Disable-Tls
Session
Ticket
Key
Syntax
Disable-TlsSessionTicketKey
[-ServiceAccountName] <NTAccount>
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Description
The Disable-TlsSessionTicketKey cmdlet disables an administrator managed Transport Layer Security (TLS) session ticket key for the service account. The cmdlet disables the key for the TLS session by deleting the key and the corresponding rule that uses the key.
When you disable a TLS session ticket key for the service account, the service account cannot decrypt existing TLS session tickets. Disabling the TLS session ticket key can affect the performance of the TLS server. The TLS server cannot create new session tickets and must negotiate session information between the client and the server every time the client connects to the TLS server.
TLS creates a session ticket by using the TLS Session Resumption without Server-Side State mechanism.
For more information, see New-TlsSessionTicketKey or type
Get-Help New-TlsSessionTicketKey
.
Examples
Example 1: Disable a TLS session ticket key.
PS C:\> Disable-TlsSessionTicketKey -ServiceAccountName "NetworkService"
This command disables the TLS session ticket key for the service account named NetworkService.
Required Parameters
Specifies the name of a service account. The cmdlet disables the TLS session ticket key for the service account. Only System, LocalService, NetworkService, and SID of virtual accounts are supported.
Type: | NTAccount |
Position: | 1 |
Default value: | None |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Optional Parameters
Prompts you for confirmation before running the cmdlet.
Type: | SwitchParameter |
Aliases: | cf |
Position: | Named |
Default value: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Shows what would happen if the cmdlet runs. The cmdlet is not run.
Type: | SwitchParameter |
Aliases: | wi |
Position: | Named |
Default value: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |