Skip to content

Commit 1c88105

Browse files
authored
Merge pull request #109840 from TimShererWithAquent/us1679050cp
Change SSL to TLS per 1679050
2 parents 850b6b7 + 6c1cf3a commit 1c88105

9 files changed

+31
-31
lines changed

articles/frontdoor/front-door-custom-domain-https.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ In this tutorial, you learn how to:
3434
> [!div class="checklist"]
3535
> - Enable the HTTPS protocol on your custom domain.
3636
> - Use an AFD-managed certificate
37-
> - Use your own certificate, that is, a custom SSL certificate
37+
> - Use your own certificate, that is, a custom TLS/SSL certificate
3838
> - Validate the domain
3939
> - Disable the HTTPS protocol on your custom domain
4040
@@ -45,9 +45,9 @@ In this tutorial, you learn how to:
4545

4646
Before you can complete the steps in this tutorial, you must first create a Front Door and with at least one custom domain onboarded. For more information, see [Tutorial: Add a custom domain to your Front Door](front-door-custom-domain.md).
4747

48-
## SSL certificates
48+
## TLS/SSL certificates
4949

50-
To enable the HTTPS protocol for securely delivering content on a Front Door custom domain, you must use an SSL certificate. You can choose to use a certificate that is managed by Azure Front Door or use your own certificate.
50+
To enable the HTTPS protocol for securely delivering content on a Front Door custom domain, you must use a TLS/SSL certificate. You can choose to use a certificate that is managed by Azure Front Door or use your own certificate.
5151

5252

5353
### Option 1 (default): Use a certificate managed by Front Door
@@ -69,7 +69,7 @@ To enable HTTPS on a custom domain, follow these steps:
6969

7070
### Option 2: Use your own certificate
7171

72-
You can use your own certificate to enable the HTTPS feature. This process is done through an integration with Azure Key Vault, which allows you to store your certificates securely. Azure Front Door uses this secure mechanism to get your certificate and it requires a few additional steps. When you create your SSL certificate, you must create it with an allowed certificate authority (CA). Otherwise, if you use a non-allowed CA, your request will be rejected. For a list of allowed CAs, see [Allowed certificate authorities for enabling custom HTTPS on Azure Front Door](front-door-troubleshoot-allowed-ca.md).
72+
You can use your own certificate to enable the HTTPS feature. This process is done through an integration with Azure Key Vault, which allows you to store your certificates securely. Azure Front Door uses this secure mechanism to get your certificate and it requires a few additional steps. When you create your TLS/SSL certificate, you must create it with an allowed certificate authority (CA). Otherwise, if you use a non-allowed CA, your request will be rejected. For a list of allowed CAs, see [Allowed certificate authorities for enabling custom HTTPS on Azure Front Door](front-door-troubleshoot-allowed-ca.md).
7373

7474
#### Prepare your Azure Key vault account and certificate
7575

@@ -81,7 +81,7 @@ You can use your own certificate to enable the HTTPS feature. This process is do
8181
2. Azure Key Vault certificates: If you already have a certificate, you can upload it directly to your Azure Key Vault account or you can create a new certificate directly through Azure Key Vault from one of the partner CAs that Azure Key Vault integrates with. Upload your certificate as a **certificate** object, rather than a **secret**.
8282

8383
> [!NOTE]
84-
> For your own SSL certificate, Front Door doesn't support certificates with EC cryptography algorithms.
84+
> For your own TLS/SSL certificate, Front Door doesn't support certificates with EC cryptography algorithms.
8585
8686
#### Register Azure Front Door
8787

@@ -257,7 +257,7 @@ The following table shows the operation progress that occurs when you disable HT
257257

258258
4. *Is using a SAN certificate less secure than a dedicated certificate?*
259259

260-
A SAN certificate follows the same encryption and security standards as a dedicated certificate. All issued SSL certificates use SHA-256 for enhanced server security.
260+
A SAN certificate follows the same encryption and security standards as a dedicated certificate. All issued TLS/SSL certificates use SHA-256 for enhanced server security.
261261

262262
5. *Do I need a Certificate Authority Authorization record with my DNS provider?*
263263

articles/frontdoor/front-door-faq.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Azure Front Door is an Application Delivery Network (ADN) as a service, offering
2929

3030
### What features does Azure Front Door support?
3131

32-
Azure Front Door supports dynamic site acceleration (DSA), SSL offloading and end to end SSL, Web Application Firewall, cookie-based session affinity, url path-based routing, free certificates and multiple domain management, and others. For a full list of supported features, see [Overview of Azure Front Door](front-door-overview.md).
32+
Azure Front Door supports dynamic site acceleration (DSA), TLS/SSL offloading and end to end TLS, Web Application Firewall, cookie-based session affinity, url path-based routing, free certificates and multiple domain management, and others. For a full list of supported features, see [Overview of Azure Front Door](front-door-overview.md).
3333

3434
### What is the difference between Azure Front Door and Azure Application Gateway?
3535

@@ -41,7 +41,7 @@ The key scenarios why one should use Application Gateway behind Front Door are:
4141

4242
- Front Door can perform path-based load balancing only at the global level but if one wants to load balance traffic even further within their virtual network (VNET) then they should use Application Gateway.
4343
- Since Front Door doesn't work at a VM/container level, so it cannot do Connection Draining. However, Application Gateway allows you to do Connection Draining.
44-
- With an Application Gateway behind AFD, one can achieve 100% SSL offload and route only HTTP requests within their virtual network (VNET).
44+
- With an Application Gateway behind AFD, one can achieve 100% TLS/SSL offload and route only HTTP requests within their virtual network (VNET).
4545
- Front Door and Application Gateway both support session affinity. While Front Door can direct subsequent traffic from a user session to the same cluster or backend in a given region, Application Gateway can direct affinitize the traffic to the same server within the cluster.
4646

4747
### Can we deploy Azure Load Balancer behind Front Door?
@@ -113,7 +113,7 @@ Learn more about the [Front Door supported HTTP headers](front-door-http-headers
113113

114114
A new Front Door creation or any updates to an existing Front Door takes about 3 to 5 minutes for global deployment. That means in about 3 to 5 minutes, your Front Door configuration will be deployed across all of our POPs globally.
115115

116-
Note - Custom SSL certificate updates take about 30 minutes to be deployed globally.
116+
Note - Custom TLS/SSL certificate updates take about 30 minutes to be deployed globally.
117117

118118
Any updates to routes or backend pools etc. are seamless and will cause zero downtime (if the new configuration is correct). Certificate updates are also atomic and will not cause any outage, unless switching from 'AFD Managed' to 'Use your own cert' or vice versa.
119119

@@ -134,7 +134,7 @@ Learn about all the documented [timeouts and limits for Azure Front Door](https:
134134

135135
Azure Front Door is a globally distributed multi-tenant platform with huge volumes of capacity to cater to your application's scalability needs. Delivered from the edge of Microsoft's global network, Front Door provides global load-balancing capability that allows you to fail over your entire application or even individual microservices across regions or different clouds.
136136

137-
## SSL configuration
137+
## TLS configuration
138138

139139
### What TLS versions are supported by Azure Front Door?
140140

@@ -145,12 +145,12 @@ Front Door supports TLS versions 1.0, 1.1 and 1.2. TLS 1.3 is not yet supported.
145145
### What certificates are supported on Azure Front Door?
146146

147147
To enable the HTTPS protocol for securely delivering content on a Front Door custom domain, you can choose to use a certificate that is managed by Azure Front Door or use your own certificate.
148-
The Front Door managed option provisions a standard SSL certificate via Digicert and stored in Front Door's Key Vault. If you choose to use your own certificate, then you can onboard a certificate from a supported CA and can be a standard SSL, extended validation certificate, or even a wildcard certificate. Self-signed certificates are not supported. Learn [how to enable HTTPS for a custom domain](https://aka.ms/FrontDoorCustomDomainHTTPS).
148+
The Front Door managed option provisions a standard TLS/SSL certificate via Digicert and stored in Front Door's Key Vault. If you choose to use your own certificate, then you can onboard a certificate from a supported CA and can be a standard TLS, extended validation certificate, or even a wildcard certificate. Self-signed certificates are not supported. Learn [how to enable HTTPS for a custom domain](https://aka.ms/FrontDoorCustomDomainHTTPS).
149149

150150
### Does Front Door support autorotation of certificates?
151151

152152
For the Front Door managed certificate option, the certificates are autorotated by Front Door. If you are using a Front Door managed certificate and see that the certificate expiry date is less than 60 days away, file a support ticket.
153-
</br>For your own custom SSL certificate, autorotation isn't supported. Similar to how it was set up the first time for a given custom domain, you will need to point Front Door to the right certificate version in your Key Vault and ensure that the service principal for Front Door still has access to the Key Vault. This updated certificate rollout operation by Front Door is atomic and doesn't cause any production impact provided the subject name or SAN for the certificate doesn't change.
153+
</br>For your own custom TLS/SSL certificate, autorotation isn't supported. Similar to how it was set up the first time for a given custom domain, you will need to point Front Door to the right certificate version in your Key Vault and ensure that the service principal for Front Door still has access to the Key Vault. This updated certificate rollout operation by Front Door is atomic and doesn't cause any production impact provided the subject name or SAN for the certificate doesn't change.
154154

155155
### What are the current cipher suites supported by Azure Front Door?
156156

@@ -177,34 +177,34 @@ The following are the current cipher suites supported by Azure Front Door:
177177
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
178178
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
179179

180-
### Can I configure SSL policy to control SSL Protocol versions?
180+
### Can I configure TLS policy to control TLS Protocol versions?
181181

182182
You can configure a minimum TLS version in Azure Front Door in the custom domain HTTPS settings via Azure portal or the [Azure REST API](https://docs.microsoft.com/rest/api/frontdoorservice/frontdoor/frontdoors/createorupdate#minimumtlsversion). Currently, you can choose between 1.0 and 1.2.
183183

184184
### Can I configure Front Door to only support specific cipher suites?
185185

186-
No, configuring Front Door for specific cipher suites is not supported. However, you can get your own custom SSL certificate from your Certificate Authority (say Verisign, Entrust, or Digicert) and have specific cipher suites marked on the certificate when you have it generated.
186+
No, configuring Front Door for specific cipher suites is not supported. However, you can get your own custom TLS/SSL certificate from your Certificate Authority (say Verisign, Entrust, or Digicert) and have specific cipher suites marked on the certificate when you have it generated.
187187

188188
### Does Front Door support OCSP stapling?
189189

190190
Yes, OCSP stapling is supported by default by Front Door and no configuration is required.
191191

192192
### Does Azure Front Door also support re-encryption of traffic to the backend?
193193

194-
Yes, Azure Front Door supports SSL offload, and end to end SSL, which re-encrypts the traffic to the backend. In fact, since the connections to the backend happen over it's public IP, it is recommended that you configure your Front Door to use HTTPS as the forwarding protocol.
194+
Yes, Azure Front Door supports TLS/SSL offload, and end to end TLS, which re-encrypts the traffic to the backend. In fact, since the connections to the backend happen over it's public IP, it is recommended that you configure your Front Door to use HTTPS as the forwarding protocol.
195195

196196
### Does Front Door support self-signed certificates on the backend for HTTPS connection?
197197

198198
No, self-signed certificates are not supported on Front Door and the restriction applies to both:
199199

200200
1. **Backends**: You cannot use self-signed certificates when you are forwarding the traffic as HTTPS or HTTPS health probes or filling the cache for from origin for routing rules with caching enabled.
201-
2. **Frontend**: You cannot use self-signed certificates when using your own custom SSL certificate for enabling HTTPS on your custom domain.
201+
2. **Frontend**: You cannot use self-signed certificates when using your own custom TLS/SSL certificate for enabling HTTPS on your custom domain.
202202

203203
### Why is HTTPS traffic to my backend failing?
204204

205205
For having successful HTTPS connections to your backend whether for health probes or for forwarding requests, there could be two reasons why HTTPS traffic might fail:
206206

207-
1. **Certificate subject name mismatch**: For HTTPS connections, Front Door expects that your backend presents certificate from a valid CA with subject name(s) matching the backend hostname. As an example, if your backend hostname is set to `myapp-centralus.contosonews.net` and the certificate that your backend presents during the SSL handshake neither has `myapp-centralus.contosonews.net` nor `*myapp-centralus*.contosonews.net` in the subject name, the Front Door will refuse the connection and result in an error.
207+
1. **Certificate subject name mismatch**: For HTTPS connections, Front Door expects that your backend presents certificate from a valid CA with subject name(s) matching the backend hostname. As an example, if your backend hostname is set to `myapp-centralus.contosonews.net` and the certificate that your backend presents during the TLS handshake neither has `myapp-centralus.contosonews.net` nor `*myapp-centralus*.contosonews.net` in the subject name, the Front Door will refuse the connection and result in an error.
208208
1. **Solution**: While it is not recommended from a compliance standpoint, you can workaround this error by disabling certificate subject name check for your Front Door. This is present under Settings in Azure portal and under BackendPoolsSettings in the API.
209209
2. **Backend hosting certificate from invalid CA**: Only certificates from [valid CAs](/azure/frontdoor/front-door-troubleshoot-allowed-ca) can be used at the backend with Front Door. Certificates from internal CAs or self-signed certificates are not allowed.
210210

articles/frontdoor/front-door-how-to-onboard-apex-domain.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Mapping your apex or root domain to your Front Door profile basically requires C
2121
> [!NOTE]
2222
> There are other DNS providers as well that support CNAME flattening or DNS chasing, however, Azure Front Door recommends using Azure DNS for its customers for hosting their domains.
2323
24-
You can use the Azure portal to onboard an apex domain on your Front Door and enable HTTPS on it by associating it with a certificate for SSL termination. Apex domains are also referred as root or naked domains.
24+
You can use the Azure portal to onboard an apex domain on your Front Door and enable HTTPS on it by associating it with a certificate for TLS termination. Apex domains are also referred as root or naked domains.
2525

2626
In this article, you learn how to:
2727

@@ -60,7 +60,7 @@ In this article, you learn how to:
6060
2. Select the **Certificate management type** to _'Use my own certificate'_.
6161

6262
> [!WARNING]
63-
> Front Door managed certificate management type is not currently supported for apex or root domains. The only option available for enabling HTTPS on an apex or root domain for Front Door is using your own custom SSL certificate hosted on Azure Key Vault.
63+
> Front Door managed certificate management type is not currently supported for apex or root domains. The only option available for enabling HTTPS on an apex or root domain for Front Door is using your own custom TLS/SSL certificate hosted on Azure Key Vault.
6464
6565
3. Ensure that you have setup the right permissions for Front Door to access your key Vault as noted in the UI, before proceeding to the next step.
6666
4. Choose a **Key Vault account** from your current subscription and then select the appropriate **Secret** and **Secret version** to map to the right certificate.

articles/frontdoor/front-door-how-to-redirect-https.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,13 @@ ms.author: sharadag
1111
---
1212
# Create a Front Door with HTTP to HTTPS redirection using the Azure portal
1313

14-
You can use the Azure portal to create a [Front Door](front-door-overview.md) with a certificate for SSL termination. A routing rule is used to redirect HTTP traffic to HTTPS.
14+
You can use the Azure portal to create a [Front Door](front-door-overview.md) with a certificate for TLS termination. A routing rule is used to redirect HTTP traffic to HTTPS.
1515

1616
In this article, you learn how to:
1717

1818
> [!div class="checklist"]
1919
> * Create a Front Door with an existing Web App resource
20-
> * Add a custom domain with SSL certificate
20+
> * Add a custom domain with TLS/SSL certificate
2121
> * Setup HTTPS redirect on the custom domain
2222
2323
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
@@ -83,7 +83,7 @@ After you add the CNAME, the DNS records page looks like the following example:
8383
### Enable HTTPS on your custom domain
8484

8585
1. Click on the custom domain that was added and under the section **Custom domain HTTPS**, change the status to **Enabled**.
86-
2. You can leave the **Certificate management type** set to _Front Door managed_ for the free certificate maintained, managed, and autorotated by Front Door. You can also choose to use your own custom SSL certificate stored with Azure Key Vault. This tutorial assumes that the use of Front Door managed certificate.
86+
2. You can leave the **Certificate management type** set to _Front Door managed_ for the free certificate maintained, managed, and autorotated by Front Door. You can also choose to use your own custom TLS/SSL certificate stored with Azure Key Vault. This tutorial assumes that the use of Front Door managed certificate.
8787
![Enabling HTTPS for custom domain](./media/front-door-url-redirect/front-door-custom-domain-https.png)
8888

8989
3. Click on **Update** to save the selection and then click **Save**.

0 commit comments

Comments
 (0)