Skip to content

Commit d373160

Browse files
committed
Deleting the TLS choice changes in the public docs
1 parent 686bbb6 commit d373160

12 files changed

+0
-204
lines changed

articles/mariadb/concepts-ssl-connection-security.md

Lines changed: 0 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -20,31 +20,6 @@ Connection strings for various programming languages are shown in the Azure port
2020

2121
To learn how to enable or disable SSL connection when developing application, refer to [How to configure SSL](howto-configure-ssl.md).
2222

23-
## TLS connectivity in Azure Database for MariaDB
24-
25-
Azure Database for MariaDB supports encryption for clients connecting to your database server using Transport Layer Security (TLS). TLS is an industry standard protocol that ensures secure network connections between your database server and client applications, allowing you to adhere to compliance requirements.
26-
27-
### TLS settings
28-
29-
Azure Database for MariaDB provides the ability to enforce the TLS version for the client connections. To use the TLS option, use the **Minimum TLS version** option setting. The following values are allowed for this option setting:
30-
31-
| Minimum TLS Setting | TLS Version supported |
32-
|:---------------------------------|-------------------------------------:|
33-
| TLSEnforcementDisabled (default) | No TLS required |
34-
| TLS1_0 | TLS 1.0, TLS 1.1, TLS 1.2 and higher |
35-
| TLS1_1 | TLS 1.1, TLS 1.2 and higher |
36-
| TLS1_2 | TLS version 1.2 and higher |
37-
38-
39-
For example, setting this Minimum TLS setting version to TLS 1.0 means your server will allow connections from clients using TLS 1.0, 1.1, and 1.2+. Alternatively, setting this to 1.2 means that you only allow connections from clients using TLS 1.2 and all connections with TLS 1.0 and TLS 1.1 will be rejected.
40-
41-
> [!Note]
42-
> Azure Database for MariaDB defaults to TLS being disabled for all new servers.
43-
>
44-
> Currently the TLS versions supported byAzure Database for MariaDB are TLS 1.0, 1.1, and 1.2.
45-
46-
To learn how to set the TLS setting for your Azure Database for MariaDB, refer to [How to configure TLS setting](howto-tls-configurations.md).
47-
4823
## Next steps
4924
- Learn more about [server firewall rules](concepts-firewall-rules.md)
5025
- Learn how to [configure SSL](howto-configure-ssl.md).

articles/mariadb/howto-tls-configurations.md

Lines changed: 0 additions & 43 deletions
This file was deleted.
Binary file not shown.
Binary file not shown.

articles/mysql/concepts-ssl-connection-security.md

Lines changed: 0 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -22,31 +22,6 @@ Connection strings for various programming languages are shown in the Azure port
2222

2323
To learn how to enable or disable SSL connection when developing application, refer to [How to configure SSL](howto-configure-ssl.md).
2424

25-
## TLS connectivity in Azure Database for MySQL
26-
27-
Azure Database for MySQL supports encryption for clients connecting to your database server using Transport Layer Security (TLS). TLS is an industry standard protocol that ensures secure network connections between your database server and client applications, allowing you to adhere to compliance requirements.
28-
29-
### TLS settings
30-
31-
Customers now have the ability to enforce the TLS version for the client connecting to their Azure Database for MySQL. To use the TLS option, use the **Minimum TLS Version** option setting. The following values are allowed for this option setting:
32-
33-
| Minimum TLS Setting | TLS Version supported |
34-
|:---------------------------------|-------------------------------------:|
35-
| TLSEnforcementDisabled (default) | No TLS required |
36-
| TLS1_0 | TLS 1.0, TLS 1.1, TLS 1.2 and higher |
37-
| TLS1_1 | TLS 1.1, TLS 1.2 and higher |
38-
| TLS1_2 | TLS version 1.2 and higher |
39-
40-
41-
For example, setting this minimum TLS setting version to TLS 1.0 means your server will allow connections from clients using TLS 1.0, 1.1, and 1.2+. Alternatively, setting this to 1.2 means that you only allow connections from clients using TLS 1.2 and all connections with TLS 1.0 and TLS 1.1 will be rejected.
42-
43-
> [!Note]
44-
> Azure Database for MySQL defaults to TLS being disabled for all new servers.
45-
>
46-
> Currently the TLS versions supported by Azure Database for MySQL are TLS 1.0, 1.1, and 1.2.
47-
48-
To learn how to set the TLS setting for your Azure Database for MySQL, refer to [How to configure TLS setting](howto-tls-configurations.md).
49-
5025
## Next steps
5126

5227
[Connection libraries for Azure Database for MySQL](concepts-connection-libraries.md)

articles/mysql/howto-tls-configurations.md

Lines changed: 0 additions & 43 deletions
This file was deleted.
Binary file not shown.
Binary file not shown.

articles/postgresql/concepts-ssl-connection-security.md

Lines changed: 0 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -60,31 +60,6 @@ psql "sslmode=verify-full sslrootcert=BaltimoreCyberTrustRoot.crt host=mydemoser
6060
> [!TIP]
6161
> Confirm that the value passed to `sslrootcert` matches the file path for the certificate you saved.
6262
63-
## TLS connectivity in Azure Database for PostgreSQL Single server
64-
65-
Azure Database for PostgreSQL - Single server supports encryption for clients connecting to your database server using Transport Layer Security (TLS). TLS is an industry standard protocol that ensures secure network connections between your database server and client applications, allowing you to adhere to compliance requirements.
66-
67-
### TLS settings
68-
69-
Customers now have the ability to enforce the TLS version for the client connecting to their Azure Database for PostgreSQL Single server. To use the TLS option, use the **Minimum TLS Version** option setting. The following values are allowed for this option setting:
70-
71-
| Minimum TLS Setting | TLS Version supported |
72-
|:---------------------------------|-------------------------------------:|
73-
| TLSEnforcementDisabled (default) | No TLS required |
74-
| TLS1_0 | TLS 1.0, TLS 1.1, TLS 1.2 and higher |
75-
| TLS1_1 | TLS 1.1, TLS 1.2 and higher |
76-
| TLS1_2 | TLS version 1.2 and higher |
77-
78-
79-
For example, setting this Minimum TLS setting version to TLS 1.0 means your server will allow connections from clients using TLS 1.0, 1.1, and 1.2+. Alternatively, setting this to 1.2 means that you only allow connections from clients using TLS 1.2 and all connections with TLS 1.0 and TLS 1.1 will be rejected.
80-
81-
> [!Note]
82-
> Azure Database for PostgreSQL Single server defaults to TLS being disabled for all new servers.
83-
>
84-
> Currently the TLS versions supported byAzure Database for PostgreSQL are TLS 1.0, 1.1, and 1.2.
85-
86-
To learn how to set the TLS setting for your Azure Database for PostgreSQL Single server, refer to [How to configure TLS setting](howto-tls-configurations.md).
87-
8863
## Next steps
8964

9065
Review various application connectivity options in [Connection libraries for Azure Database for PostgreSQL](concepts-connection-libraries.md).

articles/postgresql/howto-tls-configurations.md

Lines changed: 0 additions & 43 deletions
This file was deleted.

0 commit comments

Comments
 (0)