You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cloud-services/cloud-services-configure-ssl-certificate-portal.md
+18-22Lines changed: 18 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Configure TLS for a cloud service | Microsoft Docs
3
3
description: Learn how to specify an HTTPS endpoint for a web role and how to upload a TLS/SSL certificate to secure your application. These examples use the Azure portal.
4
4
ms.topic: article
5
5
ms.service: cloud-services
6
-
ms.date: 02/21/2023
6
+
ms.date: 07/23/2024
7
7
author: hirenshah1
8
8
ms.author: hirshah
9
9
ms.reviewer: mimckitt
@@ -20,21 +20,21 @@ Transport Layer Security (TLS), previously known as Secure Socket Layer (SSL) en
20
20
> The procedures in this task apply to Azure Cloud Services; for App Services, see [this](../app-service/configure-ssl-bindings.md).
21
21
>
22
22
23
-
This task uses a production deployment. Information on using a staging deployment is provided at the end of this topic.
23
+
This task uses a production deployment. Information on using a staging deployment is provided at the end of this article.
24
24
25
-
Read [this](cloud-services-how-to-create-deploy-portal.md) first if you have not yet created a cloud service.
25
+
Read [How to create and deploy an Azure Cloud Service (classic)](cloud-services-how-to-create-deploy-portal.md) first if you haven't yet created a cloud service.
26
26
27
27
## Step 1: Get a TLS/SSL certificate
28
-
To configure TLS for an application, you first need to get a TLS/SSL certificate that has been signed by a Certificate Authority (CA), a trusted third party who issues certificates for this purpose. If you do not already have one, you need to obtain one from a company that sells TLS/SSL certificates.
28
+
To configure TLS for an application, you first need to get a TLS/SSL certificate signed by a Certificate Authority (CA), a trusted partner who issues certificates for this purpose. If you don't already have one, you need to obtain one from a company that sells TLS/SSL certificates.
29
29
30
30
The certificate must meet the following requirements for TLS/SSL certificates in Azure:
31
31
32
32
* The certificate must contain a public key.
33
33
* The certificate must be created for key exchange, exportable to a Personal Information Exchange (.pfx) file.
34
-
* The certificate's subject name must match the domain used to access the cloud service. You cannot obtain a TLS/SSL certificate from a certificate authority (CA) for the cloudapp.net domain. You must acquire a custom domain name to use when access your service. When you request a certificate from a CA, the certificate's subject name must match the custom domain name used to access your application. For example, if your custom domain name is **contoso.com** you would request a certificate from your CA for ***.contoso.com** or **www\.contoso.com**.
34
+
* The certificate's subject name must match the domain used to access the cloud service. You can't obtain a TLS/SSL certificate from a certificate authority (CA) for the cloudapp.net domain. You must acquire a custom domain name to use when accessing your service. When you request a certificate from a CA, the certificate's subject name must match the custom domain name used to access your application. For example, if your custom domain name is **contoso.com** you would request a certificate from your CA for ***.contoso.com** or **www\.contoso.com**.
35
35
* The certificate must use a minimum of 2048-bit encryption.
36
36
37
-
For test purposes, you can [create](cloud-services-certs-create.md) and use a self-signed certificate. A self-signed certificate is not authenticated through a CA and can use the cloudapp.net domain as the website URL. For example, the following task uses a self-signed certificate in which the common name (CN) used in the certificate is **sslexample.cloudapp.net**.
37
+
For test purposes, you can [create](cloud-services-certs-create.md) and use a self-signed certificate. A self-signed certificate isn't authenticated through a CA and can use the cloudapp.net domain as the website URL. For example, the following task uses a self-signed certificate in which the common name (CN) used in the certificate is **sslexample.cloudapp.net**.
38
38
39
39
Next, you must include information about the certificate in your service definition and service configuration files.
40
40
@@ -69,7 +69,7 @@ Your application must be configured to use the certificate, and an HTTPS endpoin
69
69
</WebRole>
70
70
```
71
71
72
-
The **Certificates** section defines the name of our certificate, its location, and the name of the store where it is located.
72
+
The **Certificates** section defines the name of our certificate, its location, and the name of the store where it's located.
73
73
74
74
Permissions (`permissionLevel` attribute) can be set to one of the following values:
75
75
@@ -110,12 +110,9 @@ Your application must be configured to use the certificate, and an HTTPS endpoin
110
110
</WebRole>
111
111
```
112
112
113
-
All the required changes to the service definition file have been
114
-
completed; but, you still need to add the certificate information to
115
-
the service configuration file.
116
-
4. In your service configuration file (CSCFG), ServiceConfiguration.Cloud.cscfg, add a **Certificates**
117
-
value with that of your certificate. The following code sample provides
118
-
details of the **Certificates** section, except for the thumbprint value.
113
+
All the required changes to the service definition file are complete, but you still need to add the certificate information to the service configuration file.
114
+
115
+
4. In your service configuration file (CSCFG), ServiceConfiguration.Cloud.cscfg, add a **Certificates** value with that of your certificate. The following code sample provides details of the **Certificates** section, except for the thumbprint value.
119
116
120
117
```xml
121
118
<Rolename="Deployment">
@@ -134,11 +131,10 @@ value with that of your certificate. The following code sample provides
134
131
135
132
(This example uses **sha1** for the thumbprint algorithm. Specify the appropriate value for your certificate's thumbprint algorithm.)
136
133
137
-
Now that the service definition and service configuration files have
138
-
been updated, package your deployment for uploading to Azure. If
139
-
you are using **cspack**, don't use the
140
-
**/generateConfigurationFile** flag, as that will overwrite the
141
-
certificate information you just inserted.
134
+
Now that you updated the service definition and service configuration files, package your deployment for uploading to Azure. If
135
+
you're using **cspack**, don't use the
136
+
**/generateConfigurationFile** flag, as that overwrites the
137
+
certificate information you inserted.
142
138
143
139
## Step 3: Upload a certificate
144
140
Connect to the Azure portal and...
@@ -147,21 +143,21 @@ Connect to the Azure portal and...
147
143
148
144

149
145
150
-
2. Click **Certificates**.
146
+
2. Select **Certificates**.
151
147
152
148

153
149
154
-
3. Click **Upload** at the top of the certificates area.
150
+
3. Select **Upload** at the top of the certificates area.
155
151
156
152

157
153
158
-
4. Provide the **File**, **Password**, then click **Upload** at the bottom of the data entry area.
154
+
4. Provide the **File**, **Password**, then select **Upload** at the bottom of the data entry area.
159
155
160
156
## Step 4: Connect to the role instance by using HTTPS
161
157
Now that your deployment is up and running in Azure, you can
162
158
connect to it using HTTPS.
163
159
164
-
1. Click the **Site URL** to open up the web browser.
160
+
1. Select the **Site URL** to open up the web browser.
165
161
166
162

0 commit comments