Skip to content

Commit 1863502

Browse files
authored
Merge pull request #300522 from TimShererWithAquent/us423405-01
App Service apps: Consistency edit on URL formatting references (1 of 2)
2 parents 3d38dcc + d02bf27 commit 1863502

14 files changed

+44
-70
lines changed

articles/app-service/app-service-ip-restrictions.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,6 @@ ms.assetid: 3be1f4bd-8a81-4565-8a56-528c037b24bd
1313
---
1414
# Set up Azure App Service access restrictions
1515

16-
[!INCLUDE [regionalization-note](./includes/regionalization-note.md)]
17-
1816
When you set up access restrictions, you can define a priority-ordered allow/deny list that controls network access to your app. The list can include IP addresses or Azure Virtual Network subnets. When there are one or more entries, an implicit *deny all* exists at the end of the list. For more information, see [Azure App Service access restrictions](./overview-access-restrictions.md).
1917

2018
The access restriction capability works with all Azure App Service-hosted workloads. The workloads can include web apps, API apps, Linux apps, Linux custom containers, and Azure Functions apps.

articles/app-service/app-service-key-vault-references.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,6 @@ ms.custom: AppServiceConnectivity
1414

1515
This article shows you how to use secrets from Azure Key Vault as values of [app settings](configure-common.md#configure-app-settings) or [connection strings](configure-common.md#configure-connection-strings) in your Azure App Service or Azure Functions apps.
1616

17-
[!INCLUDE [regionalization-note](./includes/regionalization-note.md)]
18-
1917
[Key Vault](/azure/key-vault/general/overview) is a service that provides centralized secrets management, with full control over access policies and audit history. When an app setting or connection string is a Key Vault reference, your application code can use it like any other app setting or connection string. This way, you can maintain secrets apart from your app's configuration. App settings are securely encrypted at rest, but if you need capabilities for managing secrets, they should go into a key vault.
2018

2119
## Grant your app access to a key vault

articles/app-service/app-service-plan-manage.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,6 @@ ms.custom: "UpdateFrequency3"
1212
---
1313
# Manage an App Service plan in Azure
1414

15-
[!INCLUDE [regionalization-note](./includes/regionalization-note.md)]
16-
1715
An [Azure App Service plan](overview-hosting-plans.md) provides the resources that an App Service app needs to run. This guide shows how to manage an App Service plan.
1816

1917
## Create an App Service plan
@@ -38,7 +36,7 @@ You can create an empty App Service plan, or you can create a plan as part of ap
3836
6. Select **Review + create** to create the App Service plan.
3937

4038
> [!IMPORTANT]
41-
> When you create an new App Service plan in an existing resource group, certain conditions with existing apps can trigger these errors:
39+
> When you create a new App Service plan in an existing resource group, certain conditions with existing apps can trigger these errors:
4240
> - `The pricing tier is not allowed in this resource group`
4341
> - `<SKU_NAME> workers are not available in resource group <RESOURCE_GROUP_NAME>`
4442
>

articles/app-service/app-service-web-tutorial-custom-domain.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,6 @@ author: msangapu-msft
1313

1414
# Set up an existing custom domain in Azure App Service
1515

16-
[!INCLUDE [regionalization-note](./includes/regionalization-note.md)]
17-
1816
[Azure App Service](overview.md) provides a highly scalable, self-patching web hosting service. This guide shows you how to map an existing custom Domain Name System (DNS) name to App Service. To migrate a live site and its DNS domain name to App Service with no downtime, see [Migrate an active DNS name to Azure App Service](manage-custom-dns-migrate-domain.md).
1917

2018
The DNS record type you need to add with your domain provider depends on the domain you want to add to App Service.
@@ -110,7 +108,7 @@ Create two records, as described in the following table:
110108

111109
| Record type | Host | Value | Comments |
112110
| - | - | - |-|
113-
| CNAME | `<subdomain>` (for example, `www`) | `<app-name>.azurewebsites.net`. (See [the note at the start of this article](#dnl-note).) | The domain mapping itself. |
111+
| CNAME | `<subdomain>` (for example, `www`) | (See the value in the Azure portal **Overview** page for your app.) | The domain mapping itself. |
114112
| TXT | `asuid.<subdomain>` (for example, `asuid.www`) | The domain verification ID shown in the **Add custom domain** dialog. | App Service accesses the `asuid.<subdomain>` TXT record to verify your ownership of the custom domain. |
115113

116114
![Screenshot that shows the portal navigation to an Azure app.](./media/app-service-web-tutorial-custom-domain/cname-record.png)
@@ -121,7 +119,7 @@ For a wildcard name, like `*` in `*.contoso.com`, create two records, as describ
121119

122120
| Record type | Host | Value | Comments |
123121
| - | - | - | - |
124-
| CNAME | `*` | `<app-name>.azurewebsites.net`. (See [the note at the start of this article](#dnl-note).) | The domain mapping itself. |
122+
| CNAME | `*` | (See the value in the Azure portal **Overview** page for your app.) | The domain mapping itself. |
125123
| TXT | `asuid` | The domain verification ID shown in the **Add custom domain** dialog. | App Service accesses the `asuid` TXT record to verify your ownership of the custom domain. |
126124

127125
![Screenshot that shows the navigation to an Azure app.](./media/app-service-web-tutorial-custom-domain/cname-record-wildcard.png)

articles/app-service/configure-authentication-provider-aad.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,6 @@ ms.author: cephalin
1212

1313
# Configure your App Service or Azure Functions app to use Microsoft Entra sign-in
1414

15-
[!INCLUDE [regionalization-note](./includes/regionalization-note.md)]
16-
1715
Select another authentication provider to jump to it.
1816

1917
[!INCLUDE [app-service-mobile-selector-authentication](../../includes/app-service-mobile-selector-authentication.md)]
@@ -81,7 +79,7 @@ To use an existing registration, select either:
8179

8280
If you need to manually create an app registration in a workforce tenant, see [Register an application with the Microsoft identity platform](/entra/identity-platform/quickstart-register-app). As you go through the registration process, be sure to note the application (client) ID and client secret values.
8381

84-
During the registration process, in the **Redirect URIs** section, select **Web** for platform and enter `<app-url>/.auth/login/aad/callback`. For example, enter `https://contoso.azurewebsites.net/.auth/login/aad/callback`.
82+
During the registration process, in the **Redirect URIs** section, select **Web** for platform, and enter a redirect URI. For example, enter `https://contoso.azurewebsites.net/.auth/login/aad/callback`.
8583

8684
Now, modify the app registration:
8785

@@ -168,7 +166,7 @@ To use an existing registration, select **Provide the details of an existing app
168166

169167
If you need to manually create an app registration in an external tenant, see [Register an app in your external tenant](/entra/external-id/customers/how-to-register-ciam-app?tabs=webapp#register-your-web-app).
170168

171-
During the registration process, in the **Redirect URIs** section, select **Web** for platform and enter `<app-url>/.auth/login/aad/callback`. For example, enter `https://contoso.azurewebsites.net/.auth/login/aad/callback`.
169+
During the registration process, in the **Redirect URIs** section, select **Web** for platform, and enter a redirect URI. For example, enter `https://contoso.azurewebsites.net/.auth/login/aad/callback`.
172170

173171
Now, modify the app registration:
174172

@@ -364,7 +362,7 @@ You can register native clients to request access to your App Service app's APIs
364362

365363
1. On the **Register an application** pane, for **Name**, enter a name for your app registration.
366364

367-
1. In **Redirect URI**, select **Public client/native (mobile & desktop)** and enter the URL `<app-url>/.auth/login/aad/callback`. For example, enter `https://contoso.azurewebsites.net/.auth/login/aad/callback`.
365+
1. In **Redirect URI**, select **Public client/native (mobile & desktop)** and enter the redirect URL. For example, enter `https://contoso.azurewebsites.net/.auth/login/aad/callback`.
368366

369367
1. Select **Register**.
370368

articles/app-service/configure-common.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,6 @@ ms.author: cephalin
1616

1717
This article explains how to configure common settings for web apps, a mobile back end, or an API app. For Azure Functions, see [App settings reference for Azure Functions](../azure-functions/functions-app-settings.md).
1818

19-
[!INCLUDE [regionalization-note](./includes/regionalization-note.md)]
20-
2119
## Configure app settings
2220

2321
In Azure App Service, app settings are variables passed as environment variables to the application code. The following conditions apply to app settings:
@@ -55,7 +53,7 @@ App settings are always encrypted when they're stored (encrypted at rest).
5553
By default, values for app settings are hidden in the portal for security. To see a hidden value of an app setting, under **Value**, select **Show value**. To see the hidden values of all app settings, select **Show values**.
5654

5755
> [!NOTE]
58-
> Read/Write user permimssions are required to view this section in the Azure portal. RBAC built-in roles with sufficient permissions are Owner, Contributor, and Website Contributor. The Reader role alone would not be allowed to access this page.
56+
> Read/Write user permissions are required to view this section in the Azure portal. RBAC built-in roles with sufficient permissions are Owner, Contributor, and Website Contributor. The Reader role alone would not be allowed to access this page.
5957
6058
1. To add a new app setting, select **Add**. To edit a setting, select the setting.
6159
1. In the dialog, you can [stick the setting to the current slot](deploy-staging-slots.md#which-settings-are-swapped).

articles/app-service/configure-ssl-certificate.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,6 @@ author: msangapu-msft
1313

1414
# Add and manage TLS/SSL certificates in Azure App Service
1515

16-
[!INCLUDE [regionalization-note](./includes/regionalization-note.md)]
17-
1816
You can add digital security certificates to [use in your application code](configure-ssl-certificate-in-code.md) or to [help secure custom DNS names](configure-ssl-bindings.md) in [Azure App Service](overview.md), which provides a highly scalable, self-patching web hosting service. Currently called Transport Layer Security (TLS) certificates, also previously known as Secure Socket Layer (SSL) certificates, these private or public certificates help you secure internet connections by encrypting data sent between your browser, websites that you visit, and the website server.
1917

2018
The following table lists the options for you to add certificates in App Service:
@@ -69,7 +67,7 @@ The free App Service managed certificate is a turn-key solution for helping to s
6967
>
7068
> Free certificates are issued by DigiCert. For some domains, you must explicitly allow DigiCert as a certificate issuer by creating a [CAA domain record](https://wikipedia.org/wiki/DNS_Certification_Authority_Authorization) with the value: `0 issue digicert.com`.
7169
>
72-
> Azure fully manages the certificates on your behalf, so any aspect of the managed certificate, including the root issuer, can change at anytime. Certificate renewals change both public and private key parts. All of these certificate changes are outside your control. Make sure to avoid hard dependencies and "pinning" practice certificates to the managed certificate or any part of the certificate hierarchy. If you need the certificate pinning behavior, add a certificate to your custom domain using any other available method in this article.
70+
> Azure fully manages the certificates on your behalf, so any aspect of the managed certificate, including the root issuer, can change at any time. Certificate renewals change both public and private key parts. All of these certificate changes are outside your control. Make sure to avoid hard dependencies and "pinning" practice certificates to the managed certificate or any part of the certificate hierarchy. If you need the certificate pinning behavior, add a certificate to your custom domain using any other available method in this article.
7371
7472
The free certificate comes with the following limitations:
7573

@@ -148,7 +146,7 @@ The service principal app ID or assignee value is the ID for the App Service res
148146

149147
| Resource provider | Service principal app ID | Key vault secret permissions | Key vault certificate permissions |
150148
|--|--|--|--|
151-
| **Microsoft Azure App Service** or **Microsoft.Azure.WebSites** | - `abfa0a7c-a6b6-4736-8310-5855508787cd` for public Azure cloud environment <br><br>- `6a02c803-dafd-4136-b4c3-5a6f318b4714` for Azure Government cloud environment | Get | Get |
149+
| **Microsoft Azure App Service** or **Microsoft.Azure.WebSites** | - `abfa0a7c-a6b6-4736-8310-5855508787cd` for global Azure cloud environment <br><br>- `6a02c803-dafd-4136-b4c3-5a6f318b4714` for Azure Government cloud environment | Get | Get |
152150

153151
The service principal app ID or assignee value is the ID for the App Service resource provider. To learn how to authorize key vault permissions for the App Service resource provider using an access policy, see the [assign a Key Vault access policy documentation](/azure/key-vault/general/assign-access-policy?tabs=azure-portal).
154152

articles/app-service/deploy-azure-pipelines.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,6 @@ ms.custom: "devops-pipelines-deploy"
1414

1515
**Azure DevOps Services | Azure DevOps Server 2020 | Azure DevOps Server 2019**
1616

17-
[!INCLUDE [regionalization-note](./includes/regionalization-note.md)]
18-
1917
Use [Azure Pipelines](/azure/devops/pipelines/) to automatically deploy your web app to [Azure App Service](./overview.md) on every successful build. Azure Pipelines lets you build, test, and deploy with continuous integration and continuous delivery (CI/CD) by using [Azure DevOps](/azure/devops/).
2018

2119
YAML pipelines are defined by using a YAML file in your repository. A step is the smallest building block of a pipeline and can be a script or task (prepackaged script). [Learn about the key concepts and components that make up a pipeline](/azure/devops/pipelines/get-started/key-pipelines-concepts).

articles/app-service/deploy-best-practices.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,6 @@ ms.author: cephalin
1313

1414
# Deployment best practices
1515

16-
[!INCLUDE [regionalization-note](./includes/regionalization-note.md)]
17-
1816
Every development team has unique requirements that can make implementing an efficient deployment pipeline difficult on any cloud service. This article introduces the three main components of deploying to Azure App Service: *deployment sources*, *build pipelines*, and *deployment mechanisms*. This article also covers some best practices and tips for specific language stacks.
1917

2018
## Deployment components

articles/app-service/deploy-continuous-deployment.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,6 @@ ms.assetid: 6adb5c84-6cf3-424e-a336-c554f23b4000
1111

1212
# Configure continuous deployment to Azure App Service
1313

14-
[!INCLUDE [regionalization-note](./includes/regionalization-note.md)]
15-
1614
You can configure continuous deployment from [GitHub](https://help.github.com/articles/create-a-repo), [Bitbucket](https://confluence.atlassian.com/get-started-with-bitbucket/create-a-repository-861178559.html), and [Azure](/azure/devops/repos/git/creatingrepo) repositories by using [Azure App Service](overview.md), which pulls in the latest updates. This guide provides you with everything you need to get started.
1715

1816
[!INCLUDE [Prepare repository](../../includes/app-service-deploy-prepare-repo.md)]

0 commit comments

Comments
 (0)