Skip to content

Commit 6ae78ee

Browse files
committed
redirect-acrolinx
1 parent a5c5246 commit 6ae78ee

File tree

4 files changed

+9
-101
lines changed

4 files changed

+9
-101
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4256,6 +4256,11 @@
42564256
"redirect_url": "/azure/active-directory/external-identities/user-token",
42574257
"redirect_document_id": true
42584258
},
4259+
{
4260+
"source_path_from_root": "/articles/active-directory/fundamentals/certificate-authorities.md",
4261+
"redirect_url": "/azure/security/fundamentals/azure-CA-details",
4262+
"redirect_document_id": true
4263+
},
42594264
{
42604265
"source_path_from_root": "/articles/active-directory/b2b/what-is-b2b.md",
42614266
"redirect_url": "/azure/active-directory/external-identities/what-is-b2b",

articles/active-directory/fundamentals/certificate-authorities.md

Lines changed: 0 additions & 97 deletions
This file was deleted.

articles/security/fundamentals/azure-CA-details.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,11 @@ ms.reviewer: quentinb
1414

1515
# Azure Certificate Authority details
1616

17-
This article provides the details of the root and subordinate Certificate Authorities (CAs) utilized by Azure. The scope includes government and national clouds. The minimum requirements for public key encryption and signature algorithms, links to certificate downloads and revocation lists, and information about key concepts are provided below the CA details tables. The host names for the URIs that should be added to your firewall allow lists are also provided.
17+
This article provides the details of the root and subordinate Certificate Authorities (CAs) utilized by Azure. The scope includes government and national clouds. The minimum requirements for public key encryption and signature algorithms, links to certificate downloads and revocation lists, and information about key concepts are provided below the CA details tables. The host names for the URIs that should be added to your firewall allowlists are also provided.
1818

1919
## Certificate Authority details
2020

21-
Any entity trying to access Azure Active Directory (Azure AD) identity services via the TLS/SSL protocols will be presented with certificates from the CAs listed below. Different services may use different root or intermediate CAs. The following root and subordinate CAs are relevant to entities that use [certificate pinning](certificate-pinning.md).
21+
Any entity trying to access Azure Active Directory (Azure AD) identity services via the TLS/SSL protocols will be presented with certificates from the CAs listed in this article. Different services may use different root or intermediate CAs. The following root and subordinate CAs are relevant to entities that use [certificate pinning](certificate-pinning.md).
2222

2323

2424
**How to read the certificate details:**
@@ -251,7 +251,7 @@ Microsoft updated Azure services to use TLS certificates from a different set of
251251
252252
### Article change log
253253
254-
- February 7, 2023: Added 8 new subordinate Certificate Authorities
254+
- February 7, 2023: Added eight new subordinate Certificate Authorities
255255
- March 1, 2023: Provided timelines for upcoming sub CA expiration
256256
257257
## Next steps

articles/security/fundamentals/certificate-pinning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ For several years, certificate pinning was considered good security practice. Ov
2626

2727
## How to address certificate pinning in your application
2828

29-
Typically, an application will contain a list of authorized certificates or properties of certificates including Subject Distinguished Names, thumbprints, serial numbers, and public keys. Applications may pin against individual leaf or end-entity certificates, subordinate CA certificates, or even Root CA certificates.
29+
Typically, an application contains a list of authorized certificates or properties of certificates including Subject Distinguished Names, thumbprints, serial numbers, and public keys. Applications may pin against individual leaf or end-entity certificates, subordinate CA certificates, or even Root CA certificates.
3030

3131
If your application explicitly specifies a list of acceptable CAs, you may periodically need to update pinned certificates when Certificate Authorities change or expire. To detect certificate pinning, we recommend the taking the following steps:
3232

0 commit comments

Comments
 (0)