Start a conversation

Resolving TLS Version Incompatibility for Outlook Integration with Pivotal

Overview

When integrating Outlook with Pivotal, you may encounter issues if the system defaults to using TLS 1.3, which is not supported by Pivotal version 6.6.4.*. This can lead to problems with establishing a secure channel for Outlook integration. To resolve this, you need to configure the client to use TLS 1.2 explicitly.

Information

To ensure successful Outlook integration with Pivotal, follow these steps to configure the client to use TLS 1.2:

  1. Modify Registry Settings:
    • Open PowerShell as an administrator.
    • Execute the following commands to enforce TLS 1.2 for the .NET Framework:
  2. Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\.NetFramework\v4.0.30319' -Name 'SchUseStrongCrypto' -Value '1' -Type DWord
    Set-ItemProperty -Path 'HKLM:\SOFTWARE\Wow6432Node\Microsoft\.NetFramework\v4.0.30319' -Name 'SchUseStrongCrypto' -Value '1' -Type DWord
  3. Verify Configuration:
    • Ensure that all other TLS versions are disabled in the registry, except for TLS 1.2.
    • Check that your SQL Server and ODBC connections are configured to support TLS 1.2.

By following these steps, you should be able to resolve the TLS version incompatibility and ensure successful Outlook integration with Pivotal.

Frequently Asked Questions

Why is Outlook integration failing with Pivotal?
Outlook integration may fail if the system defaults to using TLS 1.3, which is not supported by Pivotal version 6.6.4.*. Configuring the client to use TLS 1.2 can resolve this issue.
How can I enforce TLS 1.2 for Outlook integration?
You can enforce TLS 1.2 by modifying registry settings using PowerShell commands to set 'SchUseStrongCrypto' to '1' for the .NET Framework.
What should I do if I continue to experience issues after setting TLS 1.2?
Ensure that all configurations align with TLS 1.2 requirements.
Choose files or drag and drop files
Was this article helpful?
Yes
No
  1. Priyanka Bhotika

  2. Posted

Comments