Home

  
 
 

Search Knowledge Base


Knowledge Base Web View
Total Records: 106
ID Title Type Of Article
403 
Android Player Setup for Ping HD Signage Program Engage PHD Support
319 
Submit a Ticket on Scorpion Interactive - Client Facing How To
312 
Conference Call Setup with 3CX Windows Client How To
309 
Florida Uniform Trade Secrets Act 2018 Company Policy
304 
Creating a Sales Order in Scorpion How To
273 
Offboarding Checklist New Client
259 
Bay Dermatology Data-Center and Citrix Migration to 2X RAS on Data-Tech Cloud Services Case Study
258 
SOPHOS XG Licensing Guide Support
257 
Windows 10 1803 Redstone 4 Upgrade Support
236 
Using DocuSign for Quotes in Scorpion Workflow
223 
Marketing Monthly Reporting Information Support
222 
Onboarding VMS check List New Client
221 
New Customer: Billing, Collecting, Memorized Transaction Support
217 
Deploy Kaseya Script to Install Symantec Antivirus in Server Support
204 
Outlook Connection Status Window Support
195 
3CX Adding BLF Settings across multiple extensions in the Management Console Support
161 
Distribution Group Mail Flow Support
132 
MS Access System Resources Exceeded Error Support
121 
Dell OptiPlex 9020 All IN One Knowledge Base Resource Support
120 
Telnet to device not working externally but does internally Support
116 
Install & Configure Sonicwall NSA 220 Lan Analyzer Software How To
113 
Internet Explorer Slow Support
109 
Active Directory Domain Naming Considerations Support
101 
RETRIEVE AN ONT OR MODULE INVENTORY REPORT IN AXSVISION How To
99 
Converting ASYNCC to ASYNCD Cards in an OLT Support
Add New  Records per page  4 of 5   
Engage Knowledge Base Web View         Support          Print
Title How to enable TLS1.2 for .net framework on IIS Web Server      
Resolution

Issue: .NET application pool attempts to establish an SSL/TLS connection to a third-party service or API and encounters errors.

Possible Errors:

  • The client and server cannot communicate, because they do not possess a common algorithm.
  • Could not create SSL/TLS Secure Channel.

Resolution: To resolve the above issues, follow these steps:

  • Copy the script text and save as enabletls12.ps1 and testtls.ps1 on the web server, example directory C:\support.
  • Run the scripts from elevated powershell on the IIS server where the .NET application pool is hosted.
    • Example: cd c:\support
    • .\enabletls12.ps1
    • .\testtls.ps1
  • Your test output should look like the following screenshot.
  • Test your web application again to see if the errors are resolved.EnableTLS12.ps1
Enabletls12.ps1

If (-Not (Test-Path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319'))
{
    New-Item 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Name 'SystemDefaultTlsVersions' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Name 'SchUseStrongCrypto' -Value '1' -PropertyType 'DWord' -Force | Out-Null

If (-Not (Test-Path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319'))
{
    New-Item 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Name 'SystemDefaultTlsVersions' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Name 'SchUseStrongCrypto' -Value '1' -PropertyType 'DWord' -Force | Out-Null

If (-Not (Test-Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server'))
{
    New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Name 'Enabled' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Name 'DisabledByDefault' -Value '0' -PropertyType 'DWord' -Force | Out-Null

If (-Not (Test-Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client'))
{
    New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Force | Out-Null
}
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Name 'Enabled' -Value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Name 'DisabledByDefault' -Value '0' -PropertyType 'DWord' -Force | Out-Null

Write-Host 'TLS 1.2 has been enabled. You must restart the Windows Server for the changes to take affect.' -ForegroundColor Cyan

testtls.ps1

Function Get-ADSyncToolsTls12RegValue
{
    [CmdletBinding()]
    Param
    (
        # Registry Path
        [Parameter(Mandatory=$true,
                   Position=0)]
        [string]
        $RegPath,

# Registry Name
        [Parameter(Mandatory=$true,
                   Position=1)]
        [string]
        $RegName
    )
    $regItem = Get-ItemProperty -Path $RegPath -Name $RegName -ErrorAction Ignore
    $output = "" | select Path,Name,Value
    $output.Path = $RegPath
    $output.Name = $RegName

If ($regItem -eq $null)
    {
        $output.Value = "Not Found"
    }
    Else
    {
        $output.Value = $regItem.$RegName
    }
    $output
}

$regSettings = @()
$regKey = 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SystemDefaultTlsVersions'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SchUseStrongCrypto'

$regKey = 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SystemDefaultTlsVersions'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'SchUseStrongCrypto'

$regKey = 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'Enabled'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'DisabledByDefault'

$regKey = 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'Enabled'
$regSettings += Get-ADSyncToolsTls12RegValue $regKey 'DisabledByDefault'

$regSettings

 

Vendor
Web Link
Date Entered 6/11/2024
You Tube Link
Type Of Article Support
Article ID 5723


  Copyright    Lietz Development, Inc. 1996. All Rights Reserved.