Skip to content

Commit ef487af

Browse files
authored
public repo edits
1 parent 9bf23be commit ef487af

File tree

1 file changed

+20
-19
lines changed

1 file changed

+20
-19
lines changed

articles/azure-cache-for-redis/cache-remove-tls-10-11.md

Lines changed: 20 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,7 @@ There's an industry-wide push toward the exclusive use of Transport Layer Securi
1616

1717
As a part of this effort, we'll be making the following changes to Azure Cache for Redis:
1818

19-
* **Phase 1:** We'll configure the default minimum TLS version to be 1.2 for newly created cache instances
20-
(This used to be TLS 1.0). Existing cache instances won't be updated at this point. You'll be allowed to [change the minimum TLS version](cache-configure.md#access-ports) back to 1.0 or 1.1 for backward compatibility, if needed. This change can be done through the Azure portal or other management APIs.
19+
* **Phase 1:** We'll configure the default minimum TLS version to be 1.2 for newly created cache instances. (This used to be TLS 1.0). Existing cache instances won't be updated at this point. You'll be allowed to [change the minimum TLS version](cache-configure.md#access-ports) back to 1.0 or 1.1 for backward compatibility, if needed. This change can be done through the Azure portal or other management APIs.
2120
* **Phase 2:** We'll stop supporting TLS versions 1.0 and 1.1. After this change, your application will be required to use TLS 1.2 or later to communicate with your cache.
2221

2322
Additionally, as a part of this change, we'll be removing support for older, insecure cypher suites. Our supported cypher suites will be restricted to the following when the cache is configured with a minimum TLS version of 1.2.
@@ -84,27 +83,29 @@ In Java 8, TLS 1.2 is used by default and shouldn't require updates to your clie
8483
Node Redis and IORedis use TLS 1.2 by default.
8584

8685
### PHP
86+
8787
#### Predis
88-
For versions less than PHP 7 Predis supports only TLS 1.0. These do not work with TLS 1.2, you need to upgrade.
8988

90-
PHP 7.0 to PHP 7.2.1: Predis uses only TLS 1.0 or 1.1 by default. You can use the workaround below to use TLS 1.2.
91-
Specify TLS 1.2 when you create the client instance:
92-
93-
``` PHP
94-
$redis=newPredis\Client([
95-
'scheme'=>'tls',
96-
'host'=>'host',
97-
'port'=>6380,
98-
'password'=>'password',
99-
'ssl'=>[
100-
'crypto_type'=>STREAM_CRYPTO_METHOD_TLSv1_2_CLIENT,
101-
],
102-
]);
103-
```
104-
105-
On PHP 7.3 or above, Predis uses the latest TLS version.
89+
* Versions earlier than PHP 7: Predis supports only TLS 1.0. These versions don't work with TLS 1.2; you must upgrade to use TLS 1.2.
90+
91+
* PHP 7.0 to PHP 7.2.1: Predis uses only TLS 1.0 or 1.1 by default. You can use the following workaround to use TLS 1.2. Specify TLS 1.2 when you create the client instance:
92+
93+
``` PHP
94+
$redis=newPredis\Client([
95+
'scheme'=>'tls',
96+
'host'=>'host',
97+
'port'=>6380,
98+
'password'=>'password',
99+
'ssl'=>[
100+
'crypto_type'=>STREAM_CRYPTO_METHOD_TLSv1_2_CLIENT,
101+
],
102+
]);
103+
```
104+
105+
* PHP 7.3 and later versions: Predis uses the latest TLS version.
106106

107107
#### PhpRedis
108+
108109
PhpRedis doesn't support TLS on any PHP version.
109110

110111
### Python

0 commit comments

Comments
 (0)