| author | VanMSFT |
|---|---|
| ms.author | vanto |
| ms.reviewer | mathoma |
| ms.date | 09/19/2025 |
| ms.service | azure-sql |
| ms.topic | include |
Azure has announced that support for older TLS versions (TLS 1.0, and 1.1) ends August 31, 2025. For more information, see TLS 1.0 and 1.1 deprecation.
Starting November 2024, you'll no longer be able to set the minimal TLS version for Azure SQL Database and Azure SQL Managed Instance client connections below TLS 1.2.
TLS versions 1.0 and 1.1 are outdated and no longer meet modern security standards. They're being retired to:
- Reduce exposure to known vulnerabilities.
- Align with industry best practices and compliance requirements.
- Ensure clients are using stronger encryption protocols like TLS 1.2 or TLS 1.3.
After August 31, 2025, TLS 1.0 and 1.1 will no longer be supported, and connections using TLS 1.0 and 1.1 will likely fail. It's critical to transition to a minimum of TLS 1.2 or higher before the deadline.
How can I check if my SQL Database, SQL Managed Instance, Cosmos DB, or MySQL instances are using TLS 1.0/1.1?
-
To identify clients that are connecting to your Azure SQL Database using TLS 1.0 and 1.1, SQL audit logs must be enabled. With auditing enabled, you can view client connections.
-
To identify clients that are connecting to your Azure SQL Managed Instance using TLS 1.0 and 1.1, auditing must be enabled. With auditing enabled, you can consume audit logs with Azure Storage, Event Hubs, or Azure Monitor Logs to view client connections.
-
To verify the minimum TLS version of your Azure Cosmos DB, get the current value of the
minimalTlsVersionproperty using Azure CLI or Azure PowerShell. -
To verify the minimum TLS version configured for your Azure Database for MySQL Server, check the value of the
tls_versionserver parameter using the MySQL command-line interface to understand what protocols are configured.
Services might be incorrectly flagged due to:
- Intermittent fallback to older TLS versions by legacy clients.
- Misconfigured client libraries or connection strings that don't enforce TLS 1.2.
- Telemetry lag or false positives in detection logic.
If your server or database is already configured with minimum TLS 1.2, or configured with no minimum TLS (the default setting in SQL Database and SQL Managed Instance minimalTLSVersion that maps to 0) and connecting with 1.2, no action is required.
Connections will fail once TLS 1.0/1.1 are disabled. You must upgrade your client libraries, drivers, or frameworks to versions that support TLS 1.2.
Servers configured with no minimum TLS version and connecting with TLS 1.0/1.1 should be upgraded to minimum TLS version 1.2. For servers configured with no minimum TLS version and connecting with 1.2, no action is required. For servers configured with no minimum TLS version and using encrypted connections, no action is required.
Email reminders will continue leading up to the retirement of TLS 1.0 and 1.1 in August.
If you need help with validating or with updating your TLS settings, contact Microsoft Q&A or open a support ticket using the Azure portal if you have a support plan.