You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/frontdoor/front-door-custom-domain-https.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ In this tutorial, you learn how to:
34
34
> [!div class="checklist"]
35
35
> - Enable the HTTPS protocol on your custom domain.
36
36
> - Use an AFD-managed certificate
37
-
> - Use your own certificate, that is, a custom SSL certificate
37
+
> - Use your own certificate, that is, a custom TLS/SSL certificate
38
38
> - Validate the domain
39
39
> - Disable the HTTPS protocol on your custom domain
40
40
@@ -45,9 +45,9 @@ In this tutorial, you learn how to:
45
45
46
46
Before you can complete the steps in this tutorial, you must first create a Front Door and with at least one custom domain onboarded. For more information, see [Tutorial: Add a custom domain to your Front Door](front-door-custom-domain.md).
47
47
48
-
## SSL certificates
48
+
## TLS/SSL certificates
49
49
50
-
To enable the HTTPS protocol for securely delivering content on a Front Door custom domain, you must use an SSL certificate. You can choose to use a certificate that is managed by Azure Front Door or use your own certificate.
50
+
To enable the HTTPS protocol for securely delivering content on a Front Door custom domain, you must use a TLS/SSL certificate. You can choose to use a certificate that is managed by Azure Front Door or use your own certificate.
51
51
52
52
53
53
### Option 1 (default): Use a certificate managed by Front Door
@@ -69,7 +69,7 @@ To enable HTTPS on a custom domain, follow these steps:
69
69
70
70
### Option 2: Use your own certificate
71
71
72
-
You can use your own certificate to enable the HTTPS feature. This process is done through an integration with Azure Key Vault, which allows you to store your certificates securely. Azure Front Door uses this secure mechanism to get your certificate and it requires a few additional steps. When you create your SSL certificate, you must create it with an allowed certificate authority (CA). Otherwise, if you use a non-allowed CA, your request will be rejected. For a list of allowed CAs, see [Allowed certificate authorities for enabling custom HTTPS on Azure Front Door](front-door-troubleshoot-allowed-ca.md).
72
+
You can use your own certificate to enable the HTTPS feature. This process is done through an integration with Azure Key Vault, which allows you to store your certificates securely. Azure Front Door uses this secure mechanism to get your certificate and it requires a few additional steps. When you create your TLS/SSL certificate, you must create it with an allowed certificate authority (CA). Otherwise, if you use a non-allowed CA, your request will be rejected. For a list of allowed CAs, see [Allowed certificate authorities for enabling custom HTTPS on Azure Front Door](front-door-troubleshoot-allowed-ca.md).
73
73
74
74
#### Prepare your Azure Key vault account and certificate
75
75
@@ -81,7 +81,7 @@ You can use your own certificate to enable the HTTPS feature. This process is do
81
81
2. Azure Key Vault certificates: If you already have a certificate, you can upload it directly to your Azure Key Vault account or you can create a new certificate directly through Azure Key Vault from one of the partner CAs that Azure Key Vault integrates with. Upload your certificate as a **certificate** object, rather than a **secret**.
82
82
83
83
> [!NOTE]
84
-
> For your own SSL certificate, Front Door doesn't support certificates with EC cryptography algorithms.
84
+
> For your own TLS/SSL certificate, Front Door doesn't support certificates with EC cryptography algorithms.
85
85
86
86
#### Register Azure Front Door
87
87
@@ -257,7 +257,7 @@ The following table shows the operation progress that occurs when you disable HT
257
257
258
258
4.*Is using a SAN certificate less secure than a dedicated certificate?*
259
259
260
-
A SAN certificate follows the same encryption and security standards as a dedicated certificate. All issued SSL certificates use SHA-256 for enhanced server security.
260
+
A SAN certificate follows the same encryption and security standards as a dedicated certificate. All issued TLS/SSL certificates use SHA-256 for enhanced server security.
261
261
262
262
5.*Do I need a Certificate Authority Authorization record with my DNS provider?*
Copy file name to clipboardExpand all lines: articles/frontdoor/front-door-faq.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ Azure Front Door is an Application Delivery Network (ADN) as a service, offering
29
29
30
30
### What features does Azure Front Door support?
31
31
32
-
Azure Front Door supports dynamic site acceleration (DSA), SSL offloading and end to end SSL, Web Application Firewall, cookie-based session affinity, url path-based routing, free certificates and multiple domain management, and others. For a full list of supported features, see [Overview of Azure Front Door](front-door-overview.md).
32
+
Azure Front Door supports dynamic site acceleration (DSA), TLS/SSL offloading and end to end TLS, Web Application Firewall, cookie-based session affinity, url path-based routing, free certificates and multiple domain management, and others. For a full list of supported features, see [Overview of Azure Front Door](front-door-overview.md).
33
33
34
34
### What is the difference between Azure Front Door and Azure Application Gateway?
35
35
@@ -41,7 +41,7 @@ The key scenarios why one should use Application Gateway behind Front Door are:
41
41
42
42
- Front Door can perform path-based load balancing only at the global level but if one wants to load balance traffic even further within their virtual network (VNET) then they should use Application Gateway.
43
43
- Since Front Door doesn't work at a VM/container level, so it cannot do Connection Draining. However, Application Gateway allows you to do Connection Draining.
44
-
- With an Application Gateway behind AFD, one can achieve 100% SSL offload and route only HTTP requests within their virtual network (VNET).
44
+
- With an Application Gateway behind AFD, one can achieve 100% TLS/SSL offload and route only HTTP requests within their virtual network (VNET).
45
45
- Front Door and Application Gateway both support session affinity. While Front Door can direct subsequent traffic from a user session to the same cluster or backend in a given region, Application Gateway can direct affinitize the traffic to the same server within the cluster.
46
46
47
47
### Can we deploy Azure Load Balancer behind Front Door?
@@ -113,7 +113,7 @@ Learn more about the [Front Door supported HTTP headers](front-door-http-headers
113
113
114
114
A new Front Door creation or any updates to an existing Front Door takes about 3 to 5 minutes for global deployment. That means in about 3 to 5 minutes, your Front Door configuration will be deployed across all of our POPs globally.
115
115
116
-
Note - Custom SSL certificate updates take about 30 minutes to be deployed globally.
116
+
Note - Custom TLS/SSL certificate updates take about 30 minutes to be deployed globally.
117
117
118
118
Any updates to routes or backend pools etc. are seamless and will cause zero downtime (if the new configuration is correct). Certificate updates are also atomic and will not cause any outage, unless switching from 'AFD Managed' to 'Use your own cert' or vice versa.
119
119
@@ -134,7 +134,7 @@ Learn about all the documented [timeouts and limits for Azure Front Door](https:
134
134
135
135
Azure Front Door is a globally distributed multi-tenant platform with huge volumes of capacity to cater to your application's scalability needs. Delivered from the edge of Microsoft's global network, Front Door provides global load-balancing capability that allows you to fail over your entire application or even individual microservices across regions or different clouds.
136
136
137
-
## SSL configuration
137
+
## TLS configuration
138
138
139
139
### What TLS versions are supported by Azure Front Door?
140
140
@@ -145,12 +145,12 @@ Front Door supports TLS versions 1.0, 1.1 and 1.2. TLS 1.3 is not yet supported.
145
145
### What certificates are supported on Azure Front Door?
146
146
147
147
To enable the HTTPS protocol for securely delivering content on a Front Door custom domain, you can choose to use a certificate that is managed by Azure Front Door or use your own certificate.
148
-
The Front Door managed option provisions a standard SSL certificate via Digicert and stored in Front Door's Key Vault. If you choose to use your own certificate, then you can onboard a certificate from a supported CA and can be a standard SSL, extended validation certificate, or even a wildcard certificate. Self-signed certificates are not supported. Learn [how to enable HTTPS for a custom domain](https://aka.ms/FrontDoorCustomDomainHTTPS).
148
+
The Front Door managed option provisions a standard TLS/SSL certificate via Digicert and stored in Front Door's Key Vault. If you choose to use your own certificate, then you can onboard a certificate from a supported CA and can be a standard TLS, extended validation certificate, or even a wildcard certificate. Self-signed certificates are not supported. Learn [how to enable HTTPS for a custom domain](https://aka.ms/FrontDoorCustomDomainHTTPS).
149
149
150
150
### Does Front Door support autorotation of certificates?
151
151
152
152
For the Front Door managed certificate option, the certificates are autorotated by Front Door. If you are using a Front Door managed certificate and see that the certificate expiry date is less than 60 days away, file a support ticket.
153
-
</br>For your own custom SSL certificate, autorotation isn't supported. Similar to how it was set up the first time for a given custom domain, you will need to point Front Door to the right certificate version in your Key Vault and ensure that the service principal for Front Door still has access to the Key Vault. This updated certificate rollout operation by Front Door is atomic and doesn't cause any production impact provided the subject name or SAN for the certificate doesn't change.
153
+
</br>For your own custom TLS/SSL certificate, autorotation isn't supported. Similar to how it was set up the first time for a given custom domain, you will need to point Front Door to the right certificate version in your Key Vault and ensure that the service principal for Front Door still has access to the Key Vault. This updated certificate rollout operation by Front Door is atomic and doesn't cause any production impact provided the subject name or SAN for the certificate doesn't change.
154
154
155
155
### What are the current cipher suites supported by Azure Front Door?
156
156
@@ -177,34 +177,34 @@ The following are the current cipher suites supported by Azure Front Door:
177
177
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
178
178
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
179
179
180
-
### Can I configure SSL policy to control SSL Protocol versions?
180
+
### Can I configure TLS policy to control TLS Protocol versions?
181
181
182
182
You can configure a minimum TLS version in Azure Front Door in the custom domain HTTPS settings via Azure portal or the [Azure REST API](https://docs.microsoft.com/rest/api/frontdoorservice/frontdoor/frontdoors/createorupdate#minimumtlsversion). Currently, you can choose between 1.0 and 1.2.
183
183
184
184
### Can I configure Front Door to only support specific cipher suites?
185
185
186
-
No, configuring Front Door for specific cipher suites is not supported. However, you can get your own custom SSL certificate from your Certificate Authority (say Verisign, Entrust, or Digicert) and have specific cipher suites marked on the certificate when you have it generated.
186
+
No, configuring Front Door for specific cipher suites is not supported. However, you can get your own custom TLS/SSL certificate from your Certificate Authority (say Verisign, Entrust, or Digicert) and have specific cipher suites marked on the certificate when you have it generated.
187
187
188
188
### Does Front Door support OCSP stapling?
189
189
190
190
Yes, OCSP stapling is supported by default by Front Door and no configuration is required.
191
191
192
192
### Does Azure Front Door also support re-encryption of traffic to the backend?
193
193
194
-
Yes, Azure Front Door supports SSL offload, and end to end SSL, which re-encrypts the traffic to the backend. In fact, since the connections to the backend happen over it's public IP, it is recommended that you configure your Front Door to use HTTPS as the forwarding protocol.
194
+
Yes, Azure Front Door supports TLS/SSL offload, and end to end TLS, which re-encrypts the traffic to the backend. In fact, since the connections to the backend happen over it's public IP, it is recommended that you configure your Front Door to use HTTPS as the forwarding protocol.
195
195
196
196
### Does Front Door support self-signed certificates on the backend for HTTPS connection?
197
197
198
198
No, self-signed certificates are not supported on Front Door and the restriction applies to both:
199
199
200
200
1.**Backends**: You cannot use self-signed certificates when you are forwarding the traffic as HTTPS or HTTPS health probes or filling the cache for from origin for routing rules with caching enabled.
201
-
2.**Frontend**: You cannot use self-signed certificates when using your own custom SSL certificate for enabling HTTPS on your custom domain.
201
+
2.**Frontend**: You cannot use self-signed certificates when using your own custom TLS/SSL certificate for enabling HTTPS on your custom domain.
202
202
203
203
### Why is HTTPS traffic to my backend failing?
204
204
205
205
For having successful HTTPS connections to your backend whether for health probes or for forwarding requests, there could be two reasons why HTTPS traffic might fail:
206
206
207
-
1.**Certificate subject name mismatch**: For HTTPS connections, Front Door expects that your backend presents certificate from a valid CA with subject name(s) matching the backend hostname. As an example, if your backend hostname is set to `myapp-centralus.contosonews.net` and the certificate that your backend presents during the SSL handshake neither has `myapp-centralus.contosonews.net` nor `*myapp-centralus*.contosonews.net` in the subject name, the Front Door will refuse the connection and result in an error.
207
+
1.**Certificate subject name mismatch**: For HTTPS connections, Front Door expects that your backend presents certificate from a valid CA with subject name(s) matching the backend hostname. As an example, if your backend hostname is set to `myapp-centralus.contosonews.net` and the certificate that your backend presents during the TLS handshake neither has `myapp-centralus.contosonews.net` nor `*myapp-centralus*.contosonews.net` in the subject name, the Front Door will refuse the connection and result in an error.
208
208
1.**Solution**: While it is not recommended from a compliance standpoint, you can workaround this error by disabling certificate subject name check for your Front Door. This is present under Settings in Azure portal and under BackendPoolsSettings in the API.
209
209
2.**Backend hosting certificate from invalid CA**: Only certificates from [valid CAs](/azure/frontdoor/front-door-troubleshoot-allowed-ca) can be used at the backend with Front Door. Certificates from internal CAs or self-signed certificates are not allowed.
Copy file name to clipboardExpand all lines: articles/frontdoor/front-door-how-to-onboard-apex-domain.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ Mapping your apex or root domain to your Front Door profile basically requires C
21
21
> [!NOTE]
22
22
> There are other DNS providers as well that support CNAME flattening or DNS chasing, however, Azure Front Door recommends using Azure DNS for its customers for hosting their domains.
23
23
24
-
You can use the Azure portal to onboard an apex domain on your Front Door and enable HTTPS on it by associating it with a certificate for SSL termination. Apex domains are also referred as root or naked domains.
24
+
You can use the Azure portal to onboard an apex domain on your Front Door and enable HTTPS on it by associating it with a certificate for TLS termination. Apex domains are also referred as root or naked domains.
25
25
26
26
In this article, you learn how to:
27
27
@@ -60,7 +60,7 @@ In this article, you learn how to:
60
60
2. Select the **Certificate management type** to _'Use my own certificate'_.
61
61
62
62
> [!WARNING]
63
-
> Front Door managed certificate management type is not currently supported for apex or root domains. The only option available for enabling HTTPS on an apex or root domain for Front Door is using your own custom SSL certificate hosted on Azure Key Vault.
63
+
> Front Door managed certificate management type is not currently supported for apex or root domains. The only option available for enabling HTTPS on an apex or root domain for Front Door is using your own custom TLS/SSL certificate hosted on Azure Key Vault.
64
64
65
65
3. Ensure that you have setup the right permissions for Front Door to access your key Vault as noted in the UI, before proceeding to the next step.
66
66
4. Choose a **Key Vault account** from your current subscription and then select the appropriate **Secret** and **Secret version** to map to the right certificate.
Copy file name to clipboardExpand all lines: articles/frontdoor/front-door-how-to-redirect-https.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,13 +11,13 @@ ms.author: sharadag
11
11
---
12
12
# Create a Front Door with HTTP to HTTPS redirection using the Azure portal
13
13
14
-
You can use the Azure portal to create a [Front Door](front-door-overview.md) with a certificate for SSL termination. A routing rule is used to redirect HTTP traffic to HTTPS.
14
+
You can use the Azure portal to create a [Front Door](front-door-overview.md) with a certificate for TLS termination. A routing rule is used to redirect HTTP traffic to HTTPS.
15
15
16
16
In this article, you learn how to:
17
17
18
18
> [!div class="checklist"]
19
19
> * Create a Front Door with an existing Web App resource
20
-
> * Add a custom domain with SSL certificate
20
+
> * Add a custom domain with TLS/SSL certificate
21
21
> * Setup HTTPS redirect on the custom domain
22
22
23
23
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
@@ -83,7 +83,7 @@ After you add the CNAME, the DNS records page looks like the following example:
83
83
### Enable HTTPS on your custom domain
84
84
85
85
1. Click on the custom domain that was added and under the section **Custom domain HTTPS**, change the status to **Enabled**.
86
-
2. You can leave the **Certificate management type** set to _Front Door managed_ for the free certificate maintained, managed, and autorotated by Front Door. You can also choose to use your own custom SSL certificate stored with Azure Key Vault. This tutorial assumes that the use of Front Door managed certificate.
86
+
2. You can leave the **Certificate management type** set to _Front Door managed_ for the free certificate maintained, managed, and autorotated by Front Door. You can also choose to use your own custom TLS/SSL certificate stored with Azure Key Vault. This tutorial assumes that the use of Front Door managed certificate.
87
87

88
88
89
89
3. Click on **Update** to save the selection and then click **Save**.
0 commit comments