You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/cache-remove-tls-10-11.md
+20-19Lines changed: 20 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,8 +16,7 @@ There's an industry-wide push toward the exclusive use of Transport Layer Securi
16
16
17
17
As a part of this effort, we'll be making the following changes to Azure Cache for Redis:
18
18
19
-
***Phase 1:** We'll configure the default minimum TLS version to be 1.2 for newly created cache instances
20
-
(This used to be TLS 1.0). Existing cache instances won't be updated at this point. You'll be allowed to [change the minimum TLS version](cache-configure.md#access-ports) back to 1.0 or 1.1 for backward compatibility, if needed. This change can be done through the Azure portal or other management APIs.
19
+
***Phase 1:** We'll configure the default minimum TLS version to be 1.2 for newly created cache instances. (This used to be TLS 1.0). Existing cache instances won't be updated at this point. You'll be allowed to [change the minimum TLS version](cache-configure.md#access-ports) back to 1.0 or 1.1 for backward compatibility, if needed. This change can be done through the Azure portal or other management APIs.
21
20
***Phase 2:** We'll stop supporting TLS versions 1.0 and 1.1. After this change, your application will be required to use TLS 1.2 or later to communicate with your cache.
22
21
23
22
Additionally, as a part of this change, we'll be removing support for older, insecure cypher suites. Our supported cypher suites will be restricted to the following when the cache is configured with a minimum TLS version of 1.2.
@@ -84,27 +83,29 @@ In Java 8, TLS 1.2 is used by default and shouldn't require updates to your clie
84
83
Node Redis and IORedis use TLS 1.2 by default.
85
84
86
85
### PHP
86
+
87
87
#### Predis
88
-
For versions less than PHP 7 Predis supports only TLS 1.0. These do not work with TLS 1.2, you need to upgrade.
89
88
90
-
PHP 7.0 to PHP 7.2.1: Predis uses only TLS 1.0 or 1.1 by default. You can use the workaround below to use TLS 1.2.
91
-
Specify TLS 1.2 when you create the client instance:
On PHP 7.3 or above, Predis uses the latest TLS version.
89
+
* Versions earlier than PHP 7: Predis supports only TLS 1.0. These versions don't work with TLS 1.2; you must upgrade to use TLS 1.2.
90
+
91
+
* PHP 7.0 to PHP 7.2.1: Predis uses only TLS 1.0 or 1.1 by default. You can use the following workaround to use TLS 1.2. Specify TLS 1.2 when you create the client instance:
0 commit comments