Eloqua Product Notice: Supported Cipher Suite Changes (Updated - Nov 2020)
Oracle Eloqua had announced that, with the 20D release (Nov 2020), support for the following cipher suites would be removed:
They were removed with the 20D release, but as of Nov 23 (POD7) and Nov 24 (POD 1, 2, 3, 4, and 6) have now been temporarily reinstated. Rest assured, if your organization had already made changes, there will be no ill effects as a result of the reinstated cipher suites.
While not currently available, a new date will be provided for when these above mentioned cipher suites will no longer be supported.Additional Resources
More information can be found in our product notice.
With the arrival of Eloqua 20D release (Nov 2020), Oracle will be modifying its supported cipher suites used for Transport Layer Security (TLS) connections to Eloqua. This includes programmatic access to Eloqua via APIs.
With 20D, support for the following cipher suites will be removed:
The following cipher suites will remain supported:
With the arrival of Eloqua 20D release (Nov 2020), Oracle will be modifying its supported cipher suites used for Transport Layer Security (TLS) connections to Eloqua. Changes will be made on:
- POD 7: Nov 18, 2020.
- POD 1, 2, 3, 4, and 6: Nov 20, 2020.
All access to Eloqua using a secure connection must support one of the following cipher suites:
Verify that all applications accessing Eloqua, including custom apps, support at least one of these ciphers. If none of these ciphers are supported for an application accessing Eloqua, access will not be possible.
There are several publicly available tools to test available cipher suites for a given application. Also note that all web browser versions supported by Eloqua will not be affected by this change.
Information on cipher suites for Microsoft Operating systems can be found here: https://msdn.microsoft.com/en-us/library/windows/desktop/aa374757%28v=vs.85%29.aspx.
View changes for Eloqua's APIs including, new features, significant recent changes, and platform notices, on the Eloqua Developer Changelog.
Q: Why are these ciphers being deprecated?
A: Oracle wants to provide the most secure applications. After deprecation of the cipher suites listed in this announcement, the remaining supported cipher suites are considered to be the most commonly used and secure ciphers.
Q: How can I verify if my applications will still work properly after deprecation?
A: There are several public and free SSL testing/reporting suites available. Also, documentation for web browsers and application programming interfaces (APIs) typically highlight supported cipher suites.