Skip to content

Commit e2ec864

Browse files
committed
Update from PR review
1 parent c222bb1 commit e2ec864

File tree

1 file changed

+0
-5
lines changed

1 file changed

+0
-5
lines changed

articles/frontdoor/end-to-end-tls.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -132,11 +132,6 @@ When using custom domains with TLS 1.0 and 1.1 enabled, the following cipher sui
132132
* TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (see note)
133133
* TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (see note)
134134

135-
> [!IMPORTANT]
136-
> As a part of our ongoing platform improvement processes, we will deprecate the weak DHE ciphers, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 and TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, by the end of June 2023.
137-
>
138-
> If your clients experience TLS handshake issues, consider temporarily allowing legacy TLS versions (TLS 1.0 and TLS 1.1) in your Azure Front Door profile, until your clients are able to support the more secure TLS 1.2 cipher suites.
139-
140135
Azure Front Door doesn’t support disabling or configuring specific cipher suites for your profile.
141136

142137
## Next steps

0 commit comments

Comments
 (0)