Skip to content

Commit 55c579c

Browse files
committed
ms.date and acrolinx
1 parent 601aa62 commit 55c579c

File tree

1 file changed

+18
-22
lines changed

1 file changed

+18
-22
lines changed

articles/cloud-services/cloud-services-configure-ssl-certificate-portal.md

Lines changed: 18 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure TLS for a cloud service | Microsoft Docs
33
description: Learn how to specify an HTTPS endpoint for a web role and how to upload a TLS/SSL certificate to secure your application. These examples use the Azure portal.
44
ms.topic: article
55
ms.service: cloud-services
6-
ms.date: 02/21/2023
6+
ms.date: 07/23/2024
77
author: hirenshah1
88
ms.author: hirshah
99
ms.reviewer: mimckitt
@@ -20,21 +20,21 @@ Transport Layer Security (TLS), previously known as Secure Socket Layer (SSL) en
2020
> The procedures in this task apply to Azure Cloud Services; for App Services, see [this](../app-service/configure-ssl-bindings.md).
2121
>
2222
23-
This task uses a production deployment. Information on using a staging deployment is provided at the end of this topic.
23+
This task uses a production deployment. Information on using a staging deployment is provided at the end of this article.
2424

25-
Read [this](cloud-services-how-to-create-deploy-portal.md) first if you have not yet created a cloud service.
25+
Read [How to create and deploy an Azure Cloud Service (classic)](cloud-services-how-to-create-deploy-portal.md) first if you haven't yet created a cloud service.
2626

2727
## Step 1: Get a TLS/SSL certificate
28-
To configure TLS for an application, you first need to get a TLS/SSL certificate that has been signed by a Certificate Authority (CA), a trusted third party who issues certificates for this purpose. If you do not already have one, you need to obtain one from a company that sells TLS/SSL certificates.
28+
To configure TLS for an application, you first need to get a TLS/SSL certificate signed by a Certificate Authority (CA), a trusted partner who issues certificates for this purpose. If you don't already have one, you need to obtain one from a company that sells TLS/SSL certificates.
2929

3030
The certificate must meet the following requirements for TLS/SSL certificates in Azure:
3131

3232
* The certificate must contain a public key.
3333
* The certificate must be created for key exchange, exportable to a Personal Information Exchange (.pfx) file.
34-
* The certificate's subject name must match the domain used to access the cloud service. You cannot obtain a TLS/SSL certificate from a certificate authority (CA) for the cloudapp.net domain. You must acquire a custom domain name to use when access your service. When you request a certificate from a CA, the certificate's subject name must match the custom domain name used to access your application. For example, if your custom domain name is **contoso.com** you would request a certificate from your CA for ***.contoso.com** or **www\.contoso.com**.
34+
* The certificate's subject name must match the domain used to access the cloud service. You can't obtain a TLS/SSL certificate from a certificate authority (CA) for the cloudapp.net domain. You must acquire a custom domain name to use when accessing your service. When you request a certificate from a CA, the certificate's subject name must match the custom domain name used to access your application. For example, if your custom domain name is **contoso.com** you would request a certificate from your CA for ***.contoso.com** or **www\.contoso.com**.
3535
* The certificate must use a minimum of 2048-bit encryption.
3636

37-
For test purposes, you can [create](cloud-services-certs-create.md) and use a self-signed certificate. A self-signed certificate is not authenticated through a CA and can use the cloudapp.net domain as the website URL. For example, the following task uses a self-signed certificate in which the common name (CN) used in the certificate is **sslexample.cloudapp.net**.
37+
For test purposes, you can [create](cloud-services-certs-create.md) and use a self-signed certificate. A self-signed certificate isn't authenticated through a CA and can use the cloudapp.net domain as the website URL. For example, the following task uses a self-signed certificate in which the common name (CN) used in the certificate is **sslexample.cloudapp.net**.
3838

3939
Next, you must include information about the certificate in your service definition and service configuration files.
4040

@@ -69,7 +69,7 @@ Your application must be configured to use the certificate, and an HTTPS endpoin
6969
</WebRole>
7070
```
7171

72-
The **Certificates** section defines the name of our certificate, its location, and the name of the store where it is located.
72+
The **Certificates** section defines the name of our certificate, its location, and the name of the store where it's located.
7373

7474
Permissions (`permissionLevel` attribute) can be set to one of the following values:
7575

@@ -110,12 +110,9 @@ Your application must be configured to use the certificate, and an HTTPS endpoin
110110
</WebRole>
111111
```
112112

113-
All the required changes to the service definition file have been
114-
completed; but, you still need to add the certificate information to
115-
the service configuration file.
116-
4. In your service configuration file (CSCFG), ServiceConfiguration.Cloud.cscfg, add a **Certificates**
117-
value with that of your certificate. The following code sample provides
118-
details of the **Certificates** section, except for the thumbprint value.
113+
All the required changes to the service definition file are complete, but you still need to add the certificate information to the service configuration file.
114+
115+
4. In your service configuration file (CSCFG), ServiceConfiguration.Cloud.cscfg, add a **Certificates** value with that of your certificate. The following code sample provides details of the **Certificates** section, except for the thumbprint value.
119116

120117
```xml
121118
<Role name="Deployment">
@@ -134,11 +131,10 @@ value with that of your certificate. The following code sample provides
134131

135132
(This example uses **sha1** for the thumbprint algorithm. Specify the appropriate value for your certificate's thumbprint algorithm.)
136133

137-
Now that the service definition and service configuration files have
138-
been updated, package your deployment for uploading to Azure. If
139-
you are using **cspack**, don't use the
140-
**/generateConfigurationFile** flag, as that will overwrite the
141-
certificate information you just inserted.
134+
Now that you updated the service definition and service configuration files, package your deployment for uploading to Azure. If
135+
you're using **cspack**, don't use the
136+
**/generateConfigurationFile** flag, as that overwrites the
137+
certificate information you inserted.
142138

143139
## Step 3: Upload a certificate
144140
Connect to the Azure portal and...
@@ -147,21 +143,21 @@ Connect to the Azure portal and...
147143

148144
![Publish your cloud service](media/cloud-services-configure-ssl-certificate-portal/browse.png)
149145

150-
2. Click **Certificates**.
146+
2. Select **Certificates**.
151147

152148
![Click the certificates icon](media/cloud-services-configure-ssl-certificate-portal/certificate-item.png)
153149

154-
3. Click **Upload** at the top of the certificates area.
150+
3. Select **Upload** at the top of the certificates area.
155151

156152
![Click the Upload menu item](media/cloud-services-configure-ssl-certificate-portal/Upload_menu.png)
157153

158-
4. Provide the **File**, **Password**, then click **Upload** at the bottom of the data entry area.
154+
4. Provide the **File**, **Password**, then select **Upload** at the bottom of the data entry area.
159155

160156
## Step 4: Connect to the role instance by using HTTPS
161157
Now that your deployment is up and running in Azure, you can
162158
connect to it using HTTPS.
163159

164-
1. Click the **Site URL** to open up the web browser.
160+
1. Select the **Site URL** to open up the web browser.
165161

166162
![Click the Site URL](media/cloud-services-configure-ssl-certificate-portal/navigate.png)
167163

0 commit comments

Comments
 (0)