11/12/2024 | Press release | Distributed by Public on 11/12/2024 17:10
IMPORTANT: Starting May 1, 2025, Salesforce will phase out RSA Key Exchanges for TLS connections.
Salesforce is enhancing Transport Layer Security (TLS) measures for customers. Starting May 1, 2025, Salesforce will no longer support RSA key exchanges for all incoming TLS connections. TLS 1.3 will become the preferred protocol for Salesforce, but TLS 1.2 will continue to be supported since it meets the requirement for Perfect Forward Secrecy (PFS). This decision is part of a broader effort to phase out legacy encryption methods in accordance with industry standards. Here's how customers can prepare for the upcoming transition.
To establish secure network connections, TLS uses key exchanges during the handshake process. Historically, TLS has allowed the choice of either static RSA keys or Elliptic Curve Diffie-Hellman Ephemeral (ECDHE) keys for this exchange. However, there are a few risks to be aware of when using RSA keys. Legacy encryption systems often have vulnerabilities, leading to an increased risk of data breaches, brute force attacks, and man-in-the-middle (MITM) attacks. To learn more about encryption, check out this article on What is Data Encryption, And How Does It Work.
So, why is Salesforce moving to TLS 1.3? Starting in September 2024, NIST recommends that applications support TLS 1.3 for its enhanced security features and its ability to support post-quantum cryptography. As part of our ongoing efforts to eliminate outdated encryption techniques, we're discontinuing the use of RSA keys in favor of TLS 1.3.
Salesforce's implementation of TLS 1.3 for incoming connections to Hyperforce and organizations using the Salesforce Edge Network is a significant advancement in security, providing improved encryption.
This new process ensures that data transmitted between customers and Salesforce is more secure, reducing the risk of interception or unauthorized access:
Customers can still use TLS 1.2 with compliant cipher suites. Sales Cloud, Service Cloud, and Experience Cloud support TLS 1.3 for all connections, providing enhanced security for those interactions when TLS 1.3 is used.
To ensure a smooth transition and maintain compatibility with Salesforce services, customers need to make some adjustments to their software environment, specifically regarding Advanced Encryption Standard (AES). This will help avoid potential disruptions in network connections.
If you are using Sales Cloud, Service Cloud, or Experience Cloud, you'll need to properly configure your encryption to make sure it's compatible with your software environment. There are two options customers can choose from to ensure your systems are secure and up-to-date before moving forward:
NOTE: Moving away from RSA key exchanges also means phasing out older AES cipher suites that use SHA-1 signatures. Starting on May 1, 2025, Salesforce plans to only support cipher suites with SHA-2 signatures, either 256 bits or 384 bits. For a list of supported cipher suites, please read this help article.
Now that you've configured your encryption settings, here's how you can turn on TLS 1.3 or ECDHE key exchanges. We'll require customers to enable either TLS 1.3 or ECDHE key exchanges for this upcoming change by May 1, 2025. TLS 1.3 is preferred. Once you're ready to enable TLS 1.3 or ECDHE, follow these steps:
Note: Turning off RSA key exchanges may disrupt TLS connections behind such logins. If you encounter disruptions, reach out to support via Salesforce Help.
Note: If you're a GovCloud customer, there's no change required from your end. For details, see the Supported Cipher and TLS versions for Government Cloud article.
The decision to deprecate RSA key exchanges is part of a strategic initiative to enhance overall security by retiring outdated encryption methods. If you have further questions or need help with the process, please contact Support via Salesforce Help.
Trust is our #1 value. Explore our resources to learn about our security best practices.
Janhavi is a Product Manager in the Hyperforce Trust Platform team. With a background in cybersecurity, privacy, and product, she is passionate about building usable and delightful security experiences that enable Salesforce's #1 value - Trust.
More by Janhavi