Home

  
 
 

Search Knowledge Base


Knowledge Base Web View
Total Records: 106
ID Title Type Of Article
273 
Offboarding Checklist New Client
304 
Creating a Sales Order in Scorpion How To
309 
Florida Uniform Trade Secrets Act 2018 Company Policy
312 
Conference Call Setup with 3CX Windows Client How To
319 
Submit a Ticket on Scorpion Interactive - Client Facing How To
403 
Android Player Setup for Ping HD Signage Program Engage PHD Support
404 
Adding Media Players to Engage PHD Cloud Manager Support
411 
Introduction to Meraki Cloud Managed Switches Workflow
474 
Windows Startup Folder Location Support
487 
Access Denied on Scorpion Interactive Web Portal Support
488 
Adding Messages with URL to Support Portal Message Center How To
490 
Excel Opens File Very Slowly in Remote Desktop Session RDS Support
517 
500 colours by colour name, Hex value, RGB value and Microsoft Access code number Support
557 
DT Easy Button working with Remote Desktop or Parallels Support
569 
Importance of Company Organizational Chart Company Policy
577 
Access Health Care Physicians, LLC Internet Security and Performance Optimization Case Study
578 
Columbia Restaurant Group Migration Premise to the Cloud Case Study
579 
Data-Tech and Level 3 Communications Create Unique Partnership Case Study
580 
Managed Security Services recovers stolen medical equipment for client Case Study
581 
Property Management IT Services Increases Productivity for Realtor Case Study
582 
Hooters Hotel & Casino Las Vegas – Technology Upgrade and Rollup Case Study
583 
Aaneel Infotech VDI Programmers Project – How to use local USA resources and leverage oversees talent Case Study
584 
Data-Tech Provides Versa Managed Services for Tampa Gastro Group Case Study
585 
Seminole Hard Rock Casino – PCI Compliance for 5 years of data backup on tape Case Study
586 
QuickBooks Multi-Client Management Solution for Renaissance Consulting Case Study
Add New  Records per page  2 of 5   
Engage Knowledge Base Web View         Support          Print
Title How to enable TLS1.2 for .net framework on IIS Web Server      
Resolution

Issue: .NET application pool attempts to establish an SSL/TLS connection to a third-party service or API and encounters errors.

Possible Errors:

  • The client and server cannot communicate, because they do not possess a common algorithm.
  • Could not create SSL/TLS Secure Channel.

Resolution: To resolve the above issues, follow these steps:

  • Copy the script text and save as enabletls12.ps1 and testtls.ps1 on the web server, example directory C:\support.
  • Run the scripts from elevated powershell on the IIS server where the .NET application pool is hosted.
    • Example: cd c:\support
    • .\enabletls12.ps1
    • .\testtls.ps1
  • Your test output should look like the following screenshot.
  • Test your web application again to see if the errors are resolved.EnableTLS12.ps1
Enabletls12.ps1

If (-Not (Test-Path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319'))
{
    New-Item 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Name 'SystemDefaultTlsVersions' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Name 'SchUseStrongCrypto' -Value '1' -PropertyType 'DWord' -Force | Out-Null

If (-Not (Test-Path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319'))
{
    New-Item 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Name 'SystemDefaultTlsVersions' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Name 'SchUseStrongCrypto' -Value '1' -PropertyType 'DWord' -Force | Out-Null

If (-Not (Test-Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server'))
{
    New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Name 'Enabled' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Name 'DisabledByDefault' -Value '0' -PropertyType 'DWord' -Force | Out-Null

If (-Not (Test-Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client'))
{
    New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Name 'Enabled' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Name 'DisabledByDefault' -Value '0' -PropertyType 'DWord' -Force | Out-Null

Write-Host 'TLS 1.2 has been enabled. You must restart the Windows Server for the changes to take affect.' -ForegroundColor Cyan

testtls.ps1

Function Get-ADSyncToolsTls12RegValue
{
    [CmdletBinding()]
    Param
    (
        # Registry Path
        [Parameter(Mandatory=$true,
                   Position=0)]
        [string]
        $RegPath,

# Registry Name
        [Parameter(Mandatory=$true,
                   Position=1)]
        [string]
        $RegName
    )
    $regItem = Get-ItemProperty -Path $RegPath -Name $RegName -ErrorAction Ignore
    $output = "" | select Path,Name,Value
    $output.Path = $RegPath
    $output.Name = $RegName

If ($regItem -eq $null)
    {
        $output.Value = "Not Found"
    }
    Else
    {
        $output.Value = $regItem.$RegName
    }
    $output
}

$regSettings = @()
$regKey = 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SystemDefaultTlsVersions'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SchUseStrongCrypto'

$regKey = 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SystemDefaultTlsVersions'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SchUseStrongCrypto'

$regKey = 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'Enabled'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'DisabledByDefault'

$regKey = 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'Enabled'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'DisabledByDefault'

$regSettings

 

Vendor
Web Link
Date Entered 6/11/2024
You Tube Link
Type Of Article Support
Article ID 5723


  Copyright    Lietz Development, Inc. 1996. All Rights Reserved.