Skip to content

Commit feb1e7f

Browse files
authored
Merge pull request #110208 from TimShererWithAquent/us1679050di
Change SSL to TLS per 1679050
2 parents 94fca8a + c5fe810 commit feb1e7f

6 files changed

+8
-8
lines changed

articles/connectors/connectors-create-api-ftp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ You can use triggers that get responses from your FTP server and make the output
2222

2323
## Limitations
2424

25-
* The FTP connector supports only explicit FTP over SSL (FTPS) and isn't compatible with implicit FTPS.
25+
* The FTP connector supports only explicit FTP over TLS/SSL (FTPS) and isn't compatible with implicit FTPS.
2626

2727
* By default, FTP actions can read or write files that are *50 MB or smaller*. To handle files larger than 50 MB, FTP actions support [message chunking](../logic-apps/logic-apps-handle-large-messages.md). The **Get file content** action implicitly uses chunking.
2828

articles/connectors/connectors-create-api-smtp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ Under the actions list, select the action you want.
7070
| **User Name** | Yes | Your username for your SMTP account |
7171
| **Password** | Yes | Your password for your SMTP account |
7272
| **SMTP Server Port** | No | A specific port on your SMTP server you want to use |
73-
| **Enable SSL?** | No | Turn on or turn off SSL encryption. |
73+
| **Enable SSL?** | No | Turn on or turn off TLS/SSL encryption. |
7474
||||
7575

7676
1. Provide the necessary details for your selected action.

articles/connectors/connectors-native-reqres.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in R
2121
> The Request trigger supports *only* Transport Layer Security (TLS) 1.2 for incoming calls. Outgoing calls
2222
> continue to support TLS 1.0, 1.1, and 1.2. For more information, see [Solving the TLS 1.0 problem](https://docs.microsoft.com/security/solving-tls1-problem).
2323
>
24-
> If you see SSL handshake errors, make sure that you use TLS 1.2. For incoming calls, here are the supported cipher suites:
24+
> If you see TLS handshake errors, make sure that you use TLS 1.2. For incoming calls, here are the supported cipher suites:
2525
>
2626
> * TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
2727
> * TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256

articles/connectors/connectors-native-webhook.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ For example, the Office 365 Outlook connector's [**Send approval email**](connec
3333
> [!NOTE]
3434
> Logic Apps enforces Transport Layer Security (TLS) 1.2 when
3535
> receiving the call back to the HTTP webhook trigger or action.
36-
> If you see SSL handshake errors, make sure that you use TLS 1.2.
36+
> If you see TLS handshake errors, make sure that you use TLS 1.2.
3737
> For incoming calls, here are the supported cipher suites:
3838
>
3939
> * TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

articles/logic-apps/logic-apps-custom-api-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -305,7 +305,7 @@ In the **Authorization** section, include these properties:
305305

306306
| Property | Required | Description |
307307
| -------- | -------- | ----------- |
308-
| `type` | Yes | The authentication type. For SSL client certificates, the value must be `ClientCertificate`. |
308+
| `type` | Yes | The authentication type. For TLS/SSL client certificates, the value must be `ClientCertificate`. |
309309
| `password` | No | The password for accessing the client certificate (PFX file) |
310310
| `pfx` | Yes | The base64-encoded contents of the client certificate (PFX file) |
311311
||||

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ To control access and protect data in Azure Logic Apps, you can set up security
2222

2323
## Access to request-based triggers
2424

25-
If your logic app uses a request-based trigger, which receives incoming calls or requests, such as the [Request](../connectors/connectors-native-reqres.md) or [Webhook](../connectors/connectors-native-webhook.md) trigger, you can limit access so that only authorized clients can call your logic app. All requests received by a logic app are encrypted and secured with Secure Sockets Layer (SSL) protocol.
25+
If your logic app uses a request-based trigger, which receives incoming calls or requests, such as the [Request](../connectors/connectors-native-reqres.md) or [Webhook](../connectors/connectors-native-webhook.md) trigger, you can limit access so that only authorized clients can call your logic app. All requests received by a logic app are encrypted and secured with Transport Layer Security (TLS), previously known as Secure Sockets Layer (SSL), protocol.
2626

2727
Here are options that can help you secure access to this trigger type:
2828

@@ -659,7 +659,7 @@ If the [Client Certificate](../active-directory/authentication/active-directory-
659659

660660
| Property (designer) | Property (JSON) | Required | Value | Description |
661661
|---------------------|-----------------|----------|-------|-------------|
662-
| **Authentication** | `type` | Yes | **Client Certificate** <br>or <br>`ClientCertificate` | The authentication type to use for Secure Sockets Layer (SSL) client certificates. While self-signed certificates are supported, self-signed certificates for SSL aren't supported. |
662+
| **Authentication** | `type` | Yes | **Client Certificate** <br>or <br>`ClientCertificate` | The authentication type to use for TLS/SSL client certificates. While self-signed certificates are supported, self-signed certificates for TLS/SSL aren't supported. |
663663
| **Pfx** | `pfx` | Yes | <*encoded-pfx-file-content*> | The base64-encoded content from a Personal Information Exchange (PFX) file <p><p>To convert the PFX file into base64-encoded format, you can use PowerShell by following these steps: <p>1. Save the certificate content into a variable: <p> `$pfx_cert = get-content 'c:\certificate.pfx' -Encoding Byte` <p>2. Convert the certificate content by using the `ToBase64String()` function and save that content to a text file: <p> `[System.Convert]::ToBase64String($pfx_cert) | Out-File 'pfx-encoded-bytes.txt'` |
664664
| **Password** | `password`| No | <*password-for-pfx-file*> | The password for accessing the PFX file |
665665
|||||
@@ -688,7 +688,7 @@ For more information about securing services by using client certificate authent
688688
* [Improve security for back-end services by using client certificate authentication in Azure API Management](../api-management/api-management-howto-mutual-certificates.md)
689689
* [Improve security for your RESTfuL service by using client certificates](../active-directory-b2c/secure-rest-api.md)
690690
* [Certificate credentials for application authentication](../active-directory/develop/active-directory-certificate-credentials.md)
691-
* [Use an SSL certificate in your application code in Azure App Service](../app-service/configure-ssl-certificate-in-code.md)
691+
* [Use a TLS/SSL certificate in your code in Azure App Service](../app-service/configure-ssl-certificate-in-code.md)
692692

693693
<a name="azure-active-directory-oauth-authentication"></a>
694694

0 commit comments

Comments
 (0)