You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cosmos-db/database-security.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,7 +72,7 @@ Let's dig into each one in detail.
72
72
|Respond to attacks|Once you have contacted Azure support to report a potential attack, a five-step incident response process is kicked off. The goal of the five-step process is to restore normal service security and operations. The five-step process restores services as quickly as possible after an issue is detected and an investigation is started.<br><br>Learn more in [Microsoft Azure Security Response in the Cloud](https://azure.microsoft.com/resources/shared-responsibilities-for-cloud-computing/).|
73
73
|Geo-fencing|Azure Cosmos DB ensures data governance for sovereign regions (for example, Germany, China, US Gov).|
74
74
|Protected facilities|Data in Azure Cosmos DB is stored on SSDs in Azure's protected data centers.<br><br>Learn more in [Microsoft global datacenters](https://www.microsoft.com/en-us/cloud-platform/global-datacenters)|
75
-
|HTTPS/SSL/TLS encryption|All connections to Azure Cosmos DB support HTTPS. Azure Cosmos DB supports TLS levels up to 1.3 (included).<br>It's possible to enforce a minimum TLS level server-side. To do so, open an [Azure support ticket](https://azure.microsoft.com/support/options/).|
75
+
|HTTPS/SSL/TLS encryption|All connections to Azure Cosmos DB support HTTPS. Azure Cosmos DB supports TLS levels up to 1.2 (included).<br>It's possible to enforce a minimum TLS level on server-side. To do so, refer to self service guide [Self-serve minimum TLS version enforcement in Azure Cosmos DB](./self-serve-minimum-tls-enforcement.md).|
76
76
|Encryption at rest|All data stored into Azure Cosmos DB is encrypted at rest. Learn more in [Azure Cosmos DB encryption at rest](./database-encryption-at-rest.md)|
77
77
|Patched servers|As a managed database, Azure Cosmos DB eliminates the need to manage and patch servers, that's done for you, automatically.|
78
78
|Administrative accounts with strong passwords|It's hard to believe we even need to mention this requirement, but unlike some of our competitors, it's impossible to have an administrative account with no password in Azure Cosmos DB.<br><br> Security via TLS and HMAC secret based authentication is baked in by default.|
Copy file name to clipboardExpand all lines: articles/cosmos-db/self-serve-minimum-tls-enforcement.md
+59-6Lines changed: 59 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ This article discusses how to enforce a minimum version of the TLS protocol for
19
19
20
20
Because of the multi-tenant nature of Cosmos DB, the service is required to meet the access and security needs of every user. To achieve this, **Cosmos DB enforces minimum TLS protocols at the application layer**, and not lower layers in the network stack where TLS operates. This enforcement occurs on any authenticated request to a specific database account, according to the settings set on that account by the customer.
21
21
22
-
The **minimum service-wide accepted version is TLS 1.0**. This can be changed on a per account basis, as discussed in the following section.
22
+
The **minimum service-wide accepted version is TLS 1.0**. This selection can be changed on a per account basis, as discussed in the following section.
23
23
24
24
## How to set the minimum TLS version for my Cosmos DB database account
25
25
@@ -33,9 +33,62 @@ The **default value for new and existing accounts is `Tls`**.
33
33
> [!IMPORTANT]
34
34
> Staring on April 1st, 2023, the **default value for new accounts will be switched to `Tls12`**.
35
35
36
+
### Set Minimal TLS Protocol in Azure Cosmos DB using the Portal
37
+
38
+
This self-serve feature is available in the Portal while creating and editing an account. Azure Cosmos DB Accounts enforce the TLS 1.2 protocol. However, Azure Cosmos DB also supports the following TLS protocols depending on the API kind selected.
39
+
40
+
-**MongoDB:** TLS 1.2
41
+
42
+
-**Cassandra:** TLS 1.2
43
+
44
+
-**Table, SQL and Graph:** TLS 1.0, TLS 1.1 and TLS 1.2
45
+
46
+
47
+
48
+
### Steps to set Minimal TLS Protocol while creating an account
49
+
50
+
If you're using an API Kind that only supports TLS 1.2, you'll notice in the Networking tab at the bottom the TLS protocol disabled.
51
+
52
+
:::image type="content" source="media/self-serve-minimum-tls-enforcement/tls-create-account.png" alt-text="Screenshot of API Kind that only supports TLS 1.2.":::
53
+
54
+
55
+
56
+
If you're using an API Kind that accepts multiple TLS protocols, then you can navigate to the Networking tab and the Minimum Transport Layer Security Protocol option is available. You can change the selected protocol by just clicking on the dropdown and selecting the desired protocol.
57
+
58
+
:::image type="content" source="media/self-serve-minimum-tls-enforcement/tls-select-account.png" alt-text="Screenshot of API Kind that accepts multiple TLS protocols.":::
59
+
60
+
61
+
After setting up your account, you can review in the Review + create tab, at the bottom inside the Networking section, that the selected TLS Protocol is set as you specified.
62
+
63
+
:::image type="content" source="media/self-serve-minimum-tls-enforcement/summary.png" alt-text="Screenshot of selected TLS Protocol is set as you specified.":::
64
+
65
+
66
+
### Steps to set the Minimal TLS Protocol while editing an account
67
+
68
+
1. Navigate to your Azure Cosmos DB account on the Azure portal.
69
+
70
+
2. Select Networking from the left menu, then select the Connectivity tab.
71
+
72
+
3. You'll find the Minimum Transport Layer Security Protocol option. If you're using an API Kind that only supports TLS 1.2, you'll notice this option disabled. Otherwise, you'll be able to select the desired TLS Protocol by just clicking on it.
73
+
74
+
75
+
:::image type="content" source="media/self-serve-minimum-tls-enforcement/edit.png" alt-text="Screenshot of minimum transport layer security protocol option.":::
76
+
77
+
78
+
4. Click Save once you changed the TLS protocol.
79
+
80
+
:::image type="content" source="media/self-serve-minimum-tls-enforcement/save.png" alt-text="Screenshot of save after change.":::
81
+
82
+
83
+
5. Once it is saved, you'll receive a success notification. Still, this change can take up to 15 minutes to take effect after the configuration update is completed.
84
+
85
+
:::image type="content" source="media/self-serve-minimum-tls-enforcement/notification-success.png" alt-text="Screenshot of success notification.":::
86
+
87
+
88
+
36
89
### Set via Azure CLI
37
90
38
-
To set using Azure CLI, use the command below:
91
+
To set using Azure CLI, use the command:
39
92
40
93
```azurecli-interactive
41
94
subId=$(az account show --query id -o tsv)
@@ -47,7 +100,7 @@ az rest --uri "/subscriptions/$subId/resourceGroups/$rg/providers/Microsoft.Docu
47
100
48
101
### Set via Azure PowerShell
49
102
50
-
To set using Azure PowerShell, use the command below:
To set this property using an ARM template, update your existing template or export a new template for your current deployment, then add `"minimalTlsVersion"` to the properties for the `databaseAccounts` resources, with the desired minimum TLS version value. Below is a basic example of an Azure Resource Manager template with this property setting, using a parameter.
123
+
To set this property using an ARM template, update your existing template or export a new template for your current deployment, then add `"minimalTlsVersion"` to the properties for the `databaseAccounts` resources, with the desired minimum TLS version value. Provided here is a basic example of an Azure Resource Manager template with this property setting, using a parameter.
71
124
72
125
```json
73
126
{
@@ -115,7 +168,7 @@ You can also get the current value of the `minimalTlsVersion` property by using
115
168
116
169
### Get current value via Azure CLI
117
170
118
-
To get the current value of the property using Azure CLI, run the command below:
171
+
To get the current value of the property using Azure CLI, run the command:
119
172
120
173
```azurecli-interactive
121
174
subId=$(az account show --query id -o tsv)
@@ -126,7 +179,7 @@ az rest --uri "/subscriptions/$subId/resourceGroups/$rg/providers/Microsoft.Docu
126
179
127
180
### Get current value via Azure PowerShell
128
181
129
-
To get the current value of the property using Azure PowerShell, run the command below:
182
+
To get the current value of the property using Azure PowerShell, run the command:
0 commit comments