How to Disable the Use of TLSv1.0 within a Secure Global Desktop 5.2 Deployment (Doc ID 2171103.1)

Last updated on JANUARY 10, 2017

Applies to:

Oracle Secure Global Desktop - Version 5.2 to 5.2 [Release 5.0]
Information in this document applies to any platform.

Goal

This document outlines the procedure to disable the use of the TLSv1.0 Protocol within a Secure Global Desktop (SGD) 5.2 Deployment, as is enabled by default. This action may be taken by an SGD Administrator who is working to curate the list of available ciphers that is presented to connecting clients in order to meet site-specific security or auditing requirements.

Please Note:  this configuration change will reduce the list of cipher suites and protocols that the SGD web server will support, which may have an impact on the supported clients connecting to the customized SGD server. Specifically: any client that was relying on the use of TLSv1.0 Ciphers/Protocols will no longer able to connect to SGD or the SGDGW after these changes have been applied.  We expect this will particularly impact clients running older versions of browsers, as well as some releases of Java 6 and Java 7 of the Java plug-in.

For this reason, this guidance is provided AS-IS, and the SGD (and site) Administrators should thoroughly test any changes of this type with a range of clients representative of the user base before applying this update to a production deployment.

 

Solution

Sign In with your My Oracle Support account

Don't have a My Oracle Support account? Click to get started

My Oracle Support provides customers with access to over a
Million Knowledge Articles and hundreds of Community platforms