Support
 
Phone Live Chat
 
Support
 
US: +1 888 720 9500
US: +1 800 443 6694
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680

Direct Inward Dialing: +1 408 916 9393

 
 
 
 
 
Knowledge Base

How to force your Azure AD Connect server to use only TLS v1.2 when connecting to Microsoft 365?

Note: Microsoft has deprecated TLS 1.0 and TLS 1.1 for most Microsoft 365 services worldwide, rendering TLS 1.2 as the only viable option. As a result, customers who still use TLS 1.0 and 1.1 to communicate to Microsoft 365 via PowerShell from their ADManager Plus server may face some issues in establishing the connection. We advise ADManager Plus customers to enforce TLS 1.2 when connecting to Microsoft 365 to avoid running into connectivity issues.

Objective: To enforce TLS v1.2 when connecting to Microsoft 365.

Solution: Follow the below steps to perform this operation:

  1. Step 1: Right click Windows PowerShell and select Run as administrator.
  2. Step 2: Run Connect-MsolService.
  3. Step 3: Enter the credentials to sign in to your Microsoft account.
  4. Step 4: If TLS v1.2 is not enforced, the below error message will be displayed.

    [System.Net.ServicePointManager]::SecurityProtocol =
    [System.Net.SecurityProtocolType]::Tls12;

    Follow the steps provided in this Microsoft article to enable TLS v1.2 and fix the error.

  5. Step 5: Restart ADManager Plus.

 

Select a language to translate the contents of this web page:

Need further assistance?

Fill this form, and we'll contact you rightaway.

Request Support

  •  
  • *
     
  • *
     
  • *
     
  • By submitting you agree to processing of personal data according to the Privacy Policy.

"Thank you for submitting your request.

Our technical support team will get in touch with you at the earliest."

ADManager Plus Trusted By

The one-stop solution to Active Directory Management and Reporting
Email Download Link email-download-top