You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/create-ssl-portal.md
+8-10Lines changed: 8 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: application-gateway
5
5
author: vhorne
6
6
ms.service: application-gateway
7
7
ms.topic: tutorial
8
-
ms.date: 11/13/2019
8
+
ms.date: 04/22/2019
9
9
ms.author: victorh
10
10
#Customer intent: As an IT administrator, I want to use the Azure portal to configure Application Gateway with TLS termination so I can secure my application traffic.
Use [Export-PfxCertificate](https://docs.microsoft.com/powershell/module/pkiclient/export-pfxcertificate) with the Thumbprint that was returned to export a pfx file from the certificate:
54
+
Use [Export-PfxCertificate](https://docs.microsoft.com/powershell/module/pkiclient/export-pfxcertificate) with the Thumbprint that was returned to export a pfx file from the certificate. Make sure your password is 4 - 12 characters long:
55
55
56
-
> [!NOTE]
57
-
> Do not use any special characters in your .pfx file password. Only alphanumeric characters are supported.
@@ -145,7 +143,7 @@ On the **Configuration** tab, you'll connect the frontend and backend pool you c
145
143
146
144
-**PFX certificate file** - Browse to and select the c:\appgwcert.pfx file that you create earlier.
147
145
-**Certificate name** - Type *mycert1* for the name of the certificate.
148
-
-**Password** - Type *Azure123456* for the password.
146
+
-**Password** - Type your password.
149
147
150
148
Accept the default values for the other settings on the **Listener** tab, then select the **Backend targets** tab to configure the rest of the routing rule.
151
149
@@ -189,10 +187,10 @@ To do this, you'll:
189
187
-**Resource group**: Select **myResourceGroupAG** for the resource group name.
190
188
-**Virtual machine name**: Enter *myVM* for the name of the virtual machine.
191
189
-**Username**: Enter *azureuser* for the administrator user name.
192
-
-**Password**: Enter *Azure123456*for the administrator password.
193
-
4. Accept the other defaults and then select **Next: Disks**.
194
-
5. Accept the **Disks** tab defaults and then select **Next: Networking**.
195
-
6. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Accept the other defaults and then select **Next: Management**.
190
+
-**Password**: Enter a password for the administrator account.
191
+
1. Accept the other defaults and then select **Next: Disks**.
192
+
2. Accept the **Disks** tab defaults and then select **Next: Networking**.
193
+
3. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Accept the other defaults and then select **Next: Management**.
196
194
197
195
Application Gateway can communicate with instances outside of the virtual network that it is in, but you need to ensure there's IP connectivity.
198
196
1. On the **Management** tab, set **Boot diagnostics** to **Off**. Accept the other defaults and then select **Review + create**.
0 commit comments