Home

  
 
 

Search Knowledge Base


Knowledge Base Web View
Total Records: 106
ID Title Type Of Article
309 
Florida Uniform Trade Secrets Act 2018 Company Policy
728 
Cell Phone Policy for Conference Rooms and Meetings Company Policy
1177 
MS365 Updates March 2022 Document
101 
RETRIEVE AN ONT OR MODULE INVENTORY REPORT IN AXSVISION How To
488 
Adding Messages with URL to Support Portal Message Center How To
319 
Submit a Ticket on Scorpion Interactive - Client Facing How To
312 
Conference Call Setup with 3CX Windows Client How To
116 
Install & Configure Sonicwall NSA 220 Lan Analyzer Software How To
304 
Creating a Sales Order in Scorpion How To
643 
How To Find PC Name How To
649 
Engage Online Portal Export Reports to Excel How To
660 
3CX Client How to setup Auto Status Change on Workstation Idle How To
671 
Use Eversign with Engage for Digital Signatures on Quotes, Work Orders, Invoices and More How To
675 
Browser Emulation Settings in the Registry allows IE version for specific applications How To
694 
QuickBooks Stop from retaining Last Logged-In User on Startup of QuickBooks How To
723 
Office 365 Appointment Feature Meeting Poll How To
730 
Parallels Connection Mode Change How To
778 
TPM Installed on Cheetah requires correct BIOS Version How To
1024 
Setup Access to Compliance File Manager on SI Portal How To
1028 
New Feature for Quote Module ---- Quotation Expiration Notice: How To
1031 
Create and Edit Disclaimer Footers for Engage Reports and Forms How To
1056 
How to backup and restore Taskbar Pinned Apps How To
1130 
How to create a Fillable PDF from Engage Check List How To
1145 
Export Gmail and Import into Outlook How To
1155 
Change your Microsoft 365 for business password to keep your account secure How To
Add New  Records per page  2 of 5   
Engage Knowledge Base Web View         Support          Print
Title How to enable TLS1.2 for .net framework on IIS Web Server      
Resolution

Issue: .NET application pool attempts to establish an SSL/TLS connection to a third-party service or API and encounters errors.

Possible Errors:

  • The client and server cannot communicate, because they do not possess a common algorithm.
  • Could not create SSL/TLS Secure Channel.

Resolution: To resolve the above issues, follow these steps:

  • Copy the script text and save as enabletls12.ps1 and testtls.ps1 on the web server, example directory C:\support.
  • Run the scripts from elevated powershell on the IIS server where the .NET application pool is hosted.
    • Example: cd c:\support
    • .\enabletls12.ps1
    • .\testtls.ps1
  • Your test output should look like the following screenshot.
  • Test your web application again to see if the errors are resolved.EnableTLS12.ps1
Enabletls12.ps1

If (-Not (Test-Path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319'))
{
    New-Item 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Name 'SystemDefaultTlsVersions' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Name 'SchUseStrongCrypto' -Value '1' -PropertyType 'DWord' -Force | Out-Null

If (-Not (Test-Path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319'))
{
    New-Item 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Name 'SystemDefaultTlsVersions' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Name 'SchUseStrongCrypto' -Value '1' -PropertyType 'DWord' -Force | Out-Null

If (-Not (Test-Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server'))
{
    New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Name 'Enabled' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Name 'DisabledByDefault' -Value '0' -PropertyType 'DWord' -Force | Out-Null

If (-Not (Test-Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client'))
{
    New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Name 'Enabled' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Name 'DisabledByDefault' -Value '0' -PropertyType 'DWord' -Force | Out-Null

Write-Host 'TLS 1.2 has been enabled. You must restart the Windows Server for the changes to take affect.' -ForegroundColor Cyan

testtls.ps1

Function Get-ADSyncToolsTls12RegValue
{
    [CmdletBinding()]
    Param
    (
        # Registry Path
        [Parameter(Mandatory=$true,
                   Position=0)]
        [string]
        $RegPath,

# Registry Name
        [Parameter(Mandatory=$true,
                   Position=1)]
        [string]
        $RegName
    )
    $regItem = Get-ItemProperty -Path $RegPath -Name $RegName -ErrorAction Ignore
    $output = "" | select Path,Name,Value
    $output.Path = $RegPath
    $output.Name = $RegName

If ($regItem -eq $null)
    {
        $output.Value = "Not Found"
    }
    Else
    {
        $output.Value = $regItem.$RegName
    }
    $output
}

$regSettings = @()
$regKey = 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SystemDefaultTlsVersions'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SchUseStrongCrypto'

$regKey = 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SystemDefaultTlsVersions'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SchUseStrongCrypto'

$regKey = 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'Enabled'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'DisabledByDefault'

$regKey = 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'Enabled'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'DisabledByDefault'

$regSettings

 

Vendor
Web Link
Date Entered 6/11/2024
You Tube Link
Type Of Article Support
Article ID 5723


  Copyright    Lietz Development, Inc. 1996. All Rights Reserved.