The end of support for TLS 1.0 and 1.1 in Azure App Services is indeed a significant change, especially for legacy client devices that only support these versions.
Here's some information that might help:
- Azure support for TLS 1.0 and 1.1 will end by 31 October 2024. This is part of an effort to enhance security and provide best-in-class encryption for your data.
- Despite this, Azure App Service will continue to support TLS 1.0 and 1.1 for incoming requests to your web app to ensure backward compatibility.
However, since the default minimum TLS version is set to TLS 1.2, you need to update the minimum TLS version configurations on your web app to either TLS 1.0 or 1.1 so the requests won't be rejected.
- If your resources that interact with Azure services are already exclusively using TLS 1.2 or later, you don't need to take further action. If they still have a dependency on TLS 1.0 or 1.1, transition them to TLS 1.2 or later by 31 October 2024.
For legacy devices that only support TLS 1.0, here are a couple of potential solutions:
- Update the Device:
If possible, update the firmware or software on the device to support a newer version of TLS.
- Use a Proxy Server:
If updating the device isn't an option, you could consider setting up a proxy server that supports TLS 1.0 and forwards requests to your Azure App Service (which uses TLS 1.2). This would allow the legacy device to communicate with the proxy server using TLS 1.0, and the proxy server would then communicate with Azure using TLS 1.2.
Used Copilot and Adjusted the output
Source:
https://stackoverflow.com/questions/78475044/handling-end-of-tls-1-0-support-in-azure-app-services-for-legacy-client-devices
https://azure.microsoft.com/en-us/updates/azure-support-tls-will-end-by-31-october-2024-2/
https://learn.microsoft.com/en-us/answers/questions/1431848/is-it-possible-to-keep-old-app-services-using-tls