You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-backend-health-troubleshooting.md
+27-27Lines changed: 27 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -252,14 +252,14 @@ For V1, verify the backend pool target's FQDN is same the Common Name (CN).
252
252
253
253
* By using browser or any client:
254
254
Access the backend server directly (not through Application Gateway) and click on the certificate padlock in the address bar to view the certificate details. You will find it under the “Issued To” section.
255
-

255
+
[](./media/application-gateway-backend-health-troubleshooting/browser-cert.png#lightbox)
256
256
257
257
* By logging into the backend server (Windows):
258
-
1. Sign into the machine where your application is hosted.
259
-
2. Select Win+R or right-click the Start button and select Run.
260
-
3. Enter certlm.msc and select Enter. You can also search for Certificate Manager on the Start menu.
261
-
4. Locate the certificate (typically in Certificates - Local Computer\Personal\Certificates), and open the certificate.
262
-
5. On the Details tab, check the certificate Subject.
258
+
1. Sign into the machine where your application is hosted.
259
+
2. Select Win+R or right-click the Start button and select Run.
260
+
3. Enter certlm.msc and select Enter. You can also search for Certificate Manager on the Start menu.
261
+
4. Locate the certificate (typically in Certificates - Local Computer\Personal\Certificates), and open the certificate.
262
+
5. On the Details tab, check the certificate Subject.
263
263
264
264
* By logging to the backend server (Linux):
265
265
Run this OpenSSL command by specifying the right certificate filename ` openssl x509 -in certificate.crt -subject -noout`
@@ -295,7 +295,7 @@ For V1 SKU,
295
295
> A self-signed certificate which is NOT a Certificate Authority will also result in the same error. This is because application gateway considers such self-signed certificate as "Leaf" certificate and looks for its signing Intermediate certificate. You can follow this article to correctly [generate a self-signed certificate](./self-signed-certificates.md).
296
296
297
297
These images show the difference between the self-signed certificates.
298
-

298
+
[](./media/application-gateway-backend-health-troubleshooting/self-signed-types.png#lightbox)
299
299
300
300
### The leaf or server certificate was not found
301
301
**Message:** The **Leaf certificate is missing** from the certificate chain presented by the backend server. Ensure the chain is complete and correctly ordered on the backend server.
@@ -339,27 +339,27 @@ These images show the difference between the self-signed certificates.
339
339
**Tips:** To identify and download the root certificate, you can use any of these methods.
340
340
341
341
* Using a browser: Access the backend server directly (not through Application Gateway) and click on the certificate padlock in the address bar to view the certificate details.
342
-
1. Choose the root certificate in the chain and click on Export. By default, this will be a .CRT file.
343
-
2. Open that .CRT file.
344
-
3. Go to the Details tab and click on “Copy to File”,
345
-
4. On Certificate Export Wizard page, click Next,
346
-
5. Select “Base-64 encoded X.509 (.CER) and click Next,
347
-
6. Give a new file name and click Next,
348
-
7. Click Finish to get a .CER file.
349
-
8. Upload this Root certificate (.CER) of your private CA to the application gateway’s backend setting.
342
+
1. Choose the root certificate in the chain and click on Export. By default, this will be a .CRT file.
343
+
2. Open that .CRT file.
344
+
3. Go to the Details tab and click on “Copy to File”,
345
+
4. On Certificate Export Wizard page, click Next,
346
+
5. Select “Base-64 encoded X.509 (.CER) and click Next,
347
+
6. Give a new file name and click Next,
348
+
7. Click Finish to get a .CER file.
349
+
8. Upload this Root certificate (.CER) of your private CA to the application gateway’s backend setting.
350
350
351
351
* By logging into the backend server (Windows)
352
-
1. Sign into the machine where your application is hosted.
353
-
2. Select Win+R or right-click the Start button, and then select Run.
354
-
3. Enter certlm.msc and select Enter. You can also search for Certificate Manager on the Start menu.
355
-
4. Locate the certificate, typically in Certificates - Local Computer\Personal\Certificates, and open it.
356
-
5. Select the root certificate and then select View Certificate.
357
-
6. In the Certificate properties, select the Details tab and click “Copy to File”,
358
-
7. On Certificate Export Wizard page, click Next,
359
-
8. Select “Base-64 encoded X.509 (.CER) and click Next,
360
-
9. Give a new file name and click Next,
361
-
10. Click Finish to get a .CER file.
362
-
11. Upload this Root certificate (.CER) of your private CA to the application gateway’s backend setting.
352
+
1. Sign into the machine where your application is hosted.
353
+
2. Select Win+R or right-click the Start button, and then select Run.
354
+
3. Enter certlm.msc and select Enter. You can also search for Certificate Manager on the Start menu.
355
+
4. Locate the certificate, typically in Certificates - Local Computer\Personal\Certificates, and open it.
356
+
5. Select the root certificate and then select View Certificate.
357
+
6. In the Certificate properties, select the Details tab and click “Copy to File”,
358
+
7. On Certificate Export Wizard page, click Next,
359
+
8. Select “Base-64 encoded X.509 (.CER) and click Next,
360
+
9. Give a new file name and click Next,
361
+
10. Click Finish to get a .CER file.
362
+
11. Upload this Root certificate (.CER) of your private CA to the application gateway’s backend setting.
363
363
364
364
### Leaf must be topmost in chain.
365
365
@@ -374,7 +374,7 @@ Given is an example of a Server certificate installation along with its Intermed
0 commit comments