Skip to content

Commit 938c89c

Browse files
authored
Merge pull request #9380 from MicrosoftDocs/main
Update to Purview article provided by Sathyana
2 parents d9f9221 + 3de8652 commit 938c89c

15 files changed

+289
-893
lines changed

.openpublishing.redirection.json

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13765,6 +13765,41 @@
1376513765
{
1376613766
"source_path": "support/power-platform/power-automate/desktop-flows/office-automation/excel/launch-excel-action-failures.md",
1376713767
"redirect_url": "/troubleshoot/power-platform/power-automate/desktop-flows/office-automation/excel/troubleshoot-excel-errors"
13768+
},
13769+
{
13770+
"source_path": "support/sql/database-engine/install/windows/install-reporting-service.md",
13771+
"redirect_url": "/previous-versions/troubleshoot/sql/install/install-reporting-service",
13772+
"redirect_document_id": false
13773+
},
13774+
{
13775+
"source_path": "support/sql/database-engine/install/windows/issues-install-sql-server.md",
13776+
"redirect_url": "/previous-versions/troubleshoot/sql/install/issues-install-sql-server",
13777+
"redirect_document_id": false
13778+
},
13779+
{
13780+
"source_path": "support/sql/database-engine/install/windows/sql-server-2008-setup-issues.md",
13781+
"redirect_url": "/previous-versions/troubleshoot/sql/install/sql-server-2008-setup-issues",
13782+
"redirect_document_id": false
13783+
},
13784+
{
13785+
"source_path": "support/sql/database-engine/install/windows/sql-server-2012-setup-issues.md",
13786+
"redirect_url": "/previous-versions/troubleshoot/sql/install/sql-server-2012-setup-issues",
13787+
"redirect_document_id": false
13788+
},
13789+
{
13790+
"source_path": "support/sql/database-engine/security/instructions-in-fips-140-2-compliant-mode.md",
13791+
"redirect_url": "/previous-versions/troubleshoot/sql/security/instructions-in-fips-140-2-compliant-mode",
13792+
"redirect_document_id": false
13793+
},
13794+
{
13795+
"source_path": "support/sql/database-engine/security/sql-2014-fips-140-2-compliant-mode.md",
13796+
"redirect_url": "/previous-versions/troubleshoot/sql/security/sql-2014-fips-140-2-compliant-mode",
13797+
"redirect_document_id": false
13798+
},
13799+
{
13800+
"source_path": "support/sql/tools/error-you-run-sqlmaint-utility.md",
13801+
"redirect_url": "/previous-versions/troubleshoot/sql/tools/error-you-run-sqlmaint-utility",
13802+
"redirect_document_id": false
1376813803
}
1376913804
]
1377013805
}

Microsoft365/purview/diagnostics/purview-compliance-diagnostics.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,11 @@ ms.reviewer: shadans, sathyana, meerak, v-shorestris
1515
appliesto:
1616
- Microsoft Purview
1717
search.appverid: MET150
18-
ms.date: 05/05/2025
18+
ms.date: 07/21/2025
1919
---
2020

2121
# Self-help diagnostics for Microsoft Purview
2222

23-
<!-- This article has been reviewed and approved for the specific use of global admin perms. -->
24-
2523
You can run diagnostics to identify and resolve issues in Microsoft Purview. The diagnostics offer insights into known issues and provide instructions to fix them. Although the diagnostics can fix some configuration issues, they don't make changes to your tenant without your consent.
2624

2725
Self-help diagnostics that relate to Microsoft Purview are available in the following locations:
@@ -55,7 +53,7 @@ You can find these diagnostics on the following portal pages:
5553

5654
The following table lists the available diagnostics on **Solutions** pages. You can access the diagnostics by selecting the associated link in the third column. When you're prompted, sign in to the Microsoft Purview portal.
5755

58-
**Note**: To run these diagnostics, you must be a Microsoft 365 global administrator.
56+
**Note**: To run these diagnostics, the minimum requirement is that you're an administrator with the Organization Configuration role assigned to you.
5957

6058
| **Issue** | **Checks performed** | **Solutions page** |
6159
|-|-|-|
Lines changed: 119 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,119 @@
1+
---
2+
title: Use Azure App Service Certificate with Application Gateway
3+
description: Provides detailed steps to use Azure App Service Certificate together with Application Gateway.
4+
author: JarrettRenshaw
5+
ms.author: jarrettr
6+
ms.service: azure-app-service
7+
ms.date: 07/21/2025
8+
ms.reviewer: v-liuamson; v-gsitser
9+
ms.custom: Connection issues with SSL or TLS
10+
---
11+
12+
# Use Azure App Service Certificate with Application Gateway
13+
14+
Microsoft Azure provides various tools and services to secure your web applications by using SSL/TLS certificates. One such offering, the **Azure App Service Certificate**, is tightly integrated with Azure App Services. However, many organizations use **Azure Application Gateway** as a reverse proxy, load balancer, and Web Application Firewall (WAF). Understandably, such organizations want to use the same certificate across all services.
15+
16+
This article provides a comprehensive guide for using App Service Certificates in Application Gateway, including usage steps, restrictions, and best practices. By understanding the limitations and using the Azure Key Vault service effectively, you can build a robust certificate management workflow across both App Services and Application Gateway.
17+
18+
## About App Service Certificate
19+
20+
Azure App Service Certificate is a first-party SSL certificate that's issued by DigiCert or GoDaddy and is designed for use together with Azure App Services. The certificate is stored securely in Azure Key Vault and supports autorenewal if it's integrated correctly.
21+
22+
Key Characteristics:
23+
24+
- Domain-validated SSL certificate
25+
- Designed primarily for Azure App Services
26+
- Stored in a key vault for secure usage
27+
- Autorenewal supported if linked correctly
28+
29+
However, App Service Certificates aren't directly usable in Application Gateway unless you take additional steps.
30+
31+
## How to use App Service Certificate in Application Gateway
32+
33+
You can use App Service Certificate in Azure Application Gateway, but not directly. Application Gateway requires a certificate in `.pfx` format (having a private key) to configure HTTPS listeners. App Service Certificates aren't exposed as downloadable PFXs by default. Therefore, you have to follow specific steps to extract and configure them.
34+
35+
### Option 1: Manual export and upload
36+
37+
1. **Purchase and configure the certificate**: Buy and verify an App Service Certificate through Azure App Service.
38+
39+
2. **Import into Key Vault**: Navigate to the App Service Certificate resource. Then, use the **Key Vault** blade to store the certificate in a key vault of your choice.
40+
41+
3. **Export as .pfx from Key Vault**: Use Azure PowerShell or Azure CLI to download the certificate as a `.pfx` file that has a private key.
42+
43+
- Example that uses Azure CLI:
44+
45+
```bash
46+
az keyvault secret download \
47+
--vault-name `YourKeyVaultName` \
48+
--name `CertificateName` \
49+
--file cert.pfx \
50+
--encoding base64
51+
```
52+
53+
4. **Upload to Application Gateway**: Go to Application Gateway \> Listeners \> + Add Listener. Select **HTTPS**, upload the `.pfx` file, and then enter the password.
54+
55+
5. **Associate with a rule**: Create a routing rule, and link it to the HTTPS listener. For detailed steps, see [Create a routing rule in Application Gateway](/azure/application-gateway/configuration-request-routing-rules)
56+
57+
### Option 2: Use Key Vault reference (recommended)
58+
59+
1. **Store App Service Certificate in Key Vault**: Navigate to the App Service Certificate resource. Then, use the **Key Vault** blade to store the certificate in a key vault of your choice.
60+
61+
2. **Enable Managed Identity for Application Gateway**: Enable user-assigned or system-assigned managed identity.
62+
63+
3. **Grant Access to key vault**: In the key vault, go to **Access Policies**, and add a policy for Application Gateway identity that has `get`, `list`,
64+
and `secret management` permissions.
65+
66+
4. **Reference Certificate from Key Vault**: Go to **Application Gateway** \> **Listeners** \> **+ Add Listener**, select **HTTPS**, and then select **Key Vault certificate**.
67+
68+
> [!NOTE]
69+
> Currently, Key Vault integration supports only certificates that have the private key in `.pfx` format.
70+
71+
## Limitations and considerations
72+
73+
1. **Direct use not supported:**
74+
75+
- You can't bind an App Service Certificate to Application Gateway directly in the same manner as you can for App Services.
76+
77+
2. **Export required for manual use:**
78+
79+
- You must extract the `.pfx` format from Key Vault before you can use it in Application Gateway (if you're not using a Key Vault reference).
80+
81+
3. **Autorenewal challenges:**
82+
83+
- App Service Certificates support autorenewal only for App Services.
84+
- When used in Application Gateway, autorenewal doesn't automatically propagate.
85+
- You must manually update the certificate in Application Gateway after you renew it.
86+
- We recommend that you use **Azure Automation** or **Logic App** to automate this update process. See [Renew certificates in Application Gateway](/azure/application-gateway/renew-certificates).
87+
88+
4. **Certificate format restrictions:**
89+
90+
- Application Gateway accepts only `.pfx` files.
91+
- Application Gateway rejects `.cer` and `.pem` files.
92+
- Self-signed certificates are supported but must be uploaded as `.pfx`.
93+
- See [Self-signed certificates for Application Gateway](/azure/application-gateway/self-signed-certificates).
94+
95+
## Best practices
96+
97+
- Use Key Vault-based integration for better security and easier management.
98+
- Automate certificate renewal by using scripts or Azure Automation.
99+
- Regularly audit access policies in Key Vault.
100+
- Keep secure backup copies of your exported `.pfx` files.
101+
102+
## Summary
103+
104+
| Feature | App Service | Application Gateway
105+
| --- | --- | ---
106+
| Certificate Format | Managed by platform | Requires `.pfx`
107+
| Autorenewal | Supported | Manual (requires automation)
108+
| Key Vault Integration | Built in | Supported (requires setup)
109+
| Direct Use of App Service Certificate | ✅ App Service only | ❌ Not supported
110+
111+
## Useful links
112+
113+
- [Renew certificates in Application Gateway](/azure/application-gateway/renew-certificates)
114+
- [SSL certificates overview - Application Gateway](/azure/application-gateway/ssl-overview)
115+
- [Use self-signed certificates in Application Gateway](/azure/application-gateway/self-signed-certificates)
116+
- [Configure App Service Certificate](/azure/app-service/configure-ssl-app-service-certificate?tabs=portal)
117+
- [Create a routing rule in Application Gateway](/azure/application-gateway/configuration-request-routing-rules)
118+
119+
[!INCLUDE [third-party-information-disclaimer](../../../../includes/third-party-information-disclaimer.md)]
Lines changed: 127 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,127 @@
1+
---
2+
title: Use Azure App Service Certificate with Azure Front Door
3+
description: Provides detailed steps to use Azure App Service Certificate together with Azure Front Door.
4+
author: JarrettRenshaw
5+
ms.author: jarrettr
6+
ms.service: azure-app-service
7+
ms.date: 07/21/2025
8+
ms.reviewer: v-liuamson; v-gsitser
9+
ms.custom: Connection issues with SSL or TLS
10+
---
11+
12+
# Use Azure App Service Certificate with Azure Front Door
13+
14+
Microsoft Azure Front Door (Standard and Premium) is a modern global load balancer and application delivery network that supports custom TLS certificates through Azure Key Vault. This article discusses how to use an Azure App Service Certificate securely together with Microsoft Azure Front Door by using managed identities and Bring Your Own Certificate (BYOC) support. This integration enables you to deliver encrypted traffic that has automatic renewal, enterprise-grade performance, and global scale.
15+
16+
## Overview
17+
18+
Azure App Service Certificates provide a simple, integrated way to purchase, provision, and manage SSL/TLS certificates. These certificates are issued by trusted Certificate Authorities (such as DigiCert) and work together with App Services. They can also be extended to secure traffic that's routed through Azure Front Door.
19+
20+
To purchase a certificate, see [Buy and configure an App Service Certificate](/azure/app-service/configure-ssl-app-service-certificate?tabs=portal#buy-and-configure-an-app-service-certificate).
21+
22+
> [!IMPORTANT]
23+
> After you purchase a certificate, you must manually complete the **Store** step in the **Certificate Configuration** blade to import the certificate into Azure Key Vault. This step is required before the certificate can be used together with other Azure services.
24+
25+
### Step 1: Enable managed identity on Azure Front Door
26+
27+
A managed identity enables Azure Front Door to securely retrieve the certificate from Azure Key Vault:
28+
29+
1. Navigate to your Azure Front Door profile.
30+
2. Under **Security**, select **Identity**, and then enable a managed identity:
31+
- **System-assigned** (Recommended): Tied to the Front Door
32+
lifecycle
33+
- **User-assigned** (Optional): For reuse across multiple services
34+
3. Select **Save**.
35+
36+
For more information, see [Use managed identities to access Azure Key Vault certificates](/azure/frontdoor/managed-identity).
37+
38+
### Step 2: Configure Key Vault Access for Front Door
39+
40+
Grant permission to Azure Front Door to access the certificate by using one of the following methods:
41+
42+
#### Method A: Azure RBAC (recommended)
43+
44+
1. Open **Key Vault** > **Access control (IAM)** > **+ Add** > **Add role assignment**.
45+
2. Assign the **Key Vault Secrets User** role.
46+
3. Select **Managed identity**, then select the system-assigned identity of Azure Front Door.
47+
4. Select **Review + assign**.
48+
49+
```bash
50+
az role assignment create \
51+
--assignee-object-id <frontdoor-identity-object-id> \
52+
--role "Key Vault Secrets User" \
53+
--scope "/subscriptions/<sub-id>/resourceGroups/<rg>/providers/Microsoft.KeyVault/vaults/<vault-name>"
54+
```
55+
56+
To retrieve the identity object ID:
57+
58+
```bash
59+
az front-door show \
60+
--name <frontdoor-name> \
61+
--resource-group <rg> \
62+
--query identity.principalId -o tsv
63+
```
64+
65+
> [!NOTE]
66+
> Make sure that the Key Vault firewall allows trusted services or specific Front Door IP ranges.
67+
68+
#### Method B: Key Vault Access Policy
69+
70+
1. Navigate to your key vault > **Access policies**.
71+
2. Select **+ Add Access Policy**.
72+
3. Grant **Get** and **List** permissions for **Secrets** and **Certificates**.
73+
4. Assign the policy to the managed identity for Azure Front Door.
74+
5. Save the access policy.
75+
76+
> [!NOTE]
77+
> This method is suitable for legacy scenarios or if RBAC isn't enabled.
78+
79+
### Step 3: Add certificate as a secret in Azure Front Door
80+
81+
Before you do this step, make sure that the App Service Certificate is successfully stored in Azure Key Vault through the App Service Certificate blade. For more information, see [Buy and configure an App Service Certificate](/azure/app-service/configure-ssl-app-service-certificate?tabs=portal#buy-and-configure-an-app-service-certificate).
82+
83+
To add the certificate:
84+
85+
1. Go to your Azure Front Door (Standard/Premium) profile.
86+
2. Under **Security**, select **Secrets** > **+ Add**.
87+
3. Select your key vault, and then select the stored App Service Certificate.
88+
4. Select the version. (Use `Latest` to enable automatic certificate rotation.)
89+
5. Select **Add**.
90+
91+
> [!NOTE]
92+
> Azure Front Door supports automatic certificate renewal when you reference the `Latest` version. Updates in Key Vault are reflected in Front Door within 72 hours. For more information, see [Renew customer-managed TLS certificates](/azure/frontdoor/standard-premium/how-to-configure-https-custom-domain?tabs=powershell#renew-customer-managed-tls-certificates).
93+
> [!IMPORTANT]
94+
> Certificates must be stored in a Key Vault within the same subscription and must include a complete certificate chain that uses supported algorithms. For more information, see [Use your own certificate with Azure Front Door](/azure/frontdoor/standard-premium/how-to-configure-https-custom-domain?tabs=powershell#use-your-own-certificate).
95+
96+
### Step 4: Configure a custom domain with BYOC
97+
98+
1. In your Front Door profile, go to **Domains** > **+ Add**.
99+
2. Provide the domain details:
100+
- **Custom domain**: for example, `www.contoso.com`
101+
- **DNS zone**: Choose Azure DNS, if applicable.
102+
- **DNS management**: Azure-managed (recommended) or external
103+
3. Verify domain ownership:
104+
- Use **TXT record** if you use custom DNS provider
105+
4. Under **HTTPS Configuration**:
106+
- **Certificate type**: `Bring Your Own Certificate (BYOC)`
107+
- **Secret**: Select the secret that you added in Step 3 (for example, `certname-latest`).
108+
- **TLS policy**: Select a supported policy (for example, `TLS 1.2_2023`)
109+
5. Select **Add** to finish the setup.
110+
111+
After verification is made, Front Door serves traffic securely by using the certificate from Azure Key Vault. For more information, see [Add a custom domain in Azure Front Door](/azure/frontdoor/standard-premium/how-to-add-custom-domain).
112+
113+
## Summary
114+
115+
| Task | Tool | Notes
116+
| --- | --- | ---
117+
| Enable identity | Azure portal or CLI | System-assigned identity is recommended
118+
| Grant access | IAM Role or Access Policy | Use `Key Vault Secrets User` or equivalent
119+
| Add secret | Azure portal | Reference `-latest` to enable autorotation
120+
| Bind domain | Azure portal | Validate domain and configure HTTPS
121+
122+
## References
123+
124+
- [Configure HTTPS custom domain (Front Door)](/azure/frontdoor/standard-premium/how-to-configure-https-custom-domain?tabs=powershell)
125+
- [Add custom domain in Front Door](/azure/frontdoor/standard-premium/how-to-add-custom-domain)
126+
- [Azure Front Door managed identity access](/azure/frontdoor/managed-identity)
127+
- [Buy and configure an App Service Certificate](/azure/app-service/configure-ssl-app-service-certificate?tabs=portal)

support/azure/app-service/toc.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,11 @@
11
- name: Azure App Service
22
items:
3+
- name: Connection issues with SSL or TLS
4+
items:
5+
- name: Use Azure App Service Certificate with Azure Front Door
6+
href: ./connection-issues-with-ssl-or-tls/use-azure-app-service-certificate-with-azure-front-door.md
7+
- name: Use Azure App Service Certificate with Application Gateway
8+
href: ./connection-issues-with-ssl-or-tls/use-azure-app-service-certificate-with-application-gateway.md
39
- name: Troubleshoot Azure App Service
410
href: ./welcome-app-service.yml
511
- name: Capture memory dumps in Azure App Service

0 commit comments

Comments
 (0)