later versions, we recommend enabling one or both of the ECDHE_GCM cipher suites for better security. Windows 8.1, 8, and 7 aren't compatible with these ECDHE_GCM cipher suites. The ECDHE_CBC and DHE cipher suites have been provided for compatibility with those operating systems.
126
-
127
-
When using custom domains with TLS 1.0 and 1.1 enabled, the following cipher suites are supported:
128
-
129
-
* TLS_AES_256_GCM_SHA384 (TLS 1.3 only)
130
-
* TLS_AES_128_GCM_SHA256 (TLS 1.3 only)
131
-
* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
132
-
* TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
133
-
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
134
-
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
135
-
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
136
-
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
137
-
* TLS_RSA_WITH_AES_256_GCM_SHA384
138
-
* TLS_RSA_WITH_AES_128_GCM_SHA256
139
-
* TLS_RSA_WITH_AES_256_CBC_SHA256
140
-
* TLS_RSA_WITH_AES_128_CBC_SHA256
141
-
* TLS_RSA_WITH_AES_256_CBC_SHA
142
-
* TLS_RSA_WITH_AES_128_CBC_SHA
143
-
* TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
144
-
* TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
114
+
- TLS_AES_256_GCM_SHA384 (TLS 1.3 only)
115
+
- TLS_AES_128_GCM_SHA256 (TLS 1.3 only)
116
+
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
117
+
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
118
+
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
119
+
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
120
+
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
121
+
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
145
122
146
123
Azure Front Door doesn’t support disabling or configuring specific cipher suites for your profile.
147
124
148
-
## Next steps
125
+
> [!NOTE]
126
+
> For Windows 10 and later versions, we recommend enabling one or both of the ECDHE_GCM cipher suites for better security. Windows 8.1, 8, and 7 aren't compatible with these ECDHE_GCM cipher suites. The ECDHE_CBC and DHE cipher suites have been provided for compatibility with those operating systems.
127
+
128
+
## Related content
149
129
150
130
::: zone pivot="front-door-standard-premium"
151
131
152
-
*[Understand custom domains](domain.md) on Azure Front Door.
153
-
*[Configure a custom domain](standard-premium/how-to-add-custom-domain.md) on Azure Front Door using the Azure portal.
154
-
* Learn about [End-to-end TLS with Azure Front Door](end-to-end-tls.md).
132
+
-[Domains in Azure Front Door](domain.md)
133
+
-[Configure a custom domain on Azure Front Door](standard-premium/how-to-add-custom-domain.md)
155
134
156
135
::: zone-end
157
136
158
137
::: zone pivot="front-door-classic"
159
138
160
-
*[Configure a custom domain](front-door-custom-domain.md)for Azure Front Door.
161
-
*[Enable HTTPS for a custom domain](front-door-custom-domain-https.md).
139
+
-[Configure a custom domain for Azure Front Door (classic)](front-door-custom-domain.md)
140
+
-[Configure HTTPS on an Azure Front Door (classic) custom domain](front-door-custom-domain-https.md)
0 commit comments