TLS 1.2 Protocol Support Deployment Guide for Microsoft Azure Pack
This article describes how to deploy the TLS 1.2 Protocol in Microsoft Azure Pack.
Original product version: Azure
Original KB number: 4043907
Prerequisites
The following are prerequisites for supporting the TLS 1.2 protocol in Microsoft Azure Pack:
On Windows Server 2012 R2, do the following:
- Update the Microsoft .NET Framework 3.5 installation. To do this, go to the following article in the Microsoft Knowledge Base: 3154520 Support for TLS System Default Versions included in the .NET Framework 3.5 on Windows 8.1 and Windows Server 2012 R2
- Install all important updates for the .NET Framework version 4.5.x through Windows Update.
Install the required SQL Server TLS 1.2 protocol support update. To do this, go to the following article in the Microsoft Knowledge Base: 3135244 TLS 1.2 support for Microsoft SQL Server
Note
TLS 2 protocol supports only SHA1 and SHA2 certificates. Hence all certificates must be updated to be SHA1 or SHA2.
Configure the settings required for supporting the TLS 1.2 protocol. To do this, see the Setting Microsoft Azure Pack to support the TLS 1.2 protocol section.
Note
These settings should be configured on the systems that run Windows Azure Pack.
Hardening the system to use the TLS 1.2 protocol
Important
Follow the steps in this section carefully. Serious problems might occur if you modify the registry incorrectly. Before you modify it, back up the registry for restoration in case problems occur.
Use the following steps to enable/disable all SCHANNEL protocols system-wide. We recommend that you enable the TLS 1.2 protocol for incoming communications, and the TLS 1.2, TLS 1.1, and TLS 1.0 protocols for all outgoing communications.
Note
Making these registry changes does not affect the use of Kerberos or NTLM protocols.
Start Registry Editor. To do this, right-click Start, type regedit in the Run box, and then click OK.
Locate the following registry subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
Right-click the Protocol key, point to New, and then click Key.
Type SSL 3, and then press Enter.
Repeat steps 3 and 4 to create keys for TLS 0, TLS 1.1, and TLS 1.2. These keys resemble directories.
Create a Client key and a Server key under each of the SSL 3, TLS 1.0, TLS 1.1, and TLS 1.2 keys.
To enable a protocol, create the DWORD value under each Client and Server key as follows:
DisabledByDefault [Value = 0]
Enabled [Value = 1]To disable a protocol, change the DWORD value under each Client and Server key as follows:
DisabledByDefault [Value = 1]
Enabled [Value = 0]On the File menu, click Exit.
Setting Microsoft Azure Pack to support the TLS 1.2 protocol
Important
Follow the steps in this section carefully. Serious problems might occur if you modify the registry incorrectly. Before you modify it, back up the registry for restoration in case problems occur.
To enable the installation of Microsoft Azure Pack on the system to support the TLS 1.2 protocol, follow these steps:
- Start Registry Editor. To do this, right-click Start, type regedit in the Run box, and then click OK.
- Locate the following registry subkey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft.NETFramework\v4.0.30319
- Create the following DWORD value under this key: SchUseStrongCrypto [Value = 1]
- Locate the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319
. - Create the following DWORD value under this key:SchUseStrongCrypto [Value = 1].
- Restart the system.
Contact us for help
If you have questions or need help, create a support request, or ask Azure community support.
Feedback
Submit and view feedback for