Enable support for TLS 1.2 in your environment for Microsoft Entra TLS 1.1 and 1.0 deprecation
To improve the security posture of your tenant, and to remain in compliance with industry standards, Microsoft Entra ID will soon stop supporting the following Transport Layer Security (TLS) protocols and ciphers:
- TLS 1.1
- TLS 1.0
- 3DES cipher suite (TLS_RSA_WITH_3DES_EDE_CBC_SHA)
How this change might affect your organization
Do your applications communicate with or authenticate against Microsoft Entra ID? Then those applications might not work as expected if they can't use TLS 1.2 to communicate. This situation includes:
- Microsoft Entra Connect
- Microsoft Graph PowerShell
- Microsoft Entra application proxy connectors
- PTA agents
- Legacy browsers
- Applications that are integrated with Microsoft Entra ID
Why this change is being made
These protocols and ciphers are being deprecated for the following reasons:
- To follow the latest compliance standards for the Federal Risk and Authorization Management Program (FedRAMP).
- To improve security when users interact with our cloud services.
The TLS 1.0, TLS 1.1, and 3DES Cipher suite services are being deprecated on the following schedule.
Instance type | Deprecation date | Status |
---|---|---|
U.S. government instances | March 31, 2021 | COMPLETED |
Public instances | January 31, 2022 | COMPLETED |
Microsoft Entra instances operated by 21Vianet in China | November 30, 2024 | ONGOING |
TLS 1.3 support for Microsoft Entra services
In addition to supporting TLS 1.2, Microsoft Entra is also rolling out support for TLS 1.3 for its endpoints to align with security best practices (NIST - SP 800-52 Rev. 2). With this change, Microsoft Entra endpoints will support both TLS 1.2 and TLS 1.3 protocols.
Enable support for TLS 1.2 in your environment
To ensure a secure connection to Microsoft Entra ID and Microsoft 365 services, configure your client apps and both the client and server operating systems (OS) to support TLS 1.2 and contemporary cipher suites.
Guidelines for enabling TLS 1.2 on clients
- Update Windows and the default TLS that you use for "WinHTTP".
- Identify and reduce you dependency on the client apps and operating systems that don't support TLS 1.2.
- Enable TLS 1.2 for applications and services that communicate with Microsoft Entra ID.
- Update and configure your .NET Framework installation to support TLS 1.2.
- Make sure that applications and PowerShell (that use Microsoft Graph and Microsoft Graph PowerShell) scripts are hosted and run on a platform that supports TLS 1.2.
- Make sure that your web browser has the latest updates. We recommend that you use the new Microsoft Edge browser (based on Chromium). For more information, see the Microsoft Edge release notes for Stable Channel.
- Make sure that your web proxy supports TLS 1.2. For more information about how to update a web proxy, check with the vendor of your web proxy solution.
For more information, see the following articles:
- How to enable TLS 1.2 on clients
- Preparing for TLS 1.2 in Office 365 and Office 365 GCC - Microsoft 365 Compliance
Update the Windows OS and the default TLS that you use for WinHTTP
These operating systems natively support TLS 1.2 for client-server communications over WinHTTP:
- Windows 8.1, Windows 10, and later versions
- Windows Server 2012 R2, Windows Server 2016, and later versions
Verify that you haven't explicitly disabled TLS 1.2 on these platforms.
By default, earlier versions of Windows (such as Windows 8 and Windows Server 2012) don't enable TLS 1.2 or TLS 1.1 for secure communications by using WinHTTP. For these earlier versions of Windows:
- Install Update 3140245.
- Enable the registry values from the Enable TLS 1.2 on client or server operating systems section.
You can configure those values to add TLS 1.2 and TLS 1.1 to the default secure protocols list for WinHTTP.
For more information, see How to enable TLS 1.2 on clients.
Note
By default, an OS that supports TLS 1.2 (for example, Windows 10) also supports legacy versions of the TLS protocol. When a connection is made by using TLS 1.2 and it doesn't get a timely response, or when the connection is reset, the OS might try to connect to the target web service by using an older TLS protocol (such as TLS 1.0 or 1.1). This usually occurs if the network is busy, or if a packet drops in the network. After the temporary fallback to the legacy TLS, the OS will try again to make a TLS 1.2 connection.
What will be the status of such fallback traffic after Microsoft stops supporting the legacy TLS? The OS might still try to make a TLS connection by using the legacy TLS protocol. But if the Microsoft service is no longer supporting the older TLS protocol, the legacy TLS-based connection won't succeed. This will force the OS to try the connection again by using TLS 1.2 instead.
Identify and reduce dependency on clients that don't support TLS 1.2
Update the following clients to provide uninterrupted access:
- Android version 4.3 and earlier versions
- Firefox version 5.0 and earlier versions
- Internet Explorer versions 8-10 on Windows 7 and earlier versions
- Internet Explorer 10 on Windows Phone 8.0
- Safari 6.0.4 on OS X 10.8.4 and earlier versions
For more information, see Handshake Simulation for various clients connecting to www.microsoft.com, courtesy SSLLabs.com.
Enable TLS 1.2 on common server roles that communicate with Microsoft Entra ID
Microsoft Entra Connect (install the latest version)
- Do you also want to enable TLS 1.2 between the sync engine server and a remote SQL Server? Then make sure you have the required versions installed for TLS 1.2 support for Microsoft SQL Server.
Microsoft Entra Connect Authentication Agent (pass-through authentication) (version 1.5.643.0 and later versions)
Azure Application Proxy (version 1.5.1526.0 and later versions enforce TLS 1.2)
Active Directory Federation Services (AD FS) for servers that are configured to use Azure multifactor authentication (Azure MFA)
NPS servers that are configured to use the NPS extension for Microsoft Entra multifactor authentication
MFA Server version 8.0.x or later versions
Microsoft Entra Password Protection proxy service
Action required
We highly recommend that you run the latest version of the agent, service, or connector.
By default, TLS 1.2 is enabled on Windows Server 2012 R2 and later versions. In rare instances, the default OS configuration might have been modified to disable TLS 1.
To make sure that TLS 1.2 is enabled, we recommend that you explicitly add the registry values from the Enable TLS 1.2 on client or server operating systems section on servers that are running Windows Server and that communicate with Microsoft Entra ID.
Most of the previously listed services are dependent on .NET Framework. Make sure it's updated as described in the Update and configure .NET Framework to support TLS 1.2 section.
For more information, see the following articles:
Enable TLS 1.2 on client or server operating systems
Registry strings
For Windows 2012 R2, Windows 8.1, and later operating systems, TLS 1.2 is enabled by default. Thus, the following registry values aren't displayed unless they were set with different values.
To manually configure and enable TLS 1.2 at the operating system level, you can add the following DWORD values:
- HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client
DisabledByDefault
: 00000000Enabled
: 00000001
- HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server
DisabledByDefault
: 00000000Enabled
: 00000001
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319
SchUseStrongCrypto
: 00000001
To enable TLS 1.2 by using a PowerShell script, see TLS 1.2 enforcement for Microsoft Entra Connect.
How to check which TLS protocol is being used
Here are two ways to check which TLS is being used:
- Browser security settings
- Internet Properties in Windows
To check which TLS protocol is being used by using Internet Properties, follow these steps:
Press Windows+R to open the Run box.
Type inetcpl.cpl and then select OK. Then, the Internet Properties window is opened.
In the Internet Properties window, select the Advanced tab and scroll down to check the settings related to TLS.
Update and configure .NET Framework to support TLS 1.2
Managed Microsoft Entra integrated applications and Windows PowerShell scripts (using Microsoft Graph PowerShell and Microsoft Graph) may use .NET Framework.
Install .NET updates to enable strong cryptography
Determine the .NET version
First, determine the installed .NET versions.
- For more information, see Determine which versions and service pack levels of .NET Framework are installed.
Install .NET updates
Install the .NET updates so that you can enable strong cryptography. Some versions of .NET Framework might have to be updated to enable strong cryptography.
Use these guidelines:
.NET Framework 4.6.2 and later versions support TLS 1.2 and TLS 1.1. Check the registry settings. No other changes are required.
Update .NET Framework 4.6 and earlier versions to support TLS 1.2 and TLS 1.1.
For more information, see .NET Framework versions and dependencies.
Do you use .NET Framework 4.5.2 or 4.5.1 on Windows 8.1 or Windows Server 2012? Then the relevant updates and details are also available from Microsoft Update Catalog.
- Also see Microsoft Security Advisory 2960358.
For any computer that communicates across the network and runs a TLS 1.2-enabled system, set the following registry DWORD values.
For 32-bit applications that are running on a 32-bit OS and 64-bit applications that are running on a 64-bit OS, update the following subkey values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727
SystemDefaultTlsVersions
: 00000001SchUseStrongCrypto
: 00000001
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319
SystemDefaultTlsVersions
: 00000001SchUseStrongCrypto
: 00000001
For 32-bit applications that are running on 64-bit OSs, update the following subkey values:
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v2.0.50727
SystemDefaultTlsVersions
: dword:00000001SchUseStrongCrypto
: dword:00000001
- HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319
SystemDefaultTlsVersions
: dword:00000001SchUseStrongCrypto
: dword:00000001
- HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v2.0.50727
For example, set these values on:
- Configuration Manager clients
- Remote site system roles that aren't installed on the site server
- The site server itself
For more information, see the following articles:
- TLS Cipher Suites supported by Microsoft Entra ID
- How to enable TLS 1.2 on clients
- Transport Layer Security (TLS) best practices with the .NET Framework
- Solving the TLS 1.0 Problem - Security documentation
Overview of new telemetry in the sign-in logs
To help you identify any clients or apps that still use legacy TLS in your environment, view the Microsoft Entra sign-in logs. For clients or apps that sign in over legacy TLS, Microsoft Entra ID marks the Legacy TLS field in Additional Details with True. The Legacy TLS field only appears if the sign-in occurred over legacy TLS. If you don't see any legacy TLS in your logs, you're ready to switch to TLS 1.2.
To find the sign-in attempts that used legacy TLS protocols, an administrator can review the logs by:
- Exporting and querying the logs in Azure Monitor.
- Downloading the last seven days of logs in JavaScript Object Notation (JSON) format.
- Filtering and exporting sign-in logs using PowerShell.
These methods are described below.
You can query the sign-in logs using Azure Monitor. Azure Monitor is a powerful log analysis, monitoring, and alerting tool. Use Azure Monitor for:
- Microsoft Entra logs
- Azure resources logs
- Logs from independent software tools
Note
You need a Microsoft Entra ID P1 or P2 license to export reporting data to Azure Monitor.
To query for legacy TLS entries using Azure Monitor:
In Integrate Microsoft Entra logs with Azure Monitor logs, follow the instructions for how to access the Microsoft Entra sign-in logs in Azure Monitor.
In the query definition area, paste the following Kusto Query Language query:
// Interactive sign-ins only SigninLogs | where AuthenticationProcessingDetails has "Legacy TLS" and AuthenticationProcessingDetails has "True" | extend JsonAuthProcDetails = parse_json(AuthenticationProcessingDetails) | mv-apply JsonAuthProcDetails on ( where JsonAuthProcDetails.key startswith "Legacy TLS" | project HasLegacyTls=JsonAuthProcDetails.value ) | where HasLegacyTls == true // Non-interactive sign-ins AADNonInteractiveUserSignInLogs | where AuthenticationProcessingDetails has "Legacy TLS" and AuthenticationProcessingDetails has "True" | extend JsonAuthProcDetails = parse_json(AuthenticationProcessingDetails) | mv-apply JsonAuthProcDetails on ( where JsonAuthProcDetails.key startswith "Legacy TLS" | project HasLegacyTls=JsonAuthProcDetails.value ) | where HasLegacyTls == true // Workload Identity (service principal) sign-ins AADServicePrincipalSignInLogs | where AuthenticationProcessingDetails has "Legacy TLS" and AuthenticationProcessingDetails has "True" | extend JsonAuthProcDetails = parse_json(AuthenticationProcessingDetails) | mv-apply JsonAuthProcDetails on ( where JsonAuthProcDetails.key startswith "Legacy TLS" | project HasLegacyTls=JsonAuthProcDetails.value ) | where HasLegacyTls == true
Select Run to execute the query. The log entries that match the query appear in the Results tab below the query definition.
To learn more about the source of the legacy TLS request, look for the following fields:
- UserDisplayName
- AppDisplayName
- ResourceDisplayName
- UserAgent
View details about log entries in the Microsoft Entra admin center
After you obtain the logs, you can get more details about legacy TLS-based sign-in log entries in the Microsoft Entra admin center. Follow these steps:
In the Azure portal, search for and select Microsoft Entra ID.
In the Overview page menu, select Sign-in logs.
Select a sign-in log entry for a user.
Select the Additional details tab. (If you don't see this tab, first select the ellipsis (...) in the right corner to view the full list of tabs.)
Check for a Legacy TLS (TLS 1.0, 1.1, or 3DES) value that's set to True. If you see that particular field and value, the sign-in attempt was made using legacy TLS. If the sign-in attempt was made using TLS 1.2, that field doesn't appear.
For more information, see Sign-in logs in Microsoft Entra ID.
Contact us for help
If you have questions or need help, create a support request, or ask Azure community support. You can also submit product feedback to Azure feedback community.