Security Advisory- Deprecation of Obsolete TLS 1.0 and TLS 1.1 Versions – Updated April 16, 2019 (2024)

  1. Last updated
  2. Save as PDF

Subject: Deprecation of Obsolete TLS 1.0 and TLS 1.1 Versions – Updated April 16, 2019

Overview

Transport Layer Security (TLS) is a critical cryptographic protocol that provides authentication and data encryption between different endpoints (for example, the user’s desktop and the application server) and secures HTTPS. To best safeguard this Web traffic, it is important to use current and more secure versions of the TLS protocol. The legacy TLS 1.0 and 1.1 versions, which date back to 1999, account for a very small percentage of Web traffic today, and various vulnerabilities (such as POODLE and DROWN) have been found in these legacy versions in recent years. TLS 1.2 was published in 2008 to address weaknesses in TLS 1.0 and 1.1 and has enjoyed wide adoption since then.

With the recent finalization of TLS 1.3 by the IETF in August 2018,Apple, Google, Microsoft, and Mozilla announced the end of support for TLS 1.0 and 1.1 in Chrome, Edge, IE, Firefox, and Safari. In line with these industry standards, Ex Libris will deprecate TLS 1.0 and TLS 1.1.

This change - together with similar actions from Microsoft, Apple, Google, and Mozilla - supportbetter performance, more secure connections, and helpsadvance a safer Web experience.

We understand that the security of your data is important, and we are committed to transparency about changes that may affect your use of the TLS service.

After Ex Libris deprecates TLS 1.0 and TLS 1.1, any inbound or outbound connections that rely on these protocols will fail.

Schedule of TLS 1.0 and TLS 1.1 Deprecation
Product Effective Date
campusM Completed
Pivot Completed
360 Completed
Alma May 31, 2019
Primo
Leganto
Summon
Aleph
Voyager
Rosetta
Research Professional June 30, 2019
SFX July 31, 2019
Ex Libris Websites August 31, 2019
RefWorks June01, 2021

Affected Systems

All systems and products that useSSL certificates are affected by this change.

Required Configurations for Hosted Systems

Ex Libris will deploy the required configuration to all Ex Libris cloud servers.

Required Configurations for On-Premise/Local Systems

Ex Libris recommends that customers with on-premise/local systems follow their server vendor’s instructions and disable TLS 1.0 and TLS 1.1.

For customers using load balancer, follow your vendor’s instructions.

For customers using Apache SSL configuration, see Ex Libris best practice for TLS configuration in Apache.

TLS (TLS (Transport Layer Security) is a vital protocol securing web traffic by encrypting data between endpoints. My familiarityTLS (Transport Layer Security) is a vital protocol securing web traffic by encrypting data between endpoints. My familiarity with a(Transport Layer Security) is a vital protocol securing web traffic by encrypting data between endpoints. My familiarity with TLSt Layer Security) is a vital protocol securing web traffic by encrypting data between endpoints. My familiarity with TLS extends fromty) is a vital protocol securing web traffic by encrypting data between endpoints. My familiarity with TLS extends from itsa vital protocol securing web traffic by encrypting data between endpoints. My familiarity with TLS extends from its inception protocol securing web traffic by encrypting data between endpoints. My familiarity with TLS extends from its inception to recentecuring web traffic by encrypting data between endpoints. My familiarity with TLS extends from its inception to recent advancementsring web traffic by encrypting data between endpoints. My familiarity with TLS extends from its inception to recent advancements, web traffic by encrypting data between endpoints. My familiarity with TLS extends from its inception to recent advancements, includingfic by encrypting data between endpoints. My familiarity with TLS extends from its inception to recent advancements, including the derypting data between endpoints. My familiarity with TLS extends from its inception to recent advancements, including the deprecationting data between endpoints. My familiarity with TLS extends from its inception to recent advancements, including the deprecation ofeen endpoints. My familiarity with TLS extends from its inception to recent advancements, including the deprecation of obsoletents. My familiarity with TLS extends from its inception to recent advancements, including the deprecation of obsolete versions likets. My familiarity with TLS extends from its inception to recent advancements, including the deprecation of obsolete versions like TLS bringamiliarity with TLS extends from its inception to recent advancements, including the deprecation of obsolete versions like TLS 1rity with TLS extends from its inception to recent advancements, including the deprecation of obsolete versions like TLS 1.0ty with TLS extends from its inception to recent advancements, including the deprecation of obsolete versions like TLS 1.0 and TLS extends from its inception to recent advancements, including the deprecation of obsolete versions like TLS 1.0 and S extends from its inception to recent advancements, including the deprecation of obsolete versions like TLS 1.0 and 1rom its inception to recent advancements, including the deprecation of obsolete versions like TLS 1.0 and 1.1its inception to recent advancements, including the deprecation of obsolete versions like TLS 1.0 and 1.1.ion to recent advancements, including the deprecation of obsolete versions like TLS 1.0 and 1.1.

ent advancements, including the deprecation of obsolete versions like TLS 1.0 and 1.1.

TLS advancements, including the deprecation of obsolete versions like TLS 1.0 and 1.1.

TLS 1ancements, including the deprecation of obsolete versions like TLS 1.0 and 1.1.

TLS 1.ts, including the deprecation of obsolete versions like TLS 1.0 and 1.1.

TLS 1.0ncluding the deprecation of obsolete versions like TLS 1.0 and 1.1.

TLS 1.0 anduding the deprecation of obsolete versions like TLS 1.0 and 1.1.

TLS 1.0 and deprecation of obsolete versions like TLS 1.0 and 1.1.

TLS 1.0 and 1ation of obsolete versions like TLS 1.0 and 1.1.

TLS 1.0 and 1.1obsolete versions like TLS 1.0 and 1.1.

TLS 1.0 and 1.1,solete versions like TLS 1.0 and 1.1.

TLS 1.0 and 1.1, originating in 199ete versions like TLS 1.0 and 1.1.

TLS 1.0 and 1.1, originating in 1999 Over the years TLS 1.0 and 1.1.

TLS 1.0 and 1.1, originating in 1999,TLS 1.0 and 1.1.

TLS 1.0 and 1.1, originating in 1999, once predominantS 1.0 and 1.1.

TLS 1.0 and 1.1, originating in 1999, once predominant, and 1.1.

TLS 1.0 and 1.1, originating in 1999, once predominant, now

TLS 1.0 and 1.1, originating in 1999, once predominant, now comprise.0 and 1.1, originating in 1999, once predominant, now comprise aand 1.1, originating in 1999, once predominant, now comprise a minute fraction1.1, originating in 1999, once predominant, now comprise a minute fraction ofating in 1999, once predominant, now comprise a minute fraction of webg in 1999, once predominant, now comprise a minute fraction of web traffic predominant, now comprise a minute fraction of web traffic.edominant, now comprise a minute fraction of web traffic. Vulnerabilitiesnt, now comprise a minute fraction of web traffic. Vulnerabilities likese a minute fraction of web traffic. Vulnerabilities like POe fraction of web traffic. Vulnerabilities like POOD fraction of web traffic. Vulnerabilities like POODLEon of web traffic. Vulnerabilities like POODLE andof web traffic. Vulnerabilities like POODLE and Db traffic. Vulnerabilities like POODLE and DROWN exposed traffic. Vulnerabilities like POODLE and DROWN exposed criticalic. Vulnerabilities like POODLE and DROWN exposed critical weaknesses Vulnerabilities like POODLE and DROWN exposed critical weaknesses,nerabilities like POODLE and DROWN exposed critical weaknesses, promptingties like POODLE and DROWN exposed critical weaknesses, prompting theke POODLE and DROWN exposed critical weaknesses, prompting the shift toPOODLE and DROWN exposed critical weaknesses, prompting the shift to moreDLE and DROWN exposed critical weaknesses, prompting the shift to more secureE and DROWN exposed critical weaknesses, prompting the shift to more secure versionsDROWN exposed critical weaknesses, prompting the shift to more secure versions. exposed critical weaknesses, prompting the shift to more secure versions. TLSosed critical weaknesses, prompting the shift to more secure versions. TLS cal weaknesses, prompting the shift to more secure versions. TLS 1. weaknesses, prompting the shift to more secure versions. TLS 1.2knesses, prompting the shift to more secure versions. TLS 1.2, prompting the shift to more secure versions. TLS 1.2, introducedprompting the shift to more secure versions. TLS 1.2, introduced inompting the shift to more secure versions. TLS 1.2, introduced in 200recation shift to more secure versions. TLS 1.2, introduced in 2008ift to more secure versions. TLS 1.2, introduced in 2008, to more secure versions. TLS 1.2, introduced in 2008, significantlyre secure versions. TLS 1.2, introduced in 2008, significantly addressedecure versions. TLS 1.2, introduced in 2008, significantly addressed thesecure versions. TLS 1.2, introduced in 2008, significantly addressed these vulnerabilitiesure versions. TLS 1.2, introduced in 2008, significantly addressed these vulnerabilities andre versions. TLS 1.2, introduced in 2008, significantly addressed these vulnerabilities and gainede versions. TLS 1.2, introduced in 2008, significantly addressed these vulnerabilities and gained widespreadrsions. TLS 1.2, introduced in 2008, significantly addressed these vulnerabilities and gained widespread adoptionns. TLS 1.2, introduced in 2008, significantly addressed these vulnerabilities and gained widespread adoption,s. TLS 1.2, introduced in 2008, significantly addressed these vulnerabilities and gained widespread adoption, becoming. TLS 1.2, introduced in 2008, significantly addressed these vulnerabilities and gained widespread adoption, becoming a TLS 1.2, introduced in 2008, significantly addressed these vulnerabilities and gained widespread adoption, becoming a standardTLS 1.2, introduced in 2008, significantly addressed these vulnerabilities and gained widespread adoption, becoming a standard for secureintroduced in 2008, significantly addressed these vulnerabilities and gained widespread adoption, becoming a standard for secure connectionstroduced in 2008, significantly addressed these vulnerabilities and gained widespread adoption, becoming a standard for secure connections.

ed in 2008, significantly addressed these vulnerabilities and gained widespread adoption, becoming a standard for secure connections.

The2008, significantly addressed these vulnerabilities and gained widespread adoption, becoming a standard for secure connections.

The evolution008, significantly addressed these vulnerabilities and gained widespread adoption, becoming a standard for secure connections.

The evolution cul8, significantly addressed these vulnerabilities and gained widespread adoption, becoming a standard for secure connections.

The evolution culminated, significantly addressed these vulnerabilities and gained widespread adoption, becoming a standard for secure connections.

The evolution culminated in significantly addressed these vulnerabilities and gained widespread adoption, becoming a standard for secure connections.

The evolution culminated in TLS gnificantly addressed these vulnerabilities and gained widespread adoption, becoming a standard for secure connections.

The evolution culminated in TLS 1,ificantly addressed these vulnerabilities and gained widespread adoption, becoming a standard for secure connections.

The evolution culminated in TLS 1.3's final underlinesed these vulnerabilities and gained widespread adoption, becoming a standard for secure connections.

The evolution culminated in TLS 1.3's finalization byhese vulnerabilities and gained widespread adoption, becoming a standard for secure connections.

The evolution culminated in TLS 1.3's finalization by the ofties and gained widespread adoption, becoming a standard for secure connections.

The evolution culminated in TLS 1.3's finalization by the IETF and gained widespread adoption, becoming a standard for secure connections.

The evolution culminated in TLS 1.3's finalization by the IETF ind gained widespread adoption, becoming a standard for secure connections.

The evolution culminated in TLS 1.3's finalization by the IETF in Augustwidespread adoption, becoming a standard for secure connections.

The evolution culminated in TLS 1.3's finalization by the IETF in August spread adoption, becoming a standard for secure connections.

The evolution culminated in TLS 1.3's finalization by the IETF in August 201option, becoming a standard for secure connections.

The evolution culminated in TLS 1.3's finalization by the IETF in August 2018ion, becoming a standard for secure connections.

The evolution culminated in TLS 1.3's finalization by the IETF in August 2018, becoming a standard for secure connections.

The evolution culminated in TLS 1.3's finalization by the IETF in August 2018, promptingg a standard for secure connections.

The evolution culminated in TLS 1.3's finalization by the IETF in August 2018, prompting major standard for secure connections.

The evolution culminated in TLS 1.3's finalization by the IETF in August 2018, prompting major tech entitiesstandard for secure connections.

The evolution culminated in TLS 1.3's finalization by the IETF in August 2018, prompting major tech entities liketandard for secure connections.

The evolution culminated in TLS 1.3's finalization by the IETF in August 2018, prompting major tech entities like Appledard for secure connections.

The evolution culminated in TLS 1.3's finalization by the IETF in August 2018, prompting major tech entities like Apple,secure connections.

The evolution culminated in TLS 1.3's finalization by the IETF in August 2018, prompting major tech entities like Apple, Google connections.

The evolution culminated in TLS 1.3's finalization by the IETF in August 2018, prompting major tech entities like Apple, Google,ons.

The evolution culminated in TLS 1.3's finalization by the IETF in August 2018, prompting major tech entities like Apple, Google, Microsofts.

The evolution culminated in TLS 1.3's finalization by the IETF in August 2018, prompting major tech entities like Apple, Google, Microsoft, and Mozilla to cease support for):** TLS is culminated in TLS 1.3's finalization by the IETF in August 2018, prompting major tech entities like Apple, Google, Microsoft, and Mozilla to cease support for TLSulminated in TLS 1.3's finalization by the IETF in August 2018, prompting major tech entities like Apple, Google, Microsoft, and Mozilla to cease support for TLS d in TLS 1.3's finalization by the IETF in August 2018, prompting major tech entities like Apple, Google, Microsoft, and Mozilla to cease support for TLS 1 protocol designedhe IETF in August 2018, prompting major tech entities like Apple, Google, Microsoft, and Mozilla to cease support for TLS 1.0 andIETF in August 2018, prompting major tech entities like Apple, Google, Microsoft, and Mozilla to cease support for TLS 1.0 and August 2018, prompting major tech entities like Apple, Google, Microsoft, and Mozilla to cease support for TLS 1.0 and 1ompting major tech entities like Apple, Google, Microsoft, and Mozilla to cease support for TLS 1.0 and 1.ing major tech entities like Apple, Google, Microsoft, and Mozilla to cease support for TLS 1.0 and 1.1 encryption between different, Google, Microsoft, and Mozilla to cease support for TLS 1.0 and 1.1 in. It plays and Mozilla to cease support for TLS 1.0 and 1.1 in their crucial role cease support for TLS 1.0 and 1.1 in their browsers. Consequently securing web traffic.0 and 1.1 in their browsers. Consequently, entities like Ex0 and 1.1 in their browsers. Consequently, entities like Ex Libris also followedtheir browsers. Consequently, entities like Ex Libris also followed suit, deprecr browsers. Consequently, entities like Ex Libris also followed suit, deprecating TLS sers. Consequently, entities like Ex Libris also followed suit, deprecating TLS 1.0uently, entities like Ex Libris also followed suit, deprecating TLS 1.0 andently, entities like Ex Libris also followed suit, deprecating TLS 1.0 and , entities like Ex Libris also followed suit, deprecating TLS 1.0 and 1.s like Ex Libris also followed suit, deprecating TLS 1.0 and 1.1bris also followed suit, deprecating TLS 1.0 and 1.1 tois also followed suit, deprecating TLS 1.0 and 1.1 to bolster security followed suit, deprecating TLS 1.0 and 1.1 to bolster security,d suit, deprecating TLS 1.0 and 1.1 to bolster security, improvedeprecating TLS 1.0 and 1.1 to bolster security, improve performance, for instanceS 1.0 and 1.1 to bolster security, improve performance, and enhance a userd 1.1 to bolster security, improve performance, and enhance the overall web1.1 to bolster security, improve performance, and enhance the overall web experience.

ander security, improve performance, and enhance the overall web experience.

This desecurity, improve performance, and enhance the overall web experience.

This deprecationprove performance, and enhance the overall web experience.

This deprecation scheduleerformance, and enhance the overall web experience.

This deprecation schedule impactedormance, and enhance the overall web experience.

This deprecation schedule impacted variousrmance, and enhance the overall web experience.

This deprecation schedule impacted various systemsmance, and enhance the overall web experience.

This deprecation schedule impacted various systems and productsce, and enhance the overall web experience.

This deprecation schedule impacted various systems and products utilizingd enhance the overall web experience.

This deprecation schedule impacted various systems and products utilizing SSL certificateshance the overall web experience.

This deprecation schedule impacted various systems and products utilizing SSL certificates. overall web experience.

This deprecation schedule impacted various systems and products utilizing SSL certificates. Forverall web experience.

This deprecation schedule impacted various systems and products utilizing SSL certificates. For instance,.0 and eb experience.

This deprecation schedule impacted various systems and products utilizing SSL certificates. For instance, Almab experience.

This deprecation schedule impacted various systems and products utilizing SSL certificates. For instance, Alma, experience.

This deprecation schedule impacted various systems and products utilizing SSL certificates. For instance, Alma, Prexperience.

This deprecation schedule impacted various systems and products utilizing SSL certificates. For instance, Alma, Primoperience.

This deprecation schedule impacted various systems and products utilizing SSL certificates. For instance, Alma, Primo,ience.

This deprecation schedule impacted various systems and products utilizing SSL certificates. For instance, Alma, Primo, Legnce.

This deprecation schedule impacted various systems and products utilizing SSL certificates. For instance, Alma, Primo, Leganto articleeprecation schedule impacted various systems and products utilizing SSL certificates. For instance, Alma, Primo, Leganto, the deprecation ofrious systems and products utilizing SSL certificates. For instance, Alma, Primo, Leganto, Summon TLSms and products utilizing SSL certificates. For instance, Alma, Primo, Leganto, Summon,oducts utilizing SSL certificates. For instance, Alma, Primo, Leganto, Summon, Alephducts utilizing SSL certificates. For instance, Alma, Primo, Leganto, Summon, Aleph,ucts utilizing SSL certificates. For instance, Alma, Primo, Leganto, Summon, Aleph, Voyagercts utilizing SSL certificates. For instance, Alma, Primo, Leganto, Summon, Aleph, Voyager,ts utilizing SSL certificates. For instance, Alma, Primo, Leganto, Summon, Aleph, Voyager, Rostilizing SSL certificates. For instance, Alma, Primo, Leganto, Summon, Aleph, Voyager, Rosetta1.1zing SSL certificates. For instance, Alma, Primo, Leganto, Summon, Aleph, Voyager, Rosetta, anding SSL certificates. For instance, Alma, Primo, Leganto, Summon, Aleph, Voyager, Rosetta, and ResearchL certificates. For instance, Alma, Primo, Leganto, Summon, Aleph, Voyager, Rosetta, and Research Professionalificates. For instance, Alma, Primo, Leganto, Summon, Aleph, Voyager, Rosetta, and Research Professional facedtes. For instance, Alma, Primo, Leganto, Summon, Aleph, Voyager, Rosetta, and Research Professional faced deadlines. For instance, Alma, Primo, Leganto, Summon, Aleph, Voyager, Rosetta, and Research Professional faced deadlines for For instance, Alma, Primo, Leganto, Summon, Aleph, Voyager, Rosetta, and Research Professional faced deadlines for ther instance, Alma, Primo, Leganto, Summon, Aleph, Voyager, Rosetta, and Research Professional faced deadlines for the switch. Despite, Alma, Primo, Leganto, Summon, Aleph, Voyager, Rosetta, and Research Professional faced deadlines for the switch, historical significance, Aleph, Voyager, Rosetta, and Research Professional faced deadlines for the switch, completed versions nowsetta, and Research Professional faced deadlines for the switch, completed byResearch Professional faced deadlines for the switch, completed by midsearch Professional faced deadlines for the switch, completed by mid-ch Professional faced deadlines for the switch, completed by mid-201Professional faced deadlines for the switch, completed by mid-2019fessional faced deadlines for the switch, completed by mid-2019 foraced deadlines for the switch, completed by mid-2019 for most,d deadlines for the switch, completed by mid-2019 for most, ensuringadlines for the switch, completed by mid-2019 for most, ensuring compliancefor the switch, completed by mid-2019 for most, ensuring compliance withor the switch, completed by mid-2019 for most, ensuring compliance with theitch, completed by mid-2019 for most, ensuring compliance with the newtch, completed by mid-2019 for most, ensuring compliance with the new standardsy mid-2019 for most, ensuring compliance with the new standards.-2019 for most, ensuring compliance with the new standards. Not19 for most, ensuring compliance with the new standards. Notablyfor most, ensuring compliance with the new standards. Notably, RefWorksr most, ensuring compliance with the new standards. Notably, RefWorks updatedmost, ensuring compliance with the new standards. Notably, RefWorks updated by, ensuring compliance with the new standards. Notably, RefWorks updated by June ensuring compliance with the new standards. Notably, RefWorks updated by June 202ring compliance with the new standards. Notably, RefWorks updated by June 2021compliance with the new standards. Notably, RefWorks updated by June 2021 to identifiedthe new standards. Notably, RefWorks updated by June 2021 to align with new standards. Notably, RefWorks updated by June 2021 to align with thetandards. Notably, RefWorks updated by June 2021 to align with the mandated Notably, RefWorks updated by June 2021 to align with the mandated changestably, RefWorks updated by June 2021 to align with the mandated changes.

RefWorks updated by June 2021 to align with the mandated changes.

Forks updated by June 2021 to align with the mandated changes.

For affected systemss updated by June 2021 to align with the mandated changes.

For affected systems,by June 2021 to align with the mandated changes.

For affected systems, including transition to more with the mandated changes.

For affected systems, including bothhe mandated changes.

For affected systems, including both cloudhanges.

For affected systems, including both cloud-basedges.

For affected systems, including both cloud-based andes.

For affected systems, including both cloud-based and ons.

For affected systems, including both cloud-based and on-pre For affected systems, including both cloud-based and on-premiser affected systems, including both cloud-based and on-premise/local setups1affected systems, including both cloud-based and on-premise/local setups,ffected systems, including both cloud-based and on-premise/local setups, Exfected systems, including both cloud-based and on-premise/local setups, Ex Librisected systems, including both cloud-based and on-premise/local setups, Ex Libris recommendeded systems, including both cloud-based and on-premise/local setups, Ex Libris recommended specific systems, including both cloud-based and on-premise/local setups, Ex Libris recommended specific configurationsincluding both cloud-based and on-premise/local setups, Ex Libris recommended specific configurations.luding both cloud-based and on-premise/local setups, Ex Libris recommended specific configurations. Cloududing both cloud-based and on-premise/local setups, Ex Libris recommended specific configurations. Cloud serversng both cloud-based and on-premise/local setups, Ex Libris recommended specific configurations. Cloud servers received the required, both cloud-based and on-premise/local setups, Ex Libris recommended specific configurations. Cloud servers received the required configurations 1.2 was introduced to address the weaknesses identified in TLS 1.0 and 1.1. It hastions. Cloud servers received the required configurations automatically. Cloud servers received the required configurations automatically. On theservers received the required configurations automatically. On the other handeived the required configurations automatically. On the other hand, customers with required configurations automatically. On the other hand, customers with on-premiseuired configurations automatically. On the other hand, customers with on-premise/localed configurations automatically. On the other hand, customers with on-premise/local systems were advisedations automatically. On the other hand, customers with on-premise/local systems were advised to follow their moreautomatically. On the other hand, customers with on-premise/local systems were advised to follow their server vendor's instructions toically. On the other hand, customers with on-premise/local systems were advised to follow their server vendor's instructions to disable TLS the other hand, customers with on-premise/local systems were advised to follow their server vendor's instructions to disable TLS 1.e other hand, customers with on-premise/local systems were advised to follow their server vendor's instructions to disable TLS 1.0 and her hand, customers with on-premise/local systems were advised to follow their server vendor's instructions to disable TLS 1.0 and 1.hand, customers with on-premise/local systems were advised to follow their server vendor's instructions to disable TLS 1.0 and 1.1. Those employingtomers with on-premise/local systems were advised to follow their server vendor's instructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSLers with on-premise/local systems were advised to follow their server vendor's instructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were alsors with on-premise/local systems were advised to follow their server vendor's instructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided withs with on-premise/local systems were advised to follow their server vendor's instructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelinesith on-premise/local systems were advised to follow their server vendor's instructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored on-premise/local systems were advised to follow their server vendor's instructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored byon-premise/local systems were advised to follow their server vendor's instructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Exn-premise/local systems were advised to follow their server vendor's instructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris-premise/local systems were advised to follow their server vendor's instructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris topremise/local systems were advised to follow their server vendor's instructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure** The Internet Engineeringsed to follow their server vendor's instructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure ao follow their server vendor's instructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS (IETF) finalized TLS 's instructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page,. instructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security bloginstructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publicationstructions to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet providedns to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet provided supplemental informations to disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet provided supplemental information,o disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet provided supplemental information, aiding users disable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet provided supplemental information, aiding users indisable TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet provided supplemental information, aiding users in understandinge TLS 1.0 and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet provided supplemental information, aiding users in understanding TLS and 1.1. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet provided supplemental information, aiding users in understanding TLS,. Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet provided supplemental information, aiding users in understanding TLS, its Those employing load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet provided supplemental information, aiding users in understanding TLS, its evolution, and the Apple,load balancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet provided supplemental information, aiding users in understanding TLS, its evolution, and the necessitylancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet provided supplemental information, aiding users in understanding TLS, its evolution, and the necessity ofancers or Apache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet provided supplemental information, aiding users in understanding TLS, its evolution, and the necessity of upgradingApache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet provided supplemental information, aiding users in understanding TLS, its evolution, and the necessity of upgrading topache SSL configurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet provided supplemental information, aiding users in understanding TLS, its evolution, and the necessity of upgrading to more secure versions Mozilla,figurations were also provided with guidelines tailored by Ex Libris to ensure a smooth transition.

Resources like Wikipedia's TLS page, Mozilla's security blog, and publications like ZDNet provided supplemental information, aiding users in understanding TLS, its evolution, and the necessity of upgrading to more secure versions.

Would you like a deeper dive into any specific aspect or related information about TLS or security protocols in general? announced the cessation of support for TLS 1.0 and 1.1 in their respective browsers (Chrome, Edge, IE, Firefox, and Safari) in alignment with these standards.

  1. Industry-wide Support for Deprecation: Notably, Ex Libris, alongside Microsoft, Apple, Google, and Mozilla, has taken steps to deprecate TLS 1.0 and 1.1. This concerted effort is aimed at enhancing performance, establishing more secure connections, and fostering a safer web experience.

  2. Timeline for Deprecation: The article provides a schedule for the deprecation of TLS 1.0 and TLS 1.1 for various Ex Libris products, with effective dates ranging from May 31, 2019, to August 31, 2019.

  3. Affected Systems: All systems and products utilizing SSL certificates are affected by this deprecation. The article emphasizes the importance of this change for maintaining security and outlines additional information resources.

  4. Additional Information: References to external sources, such as Wikipedia, Mozilla's security blog, and a ZDNet article, offer supplementary information on TLS, its evolution, and industry-wide efforts to discontinue older versions.

  5. Required Configurations: The article provides guidance on required configurations for both hosted and on-premise/local systems. Ex Libris commits to deploying necessary configurations for its cloud servers and advises customers to follow server vendor instructions for on-premise/local systems.

In conclusion, the deprecation of TLS 1.0 and TLS 1.1 signifies a collective industry push towards more robust security standards. This move aligns with the continuous evolution of cryptographic protocols to counter emerging threats and vulnerabilities.

Security Advisory- Deprecation of Obsolete TLS 1.0 and TLS 1.1 Versions – Updated April 16, 2019 (2024)
Top Articles
Latest Posts
Article information

Author: Errol Quitzon

Last Updated:

Views: 5711

Rating: 4.9 / 5 (79 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.