Question: Why does the Centrify Connector keep enabling TLS 1.1?
Answer: The connector has generic support for TLS and enabling TLS 1.1 doesn't cause it be used, only enables it to be supported, if needed by the underlying OS.
To disable the automatic enabling of TLS 1.1, create a string registry setting for the connector (under HKEY_LOCAL_MACHINE\SOFTWARE\Centrify\Cloud\):
Value: TLS 1.1
Note the space in the value, between 'TLS' and '1.1'
(For more information on the connectorProtocolBypassList registry setting and the valid values that can be set, please see section, Impact on Connectors, in Knowledgebase article KB-10288: Deprecation of TLS 1.0)
Shutdown and restart the connector (may also need to reboot the host).
To verify the connector has picked up the registry setting for connectorProtocolBypassList, the connector logs ("C:\Program Files\Centrify\Centrify Connector\log.txt") can be checked after the connector restart. The logs will contain an entry, stating, "Protocols specified in protocolBypassList are..." and another entry stating, "SupportedProtocols set to..."
Example from Connector log:
2021-01-04 17:23:38,281 [P-Centrify.Cloud.Core.ProxyHost.exe-1084|ABC0123|7db56543-beed-473d-9a8a-a12345aa731e|0cd0cf05951940039523ae56c7777aa0|4|348|DEBUG] ADService: Protocols specified in protocolBypassList are TLS 1.1
2021-01-04 17:23:38,281 [P-Centrify.Cloud.Core.ProxyHost.exe-1084|ABC0123|7db56543-beed-473d-9a8a-a12345aa731e|0cd0cf05951940039523ae56c7777aa0|4|354|DEBUG] ADService: SystemSettings: SupportedProtocols set to Tls12
Disable the TLS 1.1 protocol registry settings for both Client and Server (under HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\)
by setting the following keys as below:
The connector should no longer change the TLS 1.1 protocol settings.
Note: The connector always uses TLS 1.2 if the remote host supports TLS 1.2. TLS 1.1 will be removed once it is no longer supported.