Skip to content

Commit 30ea095

Browse files
authored
Create reference for ASMC Changes July 28 2025
1 parent addcc3e commit 30ea095

File tree

1 file changed

+174
-0
lines changed

1 file changed

+174
-0
lines changed
Lines changed: 174 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,174 @@
1+
---
2+
title: App Service Managed Certificate (ASMC) Changes – July 28, 2025
3+
description: Learn about the upcoming changes to App Service Managed Certificates due to DigiCert's validation platform update and how to mitigate impact.
4+
author: yutanglin16
5+
ms.author: yutlin
6+
ms.service: azure-app-service
7+
ms.topic: conceptual
8+
ms.date: 07/28/2025
9+
---
10+
11+
# App Service Managed Certificate (ASMC) Changes – July 28, 2025
12+
13+
## Overview
14+
15+
Starting July 28, 2025, Azure App Service Managed Certificates (ASMC) are subject to new issuance and renewal requirements due to DigiCert’s migration to a new validation platform. This change is driven by industry-wide compliance with Multi-Perspective Issuance Corroboration (MPIC).
16+
17+
For a detailed explanation of the underlying changes at DigiCert, refer to [changes to the managed TLS feature](https://learn.microsoft.com/azure/security/fundamentals/managed-tls-changes).
18+
19+
## What’s changing
20+
21+
- **Validation method update**: ASMC now uses HTTP Token validation for both apex and subdomains. Previously, subdomains were validated using CNAME records, which did not require public access. With HTTP Token, DigiCert must reach a specific endpoint on your app to verify domain ownership.
22+
23+
App Service automatically places the required token at the correct path for validation. This applies to both initial certificate issuance and renewals, meaning:
24+
25+
- The customer experience for requesting an ASMC or proving domain ownership remains unchanged.
26+
- All API and CLI request payloads for ASMC creation or renewal are unaffected.
27+
- No customer action is needed to place or manage the token.
28+
29+
> [!IMPORTANT]
30+
> While App Service continues to handle token placement automatically during renewals, DigiCert must still reach the validation endpoint on your app. Public access is still required at the time of renewal. If your app is not publicly accessible, renewal will fail even if the token is correctly placed.
31+
32+
## Impacted scenarios
33+
34+
You will not be able to create or renew ASMCs if:
35+
36+
- Your app is not publicly accessible.
37+
- You use Azure Traffic Manager with nested or external endpoints.
38+
- You rely on `*.trafficmanager.net` domains.
39+
40+
Existing certificates will remain valid until expiration (up to 6 months), but will not renew automatically if your configuration is unsupported.
41+
42+
## Mitigation guidance
43+
44+
### Scenario 1: Site is not publicly accessible
45+
46+
Apps that are not accessible from the public internet will not be able to create or renew ASMCs. This includes restrictions via private endpoints, firewalls, IP restrictions, client certificates, authentication gateways, or custom access policies.
47+
48+
We recognize that making applications publicly accessible may conflict with customer security policies or introduce risk. The recommended mitigation is to replace ASMC with a custom certificate and update the TLS/SSL binding for your custom domain.
49+
50+
**Recommended steps:**
51+
52+
1. **Acquire a certificate for your custom domain**
53+
You may use any certificate provider that meets your security and operational requirements. The certificate should be compatible with Azure App Service and ideally stored in Azure Key Vault for easier management.
54+
55+
2. **Add the certificate to the site**
56+
After acquiring a certificate for your custom domain, you need to upload it to your App Service app and configure it for use. After acquiring a certificate for your custom domain, you need to upload it to your App Service app and configure it for use.
57+
> [!TIP]
58+
> Ensure that you have [authorized App Service to read the certificates from Key vault](https://learn.microsoft.com/azure/app-service/configure-ssl-certificate?tabs=apex%2Crbac%2Cazure-cli#authorize-app-service-to-read-from-the-vault). Use the specific identity listed in the documentation and not the Managed Identity of the site.
59+
60+
- [REST API: Import KV certificate to site](https://learn.microsoft.com/rest/api/appservice/certificates/create-or-update?view=rest-appservice-2024-11-01&tabs=HTTP)
61+
- [CLI: Import KV certificate to site](https://learn.microsoft.com/cli/azure/webapp/config/ssl?view=azure-cli-latest#az-webapp-config-ssl-import)
62+
63+
4. **Update the custom domain binding**
64+
> [!IMPORTANT]
65+
> **To avoid any service downtime, do not delete the TLS/SSL binding**. You can update the binding with the new certificate thumbprint or name that was added to the web app without deleting the current binding.
66+
67+
- [REST API: Update hostname binding](https://learn.microsoft.com/rest/api/appservice/web-apps/create-or-update-host-name-binding?view=rest-appservice-2024-11-01)
68+
- [CLI: Update hostname binding](https://learn.microsoft.com/cli/azure/webatest#az-webapp-config-ssl-bind)
69+
70+
5. **Remove other dependencies on ASMC**
71+
72+
- **Custom domain TLS/SSL bindings**
73+
Determine whether ASMCs are actively used for TLS/SSL bindings in your web app's custom domain configuration. If so, follow the steps above to replace the certificate and update the binding.
74+
75+
- **Certificate used in application code**
76+
Certificates may be used in application code for tasks such as authentication. If your app uses the `WEBSITE_LOAD_CERTIFICATES` setting to load ASMCs, update your code to use the new certificate instead.
77+
78+
6. **Delete ASMC resources**
79+
After confirming that your environment or services no longer depend on ASMC, delete the ASMCs associated with your site.
80+
Deleting ASMCs helps prevent accidental reuse, which could result in service downtime when the certificate fails to renew.
81+
82+
- [REST API: Delete Certificate](https://learn.microsoft.com/rest/api/appservice/certificates/delete?view=rest-appservice-2024-11-01)
83+
- [CLI: Delete certificate](https://learn.microsoft.com/cli/azure/webapp/config/ssl?view=azure-cli-latest#az-webapp-config-ssl-delete)
84+
85+
7. **Temporary mitigation: DigiCert IP allowlisting**
86+
Some customers may choose to allowlist DigiCert’s domain validation IPs to temporarily bypass public access restrictions. This can help avoid downtime, but:
87+
88+
- Microsoft does not control DigiCert’s IPs.
89+
- DigiCert may change IPs without notice.
90+
- This workaround is not officially supported or documented by Microsoft.
91+
- Use at your own risk.
92+
93+
For guidance on configuring access restrictions, refer to [set up Azure App Service access restrictions](https://learn.microsoft.com/azure/app-service/app-service-ip-restrictions?tabs=bicep).
94+
95+
---
96+
97+
### Scenario 2: Azure Traffic Manager with nested or external endpoints
98+
99+
Only “Azure Endpoints” are supported. “Nested” and “External” endpoints are not supported for ASMC validation.
100+
101+
**Recommended mitigation:**
102+
103+
- Switch to Azure Endpoints or use a custom domain secured with a custom certificate.
104+
- For guidance on using App Service as an Azure Traffic Manager endpoint, refer to [App Service and Traffic Manager Profiles](https://learn.microsoft.com/azure/app-service/web-sites-traffic-manager#app-service-and-traffic-manager-profiles).
105+
106+
---
107+
108+
### Scenario 3: Use of trafficmanager.net domains
109+
110+
Certificates for `*.trafficmanager.net` domains are not supported. If your app relies on this domain and uses ASMC, you will need to remove that dependency and secure your app using a custom domain and certificate.
111+
112+
**Recommended steps:**
113+
114+
1. **Add a custom domain to the site**
115+
You can configure a custom domain that points to your `trafficmanager.net` endpoint and secure it with your own certificate.
116+
117+
- If the custom domain is not yet live or does not currently serve traffic, refer to [set up custom domain name for your app](https://learn.microsoft.com/azure/app-service/app-service-web-tutorial-custom-domain?tabs=root%2Cpowershell).
118+
- If the domain is already active and serving traffic, refer to [migrate an active domain](https://learn.microsoft.com/azure/app-service/manage-custom-dns-migrate-domain).
119+
120+
> [!IMPORTANT]
121+
> If the site restricts public access, do not use ASMC to secure the custom domain. This scenario is impacted by the validation change and will result in certificate issuance or renewal failure.
122+
123+
3. **Acquire a certificate for the custom domain**
124+
You may use any certificate provider that meets your security and operational requirements. The certificate should be compatible with Azure App Service and ideally stored in Azure Key Vault for easier management.
125+
126+
4. **Add the certificate to the site**
127+
> [!TIP]
128+
> Ensure that you have [authorized App Service to read the certificates from Key vault](https://learn.microsoft.com/azure/app-service/configure-ssl-certificate?tabs=apex%2Crbac%2Cazure-cli#authorize-app-service-to-read-from-the-vault). Use the specific identity listed in the documentation—not the Managed Identity of the site.
129+
130+
- [REST API: Import Key Vault certificate to site](https://learn.microsoft.com/rest/api/appservice/certificates/create-ors://learn.microsoft.com/cli/azure/webapp/config/ssl?view=azure-cli-latest#az-webapp-config-ssl-import)
131+
132+
5. **Create a custom domain binding**
133+
134+
- [REST API: Create hostname binding](https://learn.microsoft.com/rest/api/appservice/web-apps/create-or-update-host-name-binding?view=rest-appservice-2024-11-01)
135+
- [CLI: Create hostname binding](https://learn.microsoft.com/cli/azure/webatest#az-webapp-config-ssl-bind)
136+
137+
6. **Remove other dependencies on ASMC**
138+
139+
- **Custom domain TLS/SSL bindings**
140+
Determine whether ASMCs are actively used for TLS/SSL bindings in your web app's custom domain configuration. If so, follow the steps above to replace the certificate and update the binding.
141+
142+
- **Certificate used in application code**
143+
Certificates may be used in application code for tasks such as authentication. If your app uses the `WEBSITE_LOAD_CERTIFICATES` setting to load ASMCs, update your code to use the new certificate instead.
144+
145+
7. **Delete ASMC resources**
146+
After confirming that your environment or services no longer depend on ASMC, delete the ASMCs associated with your site.
147+
Deleting ASMCs helps prevent accidental reuse, which could result in service downtime when the certificate fails to renew.
148+
149+
- [REST API: Delete Certificate](https://learn.microsoft.com/rest/api/appservice/certificates/delete?view=rest-appservice-2024-11-01)
150+
- [CLI: Delete certificate](https://learn.microsoft.com/cli/azure/webapp/config/ssl?view=azure-cli-latest#az-webapp-config-ssl-delete)
151+
152+
---
153+
154+
## Frequently asked questions (FAQ)
155+
156+
**Why is public access now required?**
157+
Due to MPIC compliance, DigiCert must verify domain ownership by reaching a specific endpoint on your app. This is only possible if the app is publicly accessible. Previously, CNAME validation sufficed, but HTTP Token validation now requires direct access.
158+
159+
**Can I still use CNAME records?**
160+
Yes, you can still use CNAME records for DNS routing. However, validation now uses HTTP Token, so public access is still required even if CNAME is present.
161+
162+
**What if I allowlist DigiCert IPs?**
163+
This may work temporarily, but Microsoft cannot guarantee stability or updates. DigiCert may change IPs without notice, and Microsoft will not maintain documentation for these IPs. Customers are responsible for monitoring and maintaining this configuration.
164+
165+
**Are certificates for \*.azurewebsites.net impacted?**
166+
No. These changes only apply to App Service Managed Certificates which are issued to customer’s custom domain.
167+
168+
---
169+
170+
## Additional resources
171+
172+
- [Important Changes to App Service Managed Certificates – Tech Community Blog](https://techcommunity.microsoft.com/blog/appsonazureblog/important-changes-to-app-service-managed-certificates-is-your-certificate-affect/4435193)
173+
- https://learn.microsoft.com/azure/security/fundamentals/managed-tls-changes
174+
- https://learn.microsoft.com/azure/app-service/app-service-ip-restrictions?tabs=bicep

0 commit comments

Comments
 (0)