Skip to content

Commit 7fcec2b

Browse files
authored
Update end-to-end-ssl-portal.md
1 parent 6fe0e2c commit 7fcec2b

File tree

1 file changed

+11
-9
lines changed

1 file changed

+11
-9
lines changed

articles/application-gateway/end-to-end-ssl-portal.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Quickstart - Configure end-to-end SSL encryption with Azure Application Gateway - Azure portal | Microsoft Docs
3-
description: Learn how to use the Azure portal to create an Azure Application Gateway with end-to-end SSL encryption.
3+
description: Learn how to use the Azure portal to create an application gateway with end-to-end SSL encryption.
44
services: application-gateway
55
author: vhorne
66
ms.service: application-gateway
@@ -20,7 +20,9 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
2020

2121
## Before you begin
2222

23-
To configure end-to-end SSL with an application gateway, a certificate is required for the gateway. Certificates are also required for the back-end servers. The gateway certificate is used to derive a symmetric key in compliance with the SSL protocol specification. The symmetric key is then used to encrypt and decrypt the traffic sent to the gateway. For end-to-end SSL encryption, the right back-end servers must be allowed in the application gateway. To allow this access, upload the public certificate of the back-end servers, also known as Authentication Certificates (v1) or Trusted Root Certificates (v2), to the application gateway. Adding the certificate ensures that the application gateway communicates only with known back-end instances. This configuration further secures end-to-end communication.
23+
To configure end-to-end SSL with an application gateway, you need a certificate for the gateway. Certificates are also required for the back-end servers. The gateway certificate is used to derive a symmetric key in compliance with the SSL protocol specification. The symmetric key is then used to encrypt and decrypt the traffic sent to the gateway.
24+
25+
For end-to-end SSL encryption, the right back-end servers must be allowed in the application gateway. To allow this access, upload the public certificate of the back-end servers, also known as Authentication Certificates (v1) or Trusted Root Certificates (v2), to the application gateway. Adding the certificate ensures that the application gateway communicates only with known back-end instances. This configuration further secures end-to-end communication.
2426

2527
To learn more, see [SSL termination and end-to-end SSL](https://docs.microsoft.com/azure/application-gateway/ssl-overview).
2628

@@ -32,7 +34,7 @@ To create a new application gateway with end-to-end SSL encryption, you'll need
3234

3335
To learn more, see [enable SSL termination while creating a new application gateway](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal).
3436

35-
### Add authentication/root certificate of back-end servers
37+
### Add authentication/root certificates of back-end servers
3638

3739
1. Select **All resources**, and then select **myAppGateway**.
3840

@@ -54,20 +56,20 @@ To learn more, see [enable SSL termination while creating a new application gate
5456

5557
For Standard_v2 and WAF_v2 application gateways, you should upload the root certificate of the back-end server certificate in .cer format. If the back-end certificate is issued by a well-known certificate authority (CA), you can select the **Use Well Known CA Certificate** check box, and then you don't have to upload a certificate.
5658

57-
![add_trusted_root_certificate](./media/end-to-end-ssl-portal/trustedrootcert-portal.png)
59+
![Add_trusted_root_certificate](./media/end-to-end-ssl-portal/trustedrootcert-portal.png)
5860

59-
![root_certificate](./media/end-to-end-ssl-portal/trustedrootcert.png)
61+
![Root_certificate](./media/end-to-end-ssl-portal/trustedrootcert.png)
6062

6163
8. Select **Save**.
6264

63-
## Enable end-to-end SSL for existing application gateway
65+
## Enable end-to-end SSL for an existing application gateway
6466

6567
To configure an existing application gateway with end-to-end SSL encryption, you must first enable SSL termination in the listener. This action enables SSL encryption for communication between the client and the application gateway. Then, put those certificates for back-end servers in the HTTP settings on the Safe Recipients list. This configuration enables SSL encryption for communication between the application gateway and the back-end servers. That accomplishes end-to-end SSL encryption.
6668

6769
You'll need to use a listener with the HTTPS protocol and a certificate for enabling SSL termination. You can either use an existing listener that meets those conditions or create a new listener. If you choose the former option, you can ignore the following "Enable SSL termination in existing application gateway" section and move directly to the "Add authentication/trusted root certificates for backend servers" section.
6870

6971
If you choose the latter option, apply the steps in the following procedure.
70-
### Enable SSL termination in existing application gateway
72+
### Enable SSL termination in an existing application gateway
7173

7274
1. Select **All resources**, and then select **myAppGateway**.
7375

@@ -104,11 +106,11 @@ If you choose the latter option, apply the steps in the following procedure.
104106

105107
For Standard and WAF (v1) application gateways, you should upload the public key of your back-end server certificate in .cer format.
106108

107-
![add_certificate](./media/end-to-end-ssl-portal/addcert.png)
109+
![Add_certificate](./media/end-to-end-ssl-portal/addcert.png)
108110

109111
For Standard_v2 and WAF_v2 application gateways, you should upload the root certificate of the back-end server certificate in .cer format. If the back-end certificate is issued by a well-known CA, you can select the **Use Well Known CA Certificate** check box, and then you don't have to upload a certificate.
110112

111-
![add_trusted_root_certificate](./media/end-to-end-ssl-portal/trustedrootcert-portal.png)
113+
![Add_trusted_root_certificate](./media/end-to-end-ssl-portal/trustedrootcert-portal.png)
112114

113115
8. Select **Save**.
114116

0 commit comments

Comments
 (0)