You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/app-service-web-configure-tls-mutual-auth.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -109,7 +109,7 @@ In the following screenshot, any path for your app that starts with `/public` do
109
109
![Certificate Exclusion Paths][exclusion-paths]
110
110
111
111
## Client certificate and TLS renegotiation
112
-
App Service requires TLS renegotiation to read a request before knowing whether to prompt for a client certificate. Any of the following settings triggers TLS renegotiation:
112
+
For some client certificate settings, App Service requires TLS renegotiation to read a request before knowing whether to prompt for a client certificate. Any of the following settings triggers TLS renegotiation:
113
113
1. Using "Optional Interactive User" client certificate mode.
114
114
1. Using [client certificate exclusion path](#exclude-paths-from-requiring-authentication).
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/cache-best-practices-kubernetes.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,11 +24,11 @@ A pod running the client application can be affected by other pods running on th
24
24
25
25
## Linux-hosted client applications and TCP settings
26
26
27
-
If your Azure Managed Redis (preview) client application runs on a Linux-based container, we recommend updating some TCP settings. These settings are detailed in [TCP settings for Linux-hosted client applications](cache-best-practices-connection.md#tcp-settings-for-linux-hosted-client-applications).
27
+
If your Azure Cache for Redis client application runs on a Linux-based container, we recommend updating some TCP settings. These settings are detailed in [TCP settings for Linux-hosted client applications](cache-best-practices-connection.md#tcp-settings-for-linux-hosted-client-applications).
28
28
29
29
## Potential connection collision with _Istio/Envoy_
30
30
31
-
Currently, Azure Managed Redis (preview) uses ports 15xxx for clustered caches to expose cluster nodes to client applications. As documented [here](https://istio.io/latest/docs/ops/deployment/application-requirements/#ports-used-by-istio), the same ports are also used by _Istio.io_ sidecar proxy called _Envoy_ and could interfere with creating connections, especially on port 15001 and 15006.
31
+
<!--Currently, Azure Cache for Redis uses ports 15xxx for clustered caches to expose cluster nodes to client applications. As documented [here](https://istio.io/latest/docs/ops/deployment/application-requirements/#ports-used-by-istio), the same ports are also used by _Istio.io_ sidecar proxy called _Envoy_ and could interfere with creating connections, especially on port 15001 and 15006.-->
32
32
33
33
When using _Istio_ with an Azure Managed Redis cluster, consider excluding the potential collision ports with an [istio annotation](https://istio.io/latest/docs/reference/config/annotations/).
34
34
@@ -40,7 +40,7 @@ annotations:
40
40
To avoid connection interference, we recommend:
41
41
42
42
- Consider using a nonclustered cache or an Enterprise tier cache instead
@@ -23,20 +22,20 @@ TLS versions 1.0 and 1.1 also don't support the modern encryption methods and ci
23
22
>
24
23
25
24
> [!IMPORTANT]
26
-
> The TLS 1.0/1.1 retirement content in this article does not apply to Azure Cache for Redis Enterprise/Enterprise Flash because the Enterprise tiers only support TLS 1.2.
27
-
>
25
+
> The TLS 1.0/1.1 retirement content in this article does not apply to Azure Cache for Redis Enterprise/Enterprise Flash because the Enterprise tiers only support TLS 1.2 or newer.
28
26
29
27
As a part of this effort, you can expect the following changes to Azure Cache for Redis:
30
28
31
29
-_Phase 1_: Azure Cache for Redis stops offering TLS 1.0/1.1 as an option for _MinimumTLSVersion_ setting for new cache creates. Existing cache instances won't be updated at this point. You can't set the _MinimumTLSVersion_ to 1.0 or 1.1 for your existing cache.
32
30
-_Phase 2_: Azure Cache for Redis stops supporting TLS 1.1 and TLS 1.0 starting March 1, 2025. After this change, your application must use TLS 1.2 or later to communicate with your cache. The Azure Cache for Redis service remains available while we update the _MinimumTLSVersion_ for all caches to 1.2.
| September 2023 | TLS 1.0/1.1 retirement announcement |
37
-
| March 1, 2024 | Beginning March 1, 2024, you can't create new caches with the Minimum TLS version set to 1.0 or 1.1 and you can't set the _MinimumTLSVersion_ to 1.0 or 1.1 for your existing cache. The minimum TLS version won't be updated automatically for existing caches at this point. |
38
-
| October 31, 2024 | Ensure that all your applications are connecting to Azure Cache for Redis using TLS 1.2 and Minimum TLS version on your cache settings is set to 1.2. |
39
-
| Starting March 1, 2025 | Minimum TLS version for all cache instances is updated to 1.2. This means Azure Cache for Redis instances reject connections using TLS 1.0 or 1.1 at this point. |
32
+
33
+
| Date | Description |
34
+
|--|--|
35
+
| September 2023 | TLS 1.0/1.1 retirement announcement |
36
+
| March 1, 2024 | Beginning March 1, 2024, you can't create new caches with the Minimum TLS version set to 1.0 or 1.1 and you can't set the _MinimumTLSVersion_ to 1.0 or 1.1 for your existing cache. The minimum TLS version aren't updated automatically for existing caches at this point. |
37
+
| October 31, 2024 | Ensure that all your applications are connecting to Azure Cache for Redis using TLS 1.2 and Minimum TLS version on your cache settings is set to 1.2. |
38
+
| Starting March 1, 2025 | Minimum TLS version for all cache instances is updated to 1.2. This means Azure Cache for Redis instances reject connections using TLS 1.0 or 1.1 at this point. |
40
39
41
40
> [!IMPORTANT]
42
41
> The content in this article does not apply to Azure Cache for Redis Enterprise/Enterprise Flash because the Enterprise tiers only support TLS 1.2.
@@ -49,30 +48,107 @@ As part of this change, Azure Cache for Redis removes support for older cipher s
49
48
50
49
The following sections provide guidance about how to detect dependencies on these earlier TLS versions and remove them from your application.
51
50
52
-
### Check whether your application is already compliant
51
+
## Check TLS versions supported by your Azure Cache for Redis
52
+
53
+
You can use this PowerShell script to verify the TLS versions supported by your Azure Cache for Redis endpoint. If your Redis instance is virtual network (VNet) injected, you have to run this script from a Virtual Machine in your VNet that has access to the Azure Cache for Redis endpoint.
54
+
55
+
If the result shows `Tls Enabled` and/or `Tls 11 Enabled`, then ensure you follow the instructions to [Configure your Azure Cache for Redis to use TLS 1.2](#configure-your-azure-cache-for-redis-to-use-tls-12). If the result shows only `Tls12 Enabled` and your client application is able to connect without any errors, then no action is needed.
## Configure your Azure Cache for Redis to use TLS 1.2
108
+
109
+
You can configure TLS 1.2 on the cache by setting the **Minimum TLS version** value to TLS 1.2 in the [Advanced settings](cache-configure.md#advanced-settings) of your cache in the Azure portal.
110
+
111
+
1. To configure your cache to use TLS 1.2, first select **Advanced settings** from the Resource menu of your cache.
112
+
113
+
1. Select **1.2** in the **Minimum TLS version** in the working pane. Then, select **Save**.
114
+
115
+
:::image type="content" source="media/cache-remove-tls-10-11/change-redis-tls-version.png" alt-text="Screenshot showing the Set TLS 1.2 for cache on Azure portal":::
53
116
54
-
You can find out whether your application works with TLS 1.2 by setting the **Minimum TLS version** value to TLS 1.2 on a test or staging cache, then running tests. The **Minimum TLS version** setting is in the [Advanced settings](cache-configure.md#advanced-settings) of your cache instance in the Azure portal. If the application continues to function as expected after this change, then your app is using TLS 1.2 or newer.
117
+
You can also do the same using PowerShell. You need the Az.RedisCache module already installed before running the command.
55
118
56
-
### Configure your application to use TLS 1.2 or later
For setting the TLS version through CLI, the `--minimum-tls-version` is available only at Redis creation time and changing `minimum-tls-version` on an existing Redis instance isn't supported.
124
+
125
+
> [!NOTE]
126
+
> The Azure Cache for Redis service should be available during the migration TLS 1.2 or later.
127
+
128
+
## Check whether your client application is already compliant
57
129
58
-
Most applications use Redis client libraries to handle communication with their caches. Here are instructions for configuring some of the popular client libraries, in various programming languages and frameworks, to useTLS 1.2 or later.
130
+
You can find out whether your application works with TLS 1.2 by setting the **Minimum TLS version** value to TLS 1.2 as explained earlier, on a test or staging cache and then running tests. If the application continues to function as expected after this change, it's probably compliant. It's possible you might need to [configure the Redis client library](#configure-your-client-application-to-use-tls-12) used by your application to specifically enable TLS 1.2 to connect to Azure Cache for Redis.
59
131
60
-
#### .NET
132
+
## Configure your client application to use TLS 1.2
133
+
134
+
Most applications use Redis client libraries to handle communication with their caches. Here are instructions for configuring some of the popular client libraries, in various programming languages and frameworks, to use TLS 1.2.
135
+
136
+
### .NET
61
137
62
138
Redis .NET clients use the earliest TLS version by default on .NET Framework 4.5.2 or earlier, and use the latest TLS version on .NET Framework 4.6 or later. If you're using an older version of .NET Framework, enable TLS 1.2 manually:
63
139
64
140
-_StackExchange.Redis_: Set `ssl=true` and `sslProtocols=tls12` in the connection string.
65
141
-_ServiceStack.Redis_: Follow the [ServiceStack.Redis](https://github.com/ServiceStack/ServiceStack.Redis#servicestackredis-ssl-support) instructions and requires ServiceStack.Redis v5.6 at a minimum.
66
142
67
-
####.NET Core
143
+
### .NET Core
68
144
69
145
Redis .NET Core clients default to the OS default TLS version, which depends on the OS itself.
70
146
71
147
Depending on the OS version and any patches that were applied, the effective default TLS version can vary. For more information, see [Transport Layer Security (TLS) best practices with the .NET Framework](/dotnet/framework/network-programming/tls).
72
148
73
149
However, if you're using an old OS or just want to be sure, we recommend configuring the preferred TLS version manually through the client.
74
150
75
-
####Java
151
+
### Java
76
152
77
153
Redis Java clients use TLS 1.0 on Java version 6 or earlier. Jedis, Lettuce, and Redisson can't connect to Azure Cache for Redis if TLS 1.0 is disabled on the cache. Upgrade your Java framework to use new TLS versions.
78
154
@@ -98,31 +174,32 @@ In Java 8, TLS 1.2 is used by default and shouldn't require updates to your clie
98
174
99
175
As of Java 17, TLS 1.3 is used by default.
100
176
101
-
####Node.js
177
+
### Node.js
102
178
103
179
Node Redis and ioredis both support TLS 1.2 and 1.3.
104
180
105
-
####PHP
181
+
### PHP
106
182
107
-
-Versions earlier than PHP 7: Predis supports only TLS 1.0. These versions don't work with TLS 1.2; you must upgrade to use TLS 1.2.
183
+
Versions earlier than PHP 7: Predis supports only TLS 1.0. These versions don't work with TLS 1.2; you must upgrade to use TLS 1.2.
108
184
109
-
-PHP 7.0 to PHP 7.2.1: Predis uses only TLS 1.0 or 1.1 by default. You can use the following workaround to use TLS 1.2. Specify TLS 1.2 when you create the client instance:
185
+
PHP 7.0 to PHP 7.2.1: Predis uses only TLS 1.0 or 1.1 by default. You can use the following workaround to use TLS 1.2. Specify TLS 1.2 when you create the client instance:
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/managed-redis/managed-redis-best-practices-kubernetes.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ A pod running the client application can be affected by other pods running on th
26
26
27
27
## Linux-hosted client applications and TCP settings
28
28
29
-
If your Azure Managed Redis (preview) client application runs on a Linux-based container, we recommend updating some TCP settings. These settings are detailed in [TCP settings for Linux-hosted client applications](managed-redis-best-practices-connection.md#tcp-settings-for-linux-hosted-client-applications).
29
+
If your Azure Managed Redis (preview) client application runs on a Linux-based container, we recommend updating some TCP settings. These settings are detailed in [TCP settings for Linux-hosted client applications](managed-redis-best-practices-connection.md#tcp-settings-for-linux-hosted-client-applications).
0 commit comments