Skip to content

Commit 2081fdf

Browse files
authored
Minor text edits
1 parent f63b6be commit 2081fdf

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/app-service/app-service-managed-certificate-changes-july-2025.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -31,21 +31,21 @@ For a detailed explanation of the underlying changes at DigiCert, refer to [chan
3131

3232
You can't create or renew ASMCs if your:
3333
1. Site is not publicly accessible.
34-
- Public accessibility to your app is required. If your app is only accessible privately (e.g., requiring a client certificate for access, disabling public network access, using private endpoints or IP restrictions), you will not be able to create or renew a managed certificate.
34+
- Public accessibility to your app is required. If your app is only accessible privately (for example, requiring a client certificate for access, disabling public network access, using private endpoints or IP restrictions), you will not be able to create or renew a managed certificate.
3535
- Other site configurations or setup methods not explicitly listed here that restrict public access, such as firewalls, authentication gateways, or any custom access policies, can also impact eligibility for managed certificate issuance or renewal.
3636
1. Site is an Azure Traffic Manager "nested" or "external" endpoint:
37-
- Only Azure Endpoints on Traffic Manager will be supported for certificate creation and renewal.
38-
- Nested endpoints and External endpoints will not be supported.
37+
- Only "Azure Endpoints" on Traffic Manager will be supported for certificate creation and renewal.
38+
- "Nested endpoints" and "External endpoints" will not be supported.
3939
1. Site relies on _*.trafficmanager.net_ domains.
4040
- Certificates for _*.trafficmanager.net_ domains will not be supported for creation or renewal.
4141

42-
Existing certificates remain valid until expiration (up to 6 months), but will not renew automatically if your configuration is unsupported.
42+
Existing certificates remain valid until expiration (up to six months), but will not renew automatically if your configuration is unsupported.
4343

4444
## Identify impacted resources
45-
You can use [Azure Resource Graph (ARG)](https://portal.azure.com/?feature.customPortal=false#view/HubsExtension/ArgQueryBlade) queries to help identify resources that may be affected under each scenario. Please note that these queries are provided as a starting point and may not capture every configuration. Review your environment for any unique setups or custom configurations.
45+
You can use [Azure Resource Graph (ARG)](https://portal.azure.com/?feature.customPortal=false#view/HubsExtension/ArgQueryBlade) queries to help identify resources that may be affected under each scenario. Note that these queries are provided as a starting point and may not capture every configuration. Review your environment for any unique setups or custom configurations.
4646

4747
### Scenario 1: Site is not publicly accessible
48-
This ARG query retrieves a list of sites that either have the public network access property disabled or are configured to use client certificates. It then filters for sites that are using App Service Managed Certificates (ASMC) for their custom hostname SSL bindings. These certificates are the ones that could be affected by the upcoming changes. However, please note that this query does not provide complete coverage, as there may be additional configurations impacting public access to your app that are not included here. Ultimately, this query serves as a helpful guide for users, but a thorough review of your environment is recommended. You can copy this query, paste it into [ARG Explorer](https://portal.azure.com/?feature.customPortal=false#view/HubsExtension/ArgQueryBlade), and then click "Run query" to view the results for your environment.
48+
This ARG query retrieves a list of sites that either have the public network access property disabled or are configured to use client certificates. It then filters for sites that are using App Service Managed Certificates (ASMC) for their custom hostname SSL bindings. These certificates are the ones that could be affected by the upcoming changes. However, note that this query does not provide complete coverage, as there may be other configurations impacting public access to your app that are not included here. Ultimately, this query serves as a helpful guide for users, but a thorough review of your environment is recommended. You can copy this query, paste it into [ARG Explorer](https://portal.azure.com/?feature.customPortal=false#view/HubsExtension/ArgQueryBlade), and then click "Run query" to view the results for your environment.
4949

5050
```kql
5151
// ARG Query: Identify App Service sites that commonly restrict public access and use ASMC for custom hostname SSL bindings
@@ -139,7 +139,7 @@ resources
139139

140140
### Scenario 1: Site is not publicly accessible
141141

142-
Apps that are not accessible from the public internet will not be able to create or renew ASMCs. This includes restrictions via private endpoints, firewalls, IP restrictions, client certificates, authentication gateways, or custom access policies.
142+
Apps that are not accessible from the public internet cannot create or renew ASMCs. These configurations may include restrictions enforced through private endpoints, firewalls, IP filtering, client certificates, authentication gateways, or custom access policies.
143143

144144
We recognize that making applications publicly accessible may conflict with customer security policies or introduce risk. The recommended mitigation is to replace ASMC with a custom certificate and update the TLS/SSL binding for your custom domain.
145145

@@ -192,7 +192,7 @@ For guidance on configuring access restrictions, refer to [set up Azure App Serv
192192

193193
### Scenario 2: Site is an Azure Traffic Manager "nested" or "external" endpoint
194194

195-
Only Azure Endpoints are supported. Nested and External endpoints are not supported for ASMC validation.
195+
Only "Azure Endpoints" are supported. "Nested" and "External" endpoints are not supported for ASMC validation.
196196

197197
**Recommended mitigation:**
198198

0 commit comments

Comments
 (0)