You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-manage-protocols-ciphers.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlepow
6
6
7
7
ms.service: azure-api-management
8
8
ms.topic: how-to
9
-
ms.date: 10/08/2025
9
+
ms.date: 10/10/2025
10
10
ms.author: danlep
11
11
---
12
12
@@ -21,7 +21,7 @@ Azure API Management supports multiple versions of Transport Layer Security (TLS
21
21
22
22
API Management also supports multiple cipher suites used by the API gateway.
23
23
24
-
Depending on the service tier, API Management supports TLS versions up to 1.2 or TLS 1.3 for client and backend connectivity and several supported cipher suites. This guide shows you how to manage protocols and ciphers configuration for an Azure API Management instance.
24
+
API Management supports TLS versions up to TLS 1.3 for client and backend connectivity and several supported cipher suites. This guide shows you how to manage protocols and ciphers configuration for an Azure API Management instance.
25
25
26
26
:::image type="content" source="media/api-management-howto-manage-protocols-ciphers/api-management-protocols-ciphers.png" alt-text="Screenshot of managing protocols and ciphers in the Azure portal.":::
27
27
@@ -33,7 +33,6 @@ Depending on the service tier, API Management supports TLS versions up to 1.2 or
33
33
> [!NOTE]
34
34
> Depending on the API Management service tier, changes can take 15 to 45 minutes or longer to apply. An instance in the Developer service tier has downtime during the process. Instances in the Basic and higher tiers don't have downtime during the process.
35
35
36
-
37
36
## Prerequisites
38
37
39
38
* An API Management instance. [Create one if you haven't already](get-started-create-service-instance.md).
@@ -42,7 +41,7 @@ Depending on the service tier, API Management supports TLS versions up to 1.2 or
42
41
43
42
## How to manage TLS protocols and cipher suites
44
43
45
-
1. In the left navigation of your API Management instance, under **Security**, select **Protocols + ciphers**.
44
+
1. In the sidebar of your API Management instance, under **Security**, select **Protocols + ciphers**.
46
45
1. Enable or disable desired protocols or ciphers.
47
46
1. Select **Save**.
48
47
@@ -59,7 +58,7 @@ TLS 1.3 is a major revision of the TLS protocol that provides improved security
59
58
60
59
TLS 1.3 doesn't support certificate renegotiation. Certificate renegotiation in TLS allows client and server to renegotiate connection parameters mid-session for authentication without terminating the connection.
61
60
62
-
Services that we identified as reliant on client certificate renegotiation do not have TLS 1.3 enabled by default.
61
+
Services that API Management identifies as reliant on client certificate renegotiation do not have TLS 1.3 enabled by default. You can choose to enable TLS 1.3 manually.
63
62
64
63
> [!WARNING]
65
64
> If your APIs are accessed by TLS-compliant clients that rely on certificate renegotiation, enabling TLS 1.3 for client-side connections will cause those clients to fail to connect. Review APIs that recently used certificate renegotiation before enabling client-side TLS 1.3 in any service that doesn't have it enabled by default.
@@ -68,15 +67,15 @@ To enable TLS 1.3 for client-side connections in these instances, configure sett
68
67
69
68
1. On the **Protocols + ciphers** page, in the **Client protocol** section, next to **TLS 1.3**, select **View and manage configuration**.
70
69
1. Review the list of **Recent client certificate renegotiations**. The list shows API operations where clients recently used client certificate renegotiation.
71
-
1. If you choose to enable TLS 1.3 for client-side connections, select **Enable**.
70
+
1. If you choose to enable TLS 1.3 for client-side connections, under **Change TLS 1.3 status**, select **Enable**.
72
71
1. Select **Close**.
73
72
74
73
After enabling TLS 1.3, review gateway request metrics or TLS-related exceptions in logs that indicate TLS connection failures. If necessary, disable TLS 1.3 for client-side connections and downgrade to TLS 1.2.
75
74
76
75
If you need to disable TLS 1.3 for client-side connections in these instances, configure settings on the **Protocols + ciphers** page:
77
76
78
77
1. On the **Protocols + ciphers** page, in the **Client protocol** section, next to **TLS 1.3**, select **View and manage configuration**.
0 commit comments