|
| 1 | +--- |
| 2 | +title: FIPS 140 on Azure Application Gateway |
| 3 | +description: Learn how to enable FIPS mode for Azure Application Gateway V2 SKU. |
| 4 | +services: application gateway |
| 5 | +author: jaesoni |
| 6 | +ms.service: azure-application-gateway |
| 7 | +ms.topic: concept-article |
| 8 | +ms.date: 12/01/2025 |
| 9 | +ms.author: greglin |
| 10 | +--- |
| 11 | + |
| 12 | +# FIPS mode in Application Gateway |
| 13 | + |
| 14 | +Application Gateway V2 SKUs can run in a FIPS (Federal Information Processing Standard) 140 approved mode of operation, which is commonly referred to as "FIPS mode." With FIPS mode, Application Gateway supports cryptographic modules and data encryption. The FIPS mode calls a FIPS 140-2 validated cryptographic module that ensures FIPS-compliant algorithms for encryption, hashing, and signing when enabled. |
| 15 | + |
| 16 | +## Clouds and Regions |
| 17 | + |
| 18 | +| Cloud | Status | Default behavior | |
| 19 | +| ---------- | ---------- | ---------- | |
| 20 | +| Azure Government (Fairfax) | Supported | Enabled for deployments through Portal | |
| 21 | +| Public | Supported | Disabled | |
| 22 | +| Microsoft Azure operated by 21Vianet | Supported | Disabled | |
| 23 | + |
| 24 | +Since FIPS 140 is mandatory for US federal agencies, Application Gateway V2 has FIPS mode enabled by default in Azure Government (Fairfax) cloud. Customers can disable FIPS mode if they have legacy clients using older cipher suites, though it isn't recommended. As part of the FedRAMP compliance, the US Government mandates that systems operate in a [FIPS-approved mode](/azure/compliance/offerings/offering-fips-140-2) after August 2024. |
| 25 | + |
| 26 | +For rest of the clouds, customers must opt in to enable the FIPS mode. |
| 27 | + |
| 28 | +## FIPS mode operation |
| 29 | + |
| 30 | +Application Gateway utilizes a rolling upgrade process to implement configurations with the FIPS validated cryptographic module across all instances. The duration for enabling or disabling FIPS mode may range from 15 to 60 minutes, depending on the number of configured or currently running instances. |
| 31 | + |
| 32 | +> [!IMPORTANT] |
| 33 | +> The FIPS mode configuration change can take anywhere between 15 to 60 minutes depending on the number of instances for your gateway. |
| 34 | +
|
| 35 | +Once enabled, the gateway exclusively supports TLS policies and cipher suites that comply with FIPS standards. Consequently, the portal displays only the restricted selection of TLS policies (both Predefined and Custom). |
| 36 | + |
| 37 | +## Supported TLS policies |
| 38 | + |
| 39 | +Application Gateway offers two mechanisms for controlling TLS policy. You can use either a Predefined policy or a Custom policy. For complete details, visit [TLS policy overview](application-gateway-ssl-policy-overview.md). A FIPS-enabled Application Gateway resource only supports the following policies. |
| 40 | + |
| 41 | +### Predefined |
| 42 | +* AppGwSslPolicy20220101 |
| 43 | +* AppGwSslPolicy20220101S |
| 44 | + |
| 45 | +### Custom V2 |
| 46 | +**Versions** |
| 47 | +* TLS 1.3 |
| 48 | +* TLS 1.2 |
| 49 | + |
| 50 | +**Cipher suites** |
| 51 | + |
| 52 | +* TLS_AES_128_GCM_SHA256 |
| 53 | +* TLS_AES_256_GCM_SHA384 |
| 54 | +* TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 |
| 55 | +* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 |
| 56 | +* TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 |
| 57 | +* TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 |
| 58 | +* TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 |
| 59 | +* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
| 60 | +* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
| 61 | +* TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 |
| 62 | + |
| 63 | +Due to the restricted compatibility of TLS policies, enabling FIPS automatically selects AppGwSslPolicy20220101 for both "SSL Policy" and "SSL Profile." It can be modified to use other FIPS-compliant TLS policies later. To support legacy clients with other noncompliant cipher suites, it's possible to disable the FIPS mode, although it isn't recommended for resources within the scope of FedRAMP infrastructure. |
| 64 | + |
| 65 | +## Enabling FIPS mode in V2 SKU |
| 66 | + |
| 67 | +**Azure portal** |
| 68 | + |
| 69 | +To control the FIPS mode setting through Azure portal, |
| 70 | + |
| 71 | +1. Navigate to your application gateway resource. |
| 72 | +2. Open the Configuration blade in the left menu pane. |
| 73 | +3. Switch the FIPS mode toggle as "Enabled". |
| 74 | + |
| 75 | +## Next steps |
| 76 | + |
| 77 | +Know about the supported [TLS policies on Application Gateway](application-gateway-ssl-policy-overview.md). |
0 commit comments