Share via

Inquiry on Future Deprecation of Weak / Legacy TLS Cipher Suites in Azure API Management

PANNARAT, MASSATRON 0 Reputation points
2026-05-02T00:37:28.54+00:00

We would like to inquire about the future roadmap regarding weak or legacy TLS cipher suites in Azure API Management (Managed / Cloud).

Currently, we observe that Azure API Management provides a “Protocols + ciphers” configuration page where certain cipher suites marked as “Weak cipher enabled” (for example, RSA-based or CBC-mode cipher suites) can still be enabled or disabled by customers. However, we have not found any official announcement or timeline regarding their deprecation or removal.

To support our long-term architecture planning and compliance strategy, we would appreciate your clarification on the following points:

  1. Are there any planned or upcoming deprecations for weak or legacy TLS cipher suites in Azure API Management?
  2. Is there an official announcement, public documentation, or roadmap that customers can reference regarding this topic?
  3. If deprecation is planned, is there any indicative timeline or advance notice policy (for example, prior warnings before enforcement)?
  4. Should customers consider these weak cipher suites as temporary compatibility options only, and avoid relying on them for long-term production use?

Our goal is to proactively prepare our applications and connected devices in alignment with Azure security best practices and future platform changes.

User's image

Azure API Management
Azure API Management

An Azure service that provides a hybrid, multi-cloud management platform for APIs.


Answer accepted by question author

  1. Siddhesh Desai 6,555 Reputation points Microsoft External Staff Moderator
    2026-05-04T02:58:47.68+00:00

    Hi @PANNARAT, MASSATRON ,

    Thank you for reaching out to Microsoft Q&A.

    Azure API Management (APIM) allows customers to configure TLS protocols and cipher suites, including enabling or disabling certain cipher suites that are marked as weak (such as RSA-based or CBC-mode ciphers). However, based on currently available official documentation and public announcements, there is no explicit roadmap or confirmed timeline from Microsoft regarding the deprecation or removal of these weak or legacy cipher suites specifically within APIM. These weak cipher suites are still supported primarily to maintain backward compatibility with legacy clients and systems. At the same time, Microsoft strongly recommends using modern TLS versions (TLS 1.2 and TLS 1.3) and secure cipher suites. The lack of a formal deprecation timeline indicates that cipher retirement decisions are handled on a per-service basis and depend on ecosystem impact. Therefore, while these cipher suites are still available today, they should not be considered part of a long-term secure architecture, as future deprecation is highly likely but currently unspecified.

    Refer below points to resolve this issue or this is the workaround

    No official deprecation timeline is published

    As of now, Microsoft has not announced any official deprecation schedule or roadmap for weak/legacy TLS cipher suites in Azure API Management. Customers should monitor Azure updates and service changelogs for any future announcements.

    Weak cipher suites are provided for backward compatibility only

    Cipher suites marked as weak are still available in APIM to support legacy clients, but they are not recommended for secure production use. These should be treated as temporary compatibility options rather than long-term solutions.

    Follow Azure security best practices

    Customers should proactively disable weak ciphers and enforce strong encryption standards:

    • Disable CBC-based and RSA key exchange cipher suites
    • Enforce minimum TLS version 1.2 or preferably TLS 1.3
    • Prefer modern cipher suites such as GCM-based or TLS 1.3 ciphers

    Expect advance notice before enforcement changes

    Although no timeline is published, Microsoft typically provides advance notifications via Azure Service Health or official updates before enforcing breaking security changes. Any deprecation (if introduced) is expected to follow phased rollout practices.

    Design for future compliance

    To avoid future disruptions and compliance risks, ensure that all applications and connected clients support strong cipher suites and modern TLS versions, and avoid dependencies on weak/legacy cipher configurations.

    Hope this helps!


    If the resolution was helpful, kindly take a moment to click on User's imageand click on Yes for was this answer helpful. And, if you have any further query do let us know.

    1 person found this answer helpful.
    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.