Microsoft Entra enforces strict requirements for Transport Layer Security (TLS) when managing identity, authentication, and API access. Getting these settings right is critical. A weak cipher suite or wrong protocol version can break integrations or expose data.
Why TLS configuration matters in Microsoft Entra
TLS protects data in transit between clients, services, and APIs. Microsoft Entra’s identity platform depends on secure channels to verify tokens, exchange claims, and handle secrets. If your endpoints cannot negotiate the right TLS protocol and cipher suite, authentication will fail. If they negotiate insecure ones, you risk interception.
Supported TLS versions
Microsoft Entra Identity services require TLS 1.2 or higher. TLS 1.3 is recommended for stronger security and faster handshakes. Older versions (TLS 1.0, 1.1) are blocked. Make sure your applications, libraries, and load balancers support TLS 1.2/1.3 and are configured to prefer the latest.
Cipher suite selection
Avoid obsolete ciphers like RC4, 3DES, or weak RSA handshakes. Use modern suites with AES-GCM for encryption and SHA-256 or SHA-384 for message integrity. Example for TLS 1.2:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
For TLS 1.3, the suite selection is automatic, but monitoring is key to ensure your systems negotiate optimal security.