Skip to content

Commit b0ce10c

Browse files
authored
Merge pull request #306769 from dlepow/tlsv2
[APIM] TLS 1.3 in v2
2 parents 42414de + 7c5c808 commit b0ce10c

2 files changed

Lines changed: 11 additions & 13 deletions

File tree

articles/api-management/TOC.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -364,6 +364,7 @@
364364
href: api-management-howto-ca-certificates.md
365365
- name: Manage protocols and ciphers
366366
href: api-management-howto-manage-protocols-ciphers.md
367+
displayName: TLS, TLS 1.3
367368
- name: Protect with Defender for APIs
368369
href: protect-with-defender-for-apis.md
369370
- name: Mitigate OWASP API threats

articles/api-management/api-management-howto-manage-protocols-ciphers.md

Lines changed: 10 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: how-to
9-
ms.date: 08/12/2025
9+
ms.date: 10/10/2025
1010
ms.author: danlep
1111
---
1212

@@ -21,7 +21,7 @@ Azure API Management supports multiple versions of Transport Layer Security (TLS
2121

2222
API Management also supports multiple cipher suites used by the API gateway.
2323

24-
Depending on the service tier, API Management supports TLS versions up to 1.2 or TLS 1.3 for client and backend connectivity and several supported cipher suites. This guide shows you how to manage protocols and ciphers configuration for an Azure API Management instance.
24+
API Management supports TLS versions up to TLS 1.3 for client and backend connectivity and several supported cipher suites. This guide shows you how to manage protocols and ciphers configuration for an Azure API Management instance.
2525

2626
:::image type="content" source="media/api-management-howto-manage-protocols-ciphers/api-management-protocols-ciphers.png" alt-text="Screenshot of managing protocols and ciphers in the Azure portal.":::
2727

@@ -33,7 +33,6 @@ Depending on the service tier, API Management supports TLS versions up to 1.2 or
3333
> [!NOTE]
3434
> Depending on the API Management service tier, changes can take 15 to 45 minutes or longer to apply. An instance in the Developer service tier has downtime during the process. Instances in the Basic and higher tiers don't have downtime during the process.
3535
36-
3736
## Prerequisites
3837

3938
* An API Management instance. [Create one if you haven't already](get-started-create-service-instance.md).
@@ -42,27 +41,24 @@ Depending on the service tier, API Management supports TLS versions up to 1.2 or
4241

4342
## How to manage TLS protocols and cipher suites
4443

45-
1. In the left navigation of your API Management instance, under **Security**, select **Protocols + ciphers**.
44+
1. In the sidebar of your API Management instance, under **Security**, select **Protocols + ciphers**.
4645
1. Enable or disable desired protocols or ciphers.
4746
1. Select **Save**.
4847

4948
> [!NOTE]
5049
> Some protocols or cipher suites (such as backend-side TLS 1.2) can't be enabled or disabled from the Azure portal. Instead, you'll need to apply the REST API call. Use the `properties.customProperties` structure in the [Create/Update API Management Service](/rest/api/apimanagement/current-ga/api-management-service/create-or-update) REST API.
5150
52-
## TLS 1.3 support in classic tiers
51+
## TLS 1.3 support
5352

54-
TLS 1.3 support is available in the API Management classic service tiers (**Consumption**, **Developer**, **Basic**, **Standard**, and **Premium**). In most instances created in those service tiers, TLS 1.3 is permanently enabled by default for client-side connections. Enabling backend-side TLS 1.3 is optional. TLS 1.2 is also enabled by default on both client and backend sides.
53+
TLS 1.3 support is available in all API Management service tiers. In most instances created in those service tiers, TLS 1.3 is permanently enabled by default for client-side connections. Enabling backend-side TLS 1.3 is optional. TLS 1.2 is also enabled by default on both client and backend sides.
5554

5655
TLS 1.3 is a major revision of the TLS protocol that provides improved security and performance. It includes features such as reduced handshake latency and improved security against certain types of attacks.
5756

58-
> [!NOTE]
59-
> The [v2 tiers](v2-service-tiers-overview.md) of API Management and [workspace gateways](workspaces-overview.md) support TLS 1.2 by default for client-side and backend-side connections. They don't currently support TLS 1.3.
60-
6157
### Optionally enable TLS 1.3 when clients require certificate renegotiation
6258

6359
TLS 1.3 doesn't support certificate renegotiation. Certificate renegotiation in TLS allows client and server to renegotiate connection parameters mid-session for authentication without terminating the connection.
6460

65-
Services that we identified as reliant on client certificate renegotiation do not have TLS 1.3 enabled by default.
61+
Services that API Management identifies as reliant on client certificate renegotiation do not have TLS 1.3 enabled by default. You can choose to enable TLS 1.3 manually.
6662

6763
> [!WARNING]
6864
> If your APIs are accessed by TLS-compliant clients that rely on certificate renegotiation, enabling TLS 1.3 for client-side connections will cause those clients to fail to connect. Review APIs that recently used certificate renegotiation before enabling client-side TLS 1.3 in any service that doesn't have it enabled by default.
@@ -71,15 +67,15 @@ To enable TLS 1.3 for client-side connections in these instances, configure sett
7167

7268
1. On the **Protocols + ciphers** page, in the **Client protocol** section, next to **TLS 1.3**, select **View and manage configuration**.
7369
1. Review the list of **Recent client certificate renegotiations**. The list shows API operations where clients recently used client certificate renegotiation.
74-
1. If you choose to enable TLS 1.3 for client-side connections, select **Enable**.
70+
1. If you choose to enable TLS 1.3 for client-side connections, under **Change TLS 1.3 status**, select **Enable**.
7571
1. Select **Close**.
7672

7773
After enabling TLS 1.3, review gateway request metrics or TLS-related exceptions in logs that indicate TLS connection failures. If necessary, disable TLS 1.3 for client-side connections and downgrade to TLS 1.2.
7874

7975
If you need to disable TLS 1.3 for client-side connections in these instances, configure settings on the **Protocols + ciphers** page:
8076

8177
1. On the **Protocols + ciphers** page, in the **Client protocol** section, next to **TLS 1.3**, select **View and manage configuration**.
82-
1. Select **Disable**.
78+
1. Under **Change TLS 1.3 status**, elect **Disable**.
8379
1. Select **Close**.
8480

8581
### Backend-side TLS 1.3
@@ -91,7 +87,8 @@ Enabling backend-side TLS 1.3 is optional. If you enable it, API Management uses
9187
9288
You can enable backend-side TLS 1.3 from the **Protocols + ciphers** page:
9389

94-
1. On the **Protocols + ciphers** page, in the **Backend protocol** section, enable the **TLS 1.3** setting.
90+
1. On the **Protocols + ciphers** page, in the **Backend protocol** section, next to **TLS 1.3**, select **View and manage configuration**.
91+
1. Under **Change TLS 1.3 status**, select **Enable**.
9592
1. Select **Save**.
9693

9794
## Related content

0 commit comments

Comments
 (0)