Home

  
 
 

Search Knowledge Base


Knowledge Base Web View
Total Records: 106
ID Title Type Of Article
204 
Outlook Connection Status Window Support
1106 
Outlook Training Tips and Tricks Training Resources
730 
Parallels Connection Mode Change How To
581 
Property Management IT Services Increases Productivity for Realtor Case Study
586 
QuickBooks Multi-Client Management Solution for Renaissance Consulting Case Study
694 
QuickBooks Stop from retaining Last Logged-In User on Startup of QuickBooks How To
1317 
Reenabling Home Page or Web Page Views for Outlook Folders How To
101 
RETRIEVE AN ONT OR MODULE INVENTORY REPORT IN AXSVISION How To
585 
Seminole Hard Rock Casino – PCI Compliance for 5 years of data backup on tape Case Study
1024 
Setup Access to Compliance File Manager on SI Portal How To
1404 
Setup Engage BMS Launch Batch File for Engage Startup How To
1323 
Sophos MDR Managed Detection and Response Sales Collateral
258 
SOPHOS XG Licensing Guide Support
319 
Submit a Ticket on Scorpion Interactive - Client Facing How To
120 
Telnet to device not working externally but does internally Support
590 
Tew and Associates Migration to Managed Services and Cloud Solution Case Study
594 
The solution was extremely reliable and the process couldn’t be simpler. Case Study
778 
TPM Installed on Cheetah requires correct BIOS Version How To
23 
Upgrading Xp Pro to Windows 7 application and all Support
671 
Use Eversign with Engage for Digital Signatures on Quotes, Work Orders, Invoices and More How To
236 
Using DocuSign for Quotes in Scorpion Workflow
96 
View emails of deleted employees with GFI Email Archiver Support
587 
Voice over IP Phone System as a Business Management Tool Case Study
588 
Web Enable Applied Systems Technology Software and Consolidate Management Case Study
595 
What value does Data-Tech bring to a Cloud Provider Partnership? Case Study
Add New  Records per page  4 of 5   
Engage Knowledge Base Web View         Support          Print
Title How to enable TLS1.2 for .net framework on IIS Web Server      
Resolution

Issue: .NET application pool attempts to establish an SSL/TLS connection to a third-party service or API and encounters errors.

Possible Errors:

  • The client and server cannot communicate, because they do not possess a common algorithm.
  • Could not create SSL/TLS Secure Channel.

Resolution: To resolve the above issues, follow these steps:

  • Copy the script text and save as enabletls12.ps1 and testtls.ps1 on the web server, example directory C:\support.
  • Run the scripts from elevated powershell on the IIS server where the .NET application pool is hosted.
    • Example: cd c:\support
    • .\enabletls12.ps1
    • .\testtls.ps1
  • Your test output should look like the following screenshot.
  • Test your web application again to see if the errors are resolved.EnableTLS12.ps1
Enabletls12.ps1

If (-Not (Test-Path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319'))
{
    New-Item 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Name 'SystemDefaultTlsVersions' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Name 'SchUseStrongCrypto' -Value '1' -PropertyType 'DWord' -Force | Out-Null

If (-Not (Test-Path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319'))
{
    New-Item 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Name 'SystemDefaultTlsVersions' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Name 'SchUseStrongCrypto' -Value '1' -PropertyType 'DWord' -Force | Out-Null

If (-Not (Test-Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server'))
{
    New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Name 'Enabled' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Name 'DisabledByDefault' -Value '0' -PropertyType 'DWord' -Force | Out-Null

If (-Not (Test-Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client'))
{
    New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Name 'Enabled' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Name 'DisabledByDefault' -Value '0' -PropertyType 'DWord' -Force | Out-Null

Write-Host 'TLS 1.2 has been enabled. You must restart the Windows Server for the changes to take affect.' -ForegroundColor Cyan

testtls.ps1

Function Get-ADSyncToolsTls12RegValue
{
    [CmdletBinding()]
    Param
    (
        # Registry Path
        [Parameter(Mandatory=$true,
                   Position=0)]
        [string]
        $RegPath,

# Registry Name
        [Parameter(Mandatory=$true,
                   Position=1)]
        [string]
        $RegName
    )
    $regItem = Get-ItemProperty -Path $RegPath -Name $RegName -ErrorAction Ignore
    $output = "" | select Path,Name,Value
    $output.Path = $RegPath
    $output.Name = $RegName

If ($regItem -eq $null)
    {
        $output.Value = "Not Found"
    }
    Else
    {
        $output.Value = $regItem.$RegName
    }
    $output
}

$regSettings = @()
$regKey = 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SystemDefaultTlsVersions'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SchUseStrongCrypto'

$regKey = 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SystemDefaultTlsVersions'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SchUseStrongCrypto'

$regKey = 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'Enabled'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'DisabledByDefault'

$regKey = 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'Enabled'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'DisabledByDefault'

$regSettings

 

Vendor
Web Link
Date Entered 6/11/2024
You Tube Link
Type Of Article Support
Article ID 5723


  Copyright    Lietz Development, Inc. 1996. All Rights Reserved.