Skip to content

Commit d9854f0

Browse files
committed
change paragraph to a note and change wording
1 parent ba562b4 commit d9854f0

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

articles/storage/common/transport-layer-security-configure-minimum-version.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: jimmart-dev
77

88
ms.service: storage
99
ms.topic: how-to
10-
ms.date: 12/29/2022
10+
ms.date: 12/30/2022
1111
ms.author: jammart
1212
ms.reviewer: fryu
1313
ms.subservice: common
@@ -23,12 +23,13 @@ Azure Storage currently supports three versions of the TLS protocol: 1.0, 1.1, a
2323

2424
Azure Storage accounts permit clients to send and receive data with the oldest version of TLS, TLS 1.0, and above. To enforce stricter security measures, you can configure your storage account to require that clients send and receive data with a newer version of TLS. If a storage account requires a minimum version of TLS, then any requests made with an older version will fail.
2525

26-
The cipher suite used when connecting to a storage account is dependent on the TLS version used. It is not possible to configure a storage account to block the use of specific ciphers, other than by requiring a minimum TLS version. If you require the ability to block specific cipher suites, consider [Configuring TLS policy versions and cipher suites on Application Gateway](../../application-gateway/application-gateway-configure-ssl-policy-powershell.md).
27-
2826
This article describes how to use a DRAG (Detection-Remediation-Audit-Governance) framework to continuously manage secure TLS for your storage accounts.
2927

3028
For information about how to specify a particular version of TLS when sending a request from a client application, see [Configure Transport Layer Security (TLS) for a client application](transport-layer-security-configure-client-version.md).
3129

30+
> [!NOTE]
31+
> The cipher suite used when clients send data to and receive data from a storage account is dependent on the TLS version used. It is not possible to configure a storage account to block the use of specific ciphers, other than by requiring a minimum TLS version. If you require the ability to allow only specific cipher suites when connecting to your storage account, consider using Azure Application Gateway. For more information about using Application Gateway for this purpose, see [Configure TLS policy versions and cipher suites on Azure Application Gateway](../../application-gateway/application-gateway-configure-ssl-policy-powershell.md).
32+
3233
## Detect the TLS version used by client applications
3334

3435
When you enforce a minimum TLS version for your storage account, you risk rejecting requests from clients that are sending data with an older version of TLS. To understand how configuring the minimum TLS version may affect client applications, Microsoft recommends that you enable logging for your Azure Storage account and analyze the logs after an interval of time to detect what versions of TLS client applications are using.

0 commit comments

Comments
 (0)