Search

MC258228 – (Updated) Reminder: Azure Active Directory – Enable support for TLS 1.2 protocol to avoid service impact (archived)

cloudscout.one Icon

check before: 2022-01-31

Product:

Azure Active Directory, Entra, Entra ID

Platform:

World tenant, Online

Status:

Change type:

Admin impact, Retirement, Updated message

Links:

Details:

Updated June 22, 2021: We have extended the rollout timeline below. Thank you for your patience.
Note: If you have already transitioned to TLS 1.2, you can safely disregard this message.
As previously announced we will soon begin to retire support for following protocols and ciphers, in Azure Active Directory:

TLS 1.1, TLS 1.0 , 3DES cipher suite (TLS_RSA_WITH_3DES_EDE_CBC_SHA)
These protocols and ciphers are being retired to improve security when users/services interact with our cloud services.
Multiple announcements have been made via public articles "What's new in Azure Active Directory?" (Oct 2020, Nov 2020), emails to Azure subscription owners and Message center posts. This is a final reminder.
[Key points:]

TLS 1.0, 1.1 and 3DES cipher suite in U.S. government instances starting on March 31, 2021 – on going in phases.
TLS 1.0, 1.1 and 3DES cipher suite in public instances starting January 31, 2022. (This date has been postponed from 30th June 2021 to 31st Jan 2022, to give Administrators more time to remove the dependency on legacy TLS protocols and ciphers (TLS 1.0,1.1 and 3DES)).

Change Category:
XXXXXXX ...

Scope:
XXXXXXX ...

Release Phase:

Created:
2021-05-26

updated:
2021-07-08

the free basic plan is required to see all details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.


Last updated 4 months ago

Share to MS Teams

Login to your account

Welcome Back, We Missed You!