Skip to content

Commit 6b15c98

Browse files
committed
Remove cert password note.
1 parent f612a2e commit 6b15c98

File tree

1 file changed

+8
-10
lines changed

1 file changed

+8
-10
lines changed

articles/application-gateway/create-ssl-portal.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: vhorne
66
ms.service: application-gateway
77
ms.topic: tutorial
8-
ms.date: 11/13/2019
8+
ms.date: 04/22/2019
99
ms.author: victorh
1010
#Customer intent: As an IT administrator, I want to use the Azure portal to configure Application Gateway with TLS termination so I can secure my application traffic.
1111
---
@@ -51,13 +51,11 @@ Thumbprint Subject
5151
E1E81C23B3AD33F9B4D1717B20AB65DBB91AC630 CN=www.contoso.com
5252
```
5353

54-
Use [Export-PfxCertificate](https://docs.microsoft.com/powershell/module/pkiclient/export-pfxcertificate) with the Thumbprint that was returned to export a pfx file from the certificate:
54+
Use [Export-PfxCertificate](https://docs.microsoft.com/powershell/module/pkiclient/export-pfxcertificate) with the Thumbprint that was returned to export a pfx file from the certificate. Make sure your password is 4 - 12 characters long:
5555

56-
> [!NOTE]
57-
> Do not use any special characters in your .pfx file password. Only alphanumeric characters are supported.
5856

5957
```powershell
60-
$pwd = ConvertTo-SecureString -String "Azure123456" -Force -AsPlainText
58+
$pwd = ConvertTo-SecureString -String <your password> -Force -AsPlainText
6159
Export-PfxCertificate `
6260
-cert cert:\localMachine\my\E1E81C23B3AD33F9B4D1717B20AB65DBB91AC630 `
6361
-FilePath c:\appgwcert.pfx `
@@ -145,7 +143,7 @@ On the **Configuration** tab, you'll connect the frontend and backend pool you c
145143

146144
- **PFX certificate file** - Browse to and select the c:\appgwcert.pfx file that you create earlier.
147145
- **Certificate name** - Type *mycert1* for the name of the certificate.
148-
- **Password** - Type *Azure123456* for the password.
146+
- **Password** - Type your password.
149147

150148
Accept the default values for the other settings on the **Listener** tab, then select the **Backend targets** tab to configure the rest of the routing rule.
151149

@@ -189,10 +187,10 @@ To do this, you'll:
189187
- **Resource group**: Select **myResourceGroupAG** for the resource group name.
190188
- **Virtual machine name**: Enter *myVM* for the name of the virtual machine.
191189
- **Username**: Enter *azureuser* for the administrator user name.
192-
- **Password**: Enter *Azure123456* for the administrator password.
193-
4. Accept the other defaults and then select **Next: Disks**.
194-
5. Accept the **Disks** tab defaults and then select **Next: Networking**.
195-
6. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Accept the other defaults and then select **Next: Management**.
190+
- **Password**: Enter a password for the administrator account.
191+
1. Accept the other defaults and then select **Next: Disks**.
192+
2. Accept the **Disks** tab defaults and then select **Next: Networking**.
193+
3. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Accept the other defaults and then select **Next: Management**.
196194

197195
Application Gateway can communicate with instances outside of the virtual network that it is in, but you need to ensure there's IP connectivity.
198196
1. On the **Management** tab, set **Boot diagnostics** to **Off**. Accept the other defaults and then select **Review + create**.

0 commit comments

Comments
 (0)