Topics

Wednesday, September 17, 2025

Azure Just Killed TLS 1.0/1.1 -- If Your Azure SQL blipped, here’s Your 10-Minute Save.

On August 31, 2025, Microsoft finished retiring TLS 1.0/1.1 across Azure. If any caller still negotiates those protocols, Azure SQL (DB or MI) will refuse the handshake until the client stack is modernized. Good. It’s time.

Read this:   Azure's TLS retirement

Why DBAs should care

  • Minimum TLS 1.2 is table stakes. You set it per logical server in the portal. 

  • Finding the laggards is easy: enable Azure SQL Auditing and check client_tls_version_n. That’s your hit list

  • Drivers aren’t the villain: modern ODBC 17/18 and Microsoft.Data.SqlClient already speak TLS 1.2+. The risk is that one dusty Windows service from 2012. (Upgrade it.)

Do this now 

  1. Enforce TLS ≥ 1.2
    Azure portal → SQL logical server → Networking → Connectivity → Minimum TLS version = 1.2 (or 1.3) → Save.
      Azure Connectivity

  2. Modernize client stacks
    Move to ODBC 17/18 or Microsoft.Data.SqlClient; retire SQL Native Client.

  3. Prove you’re clean
    Query audit logs for client_tls_version_n and chase anything < 1.2. Keep a short “offenders” list for the next patch window.
       

Curiosity corner: TLS 1.3 is supported with TDS 8.0 on SQL Server 2022/Azure SQL—but don’t disable TLS 1.2 yet; some satellite services still need it.  TLS 1.3 Support 

Patch-window PSA

SQL Server 2022 CU21 (Sept 2025) is out; it includes fixes and a known issue with SESSION_CONTEXT in parallel plans

Read these notes before you blanket-roll to prod. CU Details

And more.   Azure Database Support

No comments:

Post a Comment