If your customer reports receiving an email from Salesforce indicating weak cipher suite use by the org, they can create a report to determine which users or integrations are using weak ciphers.
Modern browsers support all recommended, secure cipher suites and even some weak cipher suites for backward compatibility. Browser vendors will manage usable cipher suites via browser updates.
If a given browser shows that it's unable to use any supported cipher, contact the IT department that manages the device the browser resides on.
Third-party websites can be used to report what cipher suites a local browser will support based on the info exchanged when the connection is established.
Qualys SSL Labs Browser Test (look for “Cipher Suites” section).
Use these steps to see which cipher is actually used for a connection with the Chrome browser.
Use these steps to see which cipher is actually used for a connection with the Firefox browser.
The ciphers used when making API calls depend on the tool used to make those calls (for example, cURL uses the OpenSSL toolkit). The following commands can be used to test if an API call can be made from a given host using a specific cipher.
Note: This will only test that the cipher specified in the command works. The API tool making the call will still need to be checked to ensure that it supports the cipher in question.
If your tests fail, contact the IT department that manages your device or the developer team that manages the code that is making the API callout to identify the issue.
A successful connection will output several different details about the connection, including the TLS/SSL cipher.
openssl s_client -connect na202.salesforce.com:443 -cipher ECDHE-RSA-AES128-GCM-SHA256
An unsuccessful connection will output an error such as “no cipher match” or “sslv3 alert handshake failure”.
openssl s_client -connect na202.salesforce.com:443 -cipher PSK-AES128-CBC-SHA![]()
openssl s_client -connect na202.salesforce.com:443 -cipher ECDHE-ECDSA-AES128-GCM-SHA256![]()
If you are currently using Shield Event Monitoring, you may use Enhanced Transaction Security to block user logins with weak ciphers. Salesforce developers, please reference below:
See also:
A list of supported ciphers can be found here:
Salesforce Services and Marketing Cloud supported TLS 1.2 Cipher Suites
Supported Cipher and TLS versions for Government Cloud
000395699

We use three kinds of cookies on our websites: required, functional, and advertising. You can choose whether functional and advertising cookies apply. Click on the different cookie categories to find out more about each category and to change the default settings.
Privacy Statement
Required cookies are necessary for basic website functionality. Some examples include: session cookies needed to transmit the website, authentication cookies, and security cookies.
Functional cookies enhance functions, performance, and services on the website. Some examples include: cookies used to analyze site traffic, cookies used for market research, and cookies used to display advertising that is not directed to a particular individual.
Advertising cookies track activity across websites in order to understand a viewer’s interests, and direct them specific marketing. Some examples include: cookies used for remarketing, or interest-based advertising.