Skip to content

Commit 550a6c4

Browse files
Merge pull request #302760 from MicrosoftDocs/main
Auto Publish – main to live - 2025-07-15 17:00 UTC
2 parents 7005656 + 752166d commit 550a6c4

File tree

60 files changed

+813
-973
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

60 files changed

+813
-973
lines changed

articles/app-service/configure-ssl-certificate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ You can add up to 1,000 private certificates per webspace.
5555

5656
## Create a free managed certificate
5757

58-
The free App Service managed certificate is a turnkey solution that helps to secure your custom DNS name in App Service. App Service manages this TLS/SSL server certificate without any action from you.
58+
The free App Service managed certificate is a turn-key solution for helping to secure your custom DNS name in App Service. Without any action from you, this TLS/SSL server certificate is fully managed by App Service and is automatically renewed continuously in six-month increments, 45 days before expiration, as long as the prerequisites that you set up stay the same. All the associated bindings are updated with the renewed certificate. You create and bind the certificate to a custom domain, and let App Service do the rest.
5959

6060
Before you create a free managed certificate, make sure that you [meet the prerequisites](#prerequisites) for your app.
6161

articles/app-service/overview-ai-integration.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ Build AI-powered .NET applications with these tutorials:
3535
- [Build a RAG application with Azure OpenAI and Azure SQL](deploy-intelligent-apps-dotnet-to-azure-sql.md) - Use Azure SQL as a vector database for RAG applications.
3636
- [Run a chatbot with a local SLM sidecar extension](tutorial-ai-slm-dotnet.md) - Deploy a chatbot that uses a local SLM without requiring an external AI service.
3737
- [Invoke a web app from Azure AI Foundry Agent](invoke-openapi-web-app-from-azure-ai-agent-service.md) - Make your web API available to AI agents.
38+
- [Build an agentic web app with Semantic Kernel Agent2Agent (A2A) Protocol integration](https://techcommunity.microsoft.com/blog/appsonazureblog/building-agent-to-agent-a2a-applications-on-azure-app-service/4433114) - Deploy a multi-agent system where a main agent coordinates with specialized agents using [A2A](https://a2aproject.github.io/A2A/latest/).
3839

3940
## Java applications
4041

articles/application-gateway/mutual-authentication-powershell.md

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -5,24 +5,25 @@ services: application-gateway
55
author: mbender-ms
66
ms.service: azure-application-gateway
77
ms.topic: how-to
8-
ms.date: 02/18/2022
8+
ms.date: 07/11/2025
99
ms.author: mbender
1010
ms.custom: devx-track-azurepowershell
1111
# Customer intent: "As an IT admin, I want to configure mutual authentication for my Application Gateway using PowerShell, so that I can ensure secure client-server communication through certificate verification."
1212
---
1313

1414
# Configure mutual authentication with Application Gateway through PowerShell
15-
This article describes how to use the PowerShell to configure mutual authentication on your Application Gateway. Mutual authentication means Application Gateway authenticates the client sending the request using the client certificate you upload onto the Application Gateway.
15+
This article describes how to use PowerShell to configure mutual authentication on your Application Gateway. Mutual authentication means Application Gateway authenticates the client sending the request using the client certificate you upload onto the Application Gateway.
1616

1717
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
1818

19-
[!INCLUDE [updated-for-az](~/reusable-content/ce-skilling/azure/includes/updated-for-az.md)]
19+
> [!NOTE]
20+
> We recommend that you use the Azure Az PowerShell module to interact with Azure. To get started, see [Install Azure PowerShell](/powershell/azure/install-azure-powershell). To learn how to migrate to the Az PowerShell module, see [Migrate Azure PowerShell from AzureRM to Az](/powershell/azure/migrate-from-azurerm-to-az).
2021
21-
This article requires the Azure PowerShell module version 1.0.0 or later. Run `Get-Module -ListAvailable Az` to find the version. If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-azure-powershell). If you're running PowerShell locally, you also need to run `Login-AzAccount` to create a connection with Azure.
22+
This article requires the Azure PowerShell module version 1.0.0 or later. Run `Get-Module -ListAvailable Az` to find the version. If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-azure-powershell). If you're running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure.
2223

2324
## Before you begin
2425

25-
To configure mutual authentication with an Application Gateway, you need a client certificate to upload to the gateway. The client certificate will be used to validate the certificate the client will present to Application Gateway. For testing purposes, you can use a self-signed certificate. However, this is not advised for production workloads, because they're harder to manage and aren't completely secure.
26+
To configure mutual authentication with an Application Gateway, you need a client certificate to upload to the gateway. The client certificate is used to validate the certificate the client presents to Application Gateway. For testing purposes, you can use a self-signed certificate. However, this is not advised for production workloads, because they're harder to manage and aren't completely secure.
2627

2728
To learn more, especially about what kind of client certificates you can upload, see [Overview of mutual authentication with Application Gateway](./mutual-authentication-overview.md#certificates-supported-for-mutual-authentication).
2829

@@ -62,9 +63,9 @@ $fipconfig = New-AzApplicationGatewayFrontendIPConfig -Name $fipconfigName -Publ
6263
$port = New-AzApplicationGatewayFrontendPort -Name $frontendPortName -Port 443
6364
```
6465

65-
## Configure frontend SSL
66+
## Configure frontend TLS/SSL
6667

67-
Configure the SSL certificates for your Application Gateway.
68+
Configure the TLS/SSL certificates for your Application Gateway.
6869

6970
```azurepowershell
7071
$password = ConvertTo-SecureString "P@ssw0rd" -AsPlainText -Force
@@ -77,10 +78,10 @@ $sslCert = New-AzApplicationGatewaySslCertificate -Name $sslCertName -Certificat
7778
Configure client authentication on your Application Gateway. For more information on how to extract trusted client CA certificate chains to use here, see [how to extract trusted client CA certificate chains](./mutual-authentication-certificate-management.md).
7879

7980
> [!IMPORTANT]
80-
> Please ensure that you upload the entire client CA certificate chain in one file, and only one chain per file.
81+
> Ensure that you upload the entire client CA certificate chain in one file, and only one chain per file. The maximum size of each uploaded file must be 25 KB or less.
8182
8283
> [!NOTE]
83-
> We recommend using TLS 1.2 with mutual authentication as TLS 1.2 will be mandated in the future.
84+
> We recommend using TLS 1.2 with mutual authentication as TLS 1.2 will be mandated starting August 31, 2025.
8485
8586
```azurepowershell
8687
$clientCertFilePath = $basedir + "/ScenarioTests/Data/TrustedClientCertificate.cer"
@@ -93,7 +94,7 @@ $listener = New-AzApplicationGatewayHttpListener -Name $listenerName -Protocol H
9394

9495
## Configure the backend pool and settings
9596

96-
Set up backend pool and settings for your Application Gateway. Optionally, set up the backend trusted root certificate for end-to-end SSL encryption.
97+
Set up backend pool and settings for your Application Gateway. Optionally, set up the backend trusted root certificate for end-to-end TLS/SSL encryption.
9798

9899
```azurepowershell
99100
$certFilePath = $basedir + "/ScenarioTests/Data/ApplicationGatewayAuthCert.cer"
@@ -110,17 +111,17 @@ Set up a rule on your Application Gateway.
110111
$rule = New-AzApplicationGatewayRequestRoutingRule -Name $ruleName -RuleType basic -BackendHttpSettings $poolSetting -HttpListener $listener -BackendAddressPool $pool
111112
```
112113

113-
## Set up default SSL policy for future listeners
114+
## Set up default TLS/SSL policy for future listeners
114115

115-
You've set up a listener specific SSL policy while setting up mutual authentication. In this step, you can optionally set the default SSL policy for future listeners you create.
116+
You've set up a listener specific TLS/SSL policy while setting up mutual authentication. In this step, you can optionally set the default TLS/SSL policy for future listeners you create.
116117

117118
```azurepowershell
118119
$sslPolicyGlobal = New-AzApplicationGatewaySslPolicy -PolicyType Predefined -PolicyName "AppGwSslPolicy20170401"
119120
```
120121

121122
## Create the Application Gateway
122123

123-
Using everything we created above, deploy your Application Gateway.
124+
Using everything we created, deploy your Application Gateway.
124125

125126
```azurepowershell
126127
$sku = New-AzApplicationGatewaySku -Name Standard_v2 -Tier Standard_v2

articles/application-gateway/tutorial-autoscale-ps.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.custom: mvc, devx-track-azurepowershell
1313
---
1414
# Tutorial: Create an application gateway that improves web application access
1515

16-
If you're an IT admin concerned with improving web application access, you can optimize your application gateway to scale based on customer demand and span multiple availability zones. This tutorial helps you configure Azure Application Gateway features that do that: autoscaling, zone redundancy, and reserved VIPs (static IP). You'll use Azure PowerShell cmdlets and the Azure Resource Manager deployment model to solve the problem.
16+
If you're an IT admin concerned with improving web application access, you can optimize your application gateway to scale based on customer demand and span multiple availability zones. This tutorial helps you configure Azure Application Gateway v2 features that do that: autoscaling, zone redundancy, and static VIPs. You'll use Azure PowerShell cmdlets and the Azure Resource Manager deployment model to solve the problem.
1717

1818
In this tutorial, you learn how to:
1919

@@ -30,7 +30,8 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
3030

3131
## Prerequisites
3232

33-
[!INCLUDE [updated-for-az](~/reusable-content/ce-skilling/azure/includes/updated-for-az.md)]
33+
> [!NOTE]
34+
> We recommend that you use the Azure Az PowerShell module to interact with Azure. To get started, see [Install Azure PowerShell](/powershell/azure/install-azure-powershell). To learn how to migrate to the Az PowerShell module, see [Migrate Azure PowerShell from AzureRM to Az](/powershell/azure/migrate-from-azurerm-to-az).
3435
3536
This tutorial requires that you run an administrative Azure PowerShell session locally. You must have Azure PowerShell module version 1.0.0 or later installed. Run `Get-Module -ListAvailable Az` to find the version. If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-azure-powershell). After you verify the PowerShell version, run `Connect-AzAccount` to create a connection with Azure.
3637

@@ -118,7 +119,7 @@ $gwSubnet = Get-AzVirtualNetworkSubnetConfig -Name "AppGwSubnet" -VirtualNetwork
118119

119120
## Create web apps
120121

121-
Configure two web apps for the backend pool. Replace *\<site1-name>* and *\<site-2-name>* with unique names in the `azurewebsites.net` domain.
122+
Configure two web apps for the backend pool. Replace *\<site1-name>* and *\<site2-name>* with unique names in the `azurewebsites.net` domain.
122123

123124
```azurepowershell
124125
New-AzAppServicePlan -ResourceGroupName $rg -Name "ASP-01" -Location $location -Tier Basic `
@@ -135,7 +136,7 @@ Replace your two web app FQDNs (for example: `mywebapp.azurewebsites.net`) in th
135136

136137
```azurepowershell
137138
$ipconfig = New-AzApplicationGatewayIPConfiguration -Name "IPConfig" -Subnet $gwSubnet
138-
$fip = New-AzApplicationGatewayFrontendIPConfig -Name "FrontendIPCOnfig" -PublicIPAddress $publicip
139+
$fip = New-AzApplicationGatewayFrontendIPConfig -Name "FrontendIPConfig" -PublicIPAddress $publicip
139140
$pool = New-AzApplicationGatewayBackendAddressPool -Name "Pool1" `
140141
-BackendIPAddresses <your first web app FQDN>, <your second web app FQDN>
141142
$fp01 = New-AzApplicationGatewayFrontendPort -Name "SSLPort" -Port 443

0 commit comments

Comments
 (0)