You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/frontdoor/front-door-custom-domain.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: frontdoor
5
5
author: duongau
6
6
ms.service: azure-frontdoor
7
7
ms.topic: how-to
8
-
ms.date: 04/04/2023
8
+
ms.date: 08/12/2024
9
9
ms.author: duau
10
10
#Customer intent: As a website owner, I want to add a custom domain to my Front Door configuration so that my users can use my custom domain to access my content.
11
11
---
@@ -40,7 +40,7 @@ A custom domain can only be associated with one Front Door profile at a time. Ho
40
40
41
41
## Map the temporary afdverify subdomain
42
42
43
-
When you map an existing domain that is in production, there are things consider. While you're registering your custom domain in the Azure portal, a brief period of downtime for the domain may occur. To avoid interruption of web traffic, map your custom domain to your Front Door default frontend host with the Azure afdverify subdomain first to create a temporary CNAME mapping. Your users can access your domain without interruption when the DNS mapping occurs.
43
+
When you map an existing domain that is in production, there are things consider. While you're registering your custom domain in the Azure portal, a brief period of downtime for the domain might occur. To avoid interruption of web traffic, map your custom domain to your Front Door default frontend host with the Azure afdverify subdomain first to create a temporary CNAME mapping. Your users can access your domain without interruption when the DNS mapping occurs.
44
44
45
45
If you're using your custom domain for the first time with no production traffic, you can directly map your custom domain to your Front Door. You can skip ahead to [Map the permanent custom domain](#map-the-permanent-custom-domain).
46
46
@@ -50,7 +50,7 @@ To create a CNAME record with the afdverify subdomain:
50
50
51
51
2. Find the page for managing DNS records by consulting the provider's documentation or searching for areas of the web site labeled **Domain Name**, **DNS**, or **Name server management**.
52
52
53
-
3. Create a CNAME record entry for your custom domain and complete the fields as shown in the following table (field names may vary):
53
+
3. Create a CNAME record entry for your custom domain and complete the fields as shown in the following table (field names might vary):
@@ -78,7 +78,7 @@ For example, the procedure for the GoDaddy domain registrar is as follows:
78
78
79
79
- Type: Leave *CNAME* selected.
80
80
81
-
- Host: Enter the subdomain of your custom domain to use, including the afdverify subdomain name. For example, afdverify.www.
81
+
- Host: Enter the subdomain of your custom domain for use, including the afdverify subdomain name. For example, afdverify.www.
82
82
83
83
- Points to: Enter the host name of your default Front Door frontend host, including the afdverify subdomain name. For example, afdverify.contoso-frontend.azurefd.net.
84
84
@@ -91,7 +91,7 @@ For example, the procedure for the GoDaddy domain registrar is as follows:
91
91
92
92
## Associate the custom domain with your Front Door
93
93
94
-
After you've registered your custom domain, you can then add it to your Front Door.
94
+
After you register your custom domain, you can then add it to your Front Door.
95
95
96
96
1. Sign in to the [Azure portal](https://portal.azure.com/) and browse to the Front Door containing the frontend host that you want to map to a custom domain.
97
97
@@ -112,22 +112,22 @@ After you've registered your custom domain, you can then add it to your Front Do
112
112
113
113
## Verify the custom domain
114
114
115
-
After you've completed the registration of your custom domain, verify that the custom domain references your default Front Door frontend host.
115
+
After you complete the registration of your custom domain, verify that the custom domain references your default Front Door frontend host.
116
116
117
117
In your browser, navigate to the address of the file by using the custom domain. For example, if your custom domain is robotics.contoso.com, the URL to the cached file should be similar to the following URL: http:\//robotics.contoso.com/my-public-container/my-file.jpg. Verify that the result is that same as when you access the Front Door directly at *<Front Door host>*.azurefd.net.
118
118
119
119
120
120
## Map the permanent custom domain
121
121
122
-
If you've verified that the afdverify subdomain has been successfully mapped to your Front Door, you can then map the custom domain directly to your default Front Door frontend host.
122
+
To proceed with mapping the custom domain directly to your default Front Door frontend host, you need to ensure that the afdverify subdomain was successfully mapped to your Front Door. Once verified, you can proceed with mapping the custom domain.
123
123
124
124
To create a CNAME record for your custom domain:
125
125
126
126
1. Sign in to the web site of the domain provider for your custom domain.
127
127
128
128
2. Find the page for managing DNS records by consulting the provider's documentation or searching for areas of the web site labeled **Domain Name**, **DNS**, or **Name Server Management**.
129
129
130
-
3. Create a CNAME record entry for your custom domain and complete the fields as shown in the following table (field names may vary):
130
+
3. Create a CNAME record entry for your custom domain and complete the fields as shown in the following table (field names might vary):
@@ -141,7 +141,7 @@ To create a CNAME record for your custom domain:
141
141
142
142
4. Save your changes.
143
143
144
-
5. If you're previously created a temporary afdverify subdomain CNAME record, delete it.
144
+
5. If you previously created a temporary afdverify subdomain CNAME record, delete it.
145
145
146
146
6. If you're using this custom domain in production for the first time, follow the steps for [Associate the custom domain with your Front Door](#associate-the-custom-domain-with-your-front-door) and [Verify the custom domain](#verify-the-custom-domain).
147
147
@@ -177,7 +177,7 @@ For example, the procedure for the GoDaddy domain registrar is as follows:
177
177
178
178
In the preceding steps, you added a custom domain to a Front Door. If you no longer want to associate your Front Door with a custom domain, you can remove the custom domain by doing these steps:
179
179
180
-
1. Go to your DNS provider, delete the CNAME record for the custom domain or update the CNAME record for the custom domain to a non Front Door endpoint.
180
+
1. Go to your DNS provider, delete the CNAME record for the custom domain, or update the CNAME record for the custom domain to a non Front Door endpoint.
181
181
182
182
> [!Important]
183
183
> To prevent dangling DNS entries and the security risks they create, starting from April 9th 2021, Azure Front Door requires removal of the CNAME records to Front Door endpoints before the resources can be deleted. Resources include Front Door custom domains, Front Door endpoints or Azure resource groups that has Front Door custom domain(s) enabled.
Copy file name to clipboardExpand all lines: articles/frontdoor/front-door-routing-architecture.md
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: front-door
6
6
author: duongau
7
7
ms.service: azure-frontdoor
8
8
ms.topic: conceptual
9
-
ms.date: 04/04/2023
9
+
ms.date: 08/12/2024
10
10
ms.author: duau
11
11
zone_pivot_groups: front-door-tiers
12
12
---
@@ -55,23 +55,23 @@ When Front Door receives an HTTP request, it uses the request's `Host` header to
55
55
56
56
::: zone-end
57
57
58
-
The client and server perform a TLS handshake using the TLS certificate you've configured for your custom domain name, or by using the Front Door certificate when the `Host` header ends with `*.azurefd.net`.
58
+
The client and server perform a TLS handshake using the TLS certificate you configured for your custom domain name, or by using the Front Door certificate when the `Host` header ends with `*.azurefd.net`.
59
59
60
60
## Evaluate WAF rules
61
61
62
62
::: zone pivot="front-door-standard-premium"
63
63
64
-
If your domain has enabled the Web Application Firewall, WAF rules are evaluated.
64
+
If your domain has Web Application Firewall enabled, WAF rules are evaluated.
65
65
66
66
::: zone-end
67
67
68
68
::: zone pivot="front-door-classic"
69
69
70
-
If your frontend has enabled the Web Application Firewall, WAF rules are evaluated.
70
+
If your frontend has Web Application Firewall enabled, WAF rules are evaluated.
71
71
72
72
::: zone-end
73
73
74
-
If a rule has been violated, Front Door returns an error to the client and the request processing stops.
74
+
If a rule gets violated, Front Door returns an error to the client and the request processing stops.
75
75
76
76
::: zone pivot="front-door-standard-premium"
77
77
@@ -97,15 +97,15 @@ The route specifies the [backend pool](front-door-backend-pool.md) that the requ
97
97
98
98
## Evaluate rule sets
99
99
100
-
If you have defined [rule sets](front-door-rules-engine.md) for the route, they're executed in the order they're configured. [Rule sets can override the origin group](front-door-rules-engine-actions.md#RouteConfigurationOverride) specified in a route. Rule sets can also trigger a redirection response to the request instead of forwarding it to an origin.
100
+
If you define [rule sets](front-door-rules-engine.md) for the route, they get process in the order configured. [Rule sets can override the origin group](front-door-rules-engine-actions.md#RouteConfigurationOverride) specified in a route. Rule sets can also trigger a redirection response to the request instead of forwarding it to an origin.
101
101
102
102
::: zone-end
103
103
104
104
::: zone pivot="front-door-classic"
105
105
106
106
## Evaluate rules engines
107
107
108
-
If you have defined [rules engines](front-door-rules-engine.md) for the route, they're executed in the order they're configured. [Rules engines can override the backend pool](front-door-rules-engine-actions.md#route-configuration-overrides) specified in a routing rule. Rules engines can also trigger a redirection response to the request instead of forwarding it to a backend.
108
+
If you define [rules engines](front-door-rules-engine.md) for the route, they get process in the order configured. [Rules engines can override the backend pool](front-door-rules-engine-actions.md#route-configuration-overrides) specified in a routing rule. Rules engines can also trigger a redirection response to the request instead of forwarding it to a backend.
109
109
110
110
::: zone-end
111
111
@@ -133,11 +133,11 @@ If caching is disabled or no response is available, the request is forwarded to
133
133
134
134
Front Door selects an origin to use within the origin group. Origin selection is based on several factors, including:
135
135
136
-
-The health of each origin, which Front Door monitors by using [health probes](front-door-health-probes.md).
137
-
-The [routing method](front-door-routing-methods.md) for your origin group.
138
-
-Whether you have enabled[session affinity](front-door-routing-methods.md#affinity)
136
+
-Health of each origin, which Front Door monitors by using [health probes](front-door-health-probes.md).
137
+
-[Routing method](front-door-routing-methods.md) for your origin group.
138
+
-If you enable[session affinity](front-door-routing-methods.md#affinity)
139
139
140
-
## Forward request to origin
140
+
## Forward the request to the origin
141
141
142
142
Finally, the request is forwarded to the origin.
143
143
@@ -149,11 +149,11 @@ Finally, the request is forwarded to the origin.
149
149
150
150
Front Door selects a backend to use within the backend pool. Backend selection is based on several factors, including:
151
151
152
-
-The health of each backend, which Front Door monitors by using [health probes](front-door-health-probes.md).
153
-
-The [routing method](front-door-routing-methods.md) for your backend pool.
154
-
-Whether you have enabled[session affinity](front-door-routing-methods.md#affinity)
152
+
-Health of each backend, which Front Door monitors by using [health probes](front-door-health-probes.md).
153
+
-[Routing method](front-door-routing-methods.md) for your backend pool.
154
+
-If you have enable[session affinity](front-door-routing-methods.md#affinity)
155
155
156
-
## Forward request to backend
156
+
## Forward the request to the backend
157
157
158
158
Finally, the request is forwarded to the backend.
159
159
@@ -163,12 +163,12 @@ Finally, the request is forwarded to the backend.
163
163
164
164
::: zone pivot="front-door-standard-premium"
165
165
166
-
- Learn how to [create a Front Door profile](standard-premium/create-front-door-portal.md).
166
+
- Learn how to [create an Azure Front Door profile](standard-premium/create-front-door-portal.md).
167
167
168
168
::: zone-end
169
169
170
170
::: zone pivot="front-door-classic"
171
171
172
-
- Learn how to [create a Front Door profile](quickstart-create-front-door.md).
172
+
- Learn how to [create an Azure Front Door (classic) profile](quickstart-create-front-door.md).
0 commit comments