![](/style/images/good.png)
![](/style/images/bad.png)
Public preview: Control the minimum TLS version used with Azure Service Bus
source link: https://azure.microsoft.com/en-us/updates/policy-to-control-the-minimum-tls-version-used-with-azure-service-bus-now-in-public-preview/?WT_mc_id=DOP-MVP-4025064
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
- Updates
- Public preview: Control the minimum TLS version used with Azure Service Bus
Public preview: Control the minimum TLS version used with Azure Service Bus
Published date: May 05, 2022
Communication between a client application and an Azure Service Bus namespace is encrypted using Transport Layer Security (TLS). Transport Layer Security is a standard cryptographic protocol that ensures privacy and data integrity between clients and services over the Internet.
Azure Service Bus supports choosing a specific TLS version for namespaces. Currently Azure Service Bus uses TLS 1.2 on public endpoints by default, but TLS 1.0 and TLS 1.1 are still supported for backward compatibility.
Azure Service Bus namespaces permit clients to send and receive data with TLS 1.0 and above. To enforce stricter security measures, you can configure your Service Bus namespace to require that clients send and receive data with a newer version of TLS. If a Service Bus namespace requires a minimum version of TLS, then any requests made with an older version will fail.
To learn more, see Enforce a minimum required version of Transport Layer Security (TLS) for requests to a Service Bus namespace.
- Service Bus
- Compliance
- Features
- Security
Recommend
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK