You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-nps-extension-errors.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,8 +27,8 @@ If you encounter errors with the NPS extension for Azure Multi-Factor Authentica
27
27
|**CLIENT_CERT_INSTALL_ERROR**| There may be an issue with how the client certificate was installed or associated with your tenant. Follow the instructions in [Troubleshooting the MFA NPS extension](howto-mfa-nps-extension.md#troubleshooting) to investigate client cert problems. |
28
28
|**ESTS_TOKEN_ERROR**| Follow the instructions in [Troubleshooting the MFA NPS extension](howto-mfa-nps-extension.md#troubleshooting) to investigate client cert and ADAL token problems. |
29
29
|**HTTPS_COMMUNICATION_ERROR**| The NPS server is unable to receive responses from Azure MFA. Verify that your firewalls are open bidirectionally for traffic to and from https://adnotifications.windowsazure.com|
30
-
|**HTTP_CONNECT_ERROR**| On the server that runs the NPS extension, verify that you can reach https://adnotifications.windowsazure.com and https://login.microsoftonline.com/. If those sites don't load, troubleshoot connectivity on that server. |
31
-
|**NPS Extension for Azure MFA:** <br> NPS Extension for Azure MFA only performs Secondary Auth for Radius requests in AccessAccept State. Request received for User username with response state AccessReject, ignoring request. | This error usually reflects an authentication failure in AD or that the NPS server is unable to receive responses from Azure AD. Verify that your firewalls are open bidirectionally for traffic to and from https://adnotifications.windowsazure.com and https://login.microsoftonline.com using ports 80 and 443. It is also important to check that on the DIAL-IN tab of Network Access Permissions, the setting is set to "control access through NPS Network Policy". This error can also trigger if the user is not assigned a license. |
30
+
|**HTTP_CONNECT_ERROR**| On the server that runs the NPS extension, verify that you can reach `https://adnotifications.windowsazure.com` and `https://login.microsoftonline.com/`. If those sites don't load, troubleshoot connectivity on that server. |
31
+
|**NPS Extension for Azure MFA:** <br> NPS Extension for Azure MFA only performs Secondary Auth for Radius requests in AccessAccept State. Request received for User username with response state AccessReject, ignoring request. | This error usually reflects an authentication failure in AD or that the NPS server is unable to receive responses from Azure AD. Verify that your firewalls are open bidirectionally for traffic to and from `https://adnotifications.windowsazure.com` and `https://login.microsoftonline.com` using ports 80 and 443. It is also important to check that on the DIAL-IN tab of Network Access Permissions, the setting is set to "control access through NPS Network Policy". This error can also trigger if the user is not assigned a license. |
32
32
|**REGISTRY_CONFIG_ERROR**| A key is missing in the registry for the application, which may be because the [PowerShell script](howto-mfa-nps-extension.md#install-the-nps-extension) wasn't run after installation. The error message should include the missing key. Make sure you have the key under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa. |
33
33
|**REQUEST_FORMAT_ERROR** <br> Radius Request missing mandatory Radius userName\Identifier attribute.Verify that NPS is receiving RADIUS requests | This error usually reflects an installation issue. The NPS extension must be installed in NPS servers that can receive RADIUS requests. NPS servers that are installed as dependencies for services like RDG and RRAS don't receive radius requests. NPS Extension does not work when installed over such installations and errors out since it cannot read the details from the authentication request. |
34
34
|**REQUEST_MISSING_CODE**| Make sure that the password encryption protocol between the NPS and NAS servers supports the secondary authentication method that you're using. **PAP** supports all the authentication methods of Azure MFA in the cloud: phone call, one-way text message, mobile app notification, and mobile app verification code. **CHAPV2** and **EAP** support phone call and mobile app notification. |
You can opt out of version checking by setting a value of **true** for the app setting **MS_SkipVersionCheck**. Specify this either in your web.config or in the Application Settings section of the Azure portal.
Copy file name to clipboardExpand all lines: articles/app-service/environment/app-service-app-service-environment-create-ilb-ase-resourcemanager.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ There are three steps involved in automating creation of an ILB ASE:
25
25
26
26
1. First the base ASE is created in a virtual network using an internal load balancer address instead of a public VIP. As part of this step, a root domain name is assigned to the ILB ASE.
27
27
2. Once the ILB ASE is created, an SSL certificate is uploaded.
28
-
3. The uploaded SSL certificate is explicitly assigned to the ILB ASE as its "default" SSL certificate. This SSL certificate will be used for SSL traffic to apps on the ILB ASE when the apps are addressed using the common root domain assigned to the ASE (e.g. https://someapp.mycustomrootcomain.com)
28
+
3. The uploaded SSL certificate is explicitly assigned to the ILB ASE as its "default" SSL certificate. This SSL certificate will be used for SSL traffic to apps on the ILB ASE when the apps are addressed using the common root domain assigned to the ASE (e.g. `https://someapp.mycustomrootcomain.com`)
29
29
30
30
## Creating the Base ILB ASE
31
31
An example Azure Resource Manager template, and its associated parameters file, are available on GitHub [here][quickstartilbasecreate].
Copy file name to clipboardExpand all lines: articles/app-service/environment/app-service-environment-with-internal-load-balancer.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,8 +91,8 @@ If you want to try the flow with your own certificates and test both HTTP and HT
91
91
4. Create a web app in ASE after creation.
92
92
5. Create a VM if you don't have one in that VNET (Not in the same subnet as the ASE or things break).
93
93
6. Set DNS for your subdomain. You can use a wildcard with your subdomain in your DNS or if you want to do some simple tests, edit the hosts file on your VM to set web app name to VIP IP address. If your ASE had the subdomain name .ilbase.com and you made the web app mytestapp so that it would be addressed at mytestapp.ilbase.com, set that in your hosts file. (On Windows, the hosts file is at C:\Windows\System32\drivers\etc\)
94
-
7. Use a browser on that VM and go to https://mytestapp.ilbase.com (or whatever your web app name is with your subdomain).
95
-
8. Use a browser on that VM and go to https://mytestapp.ilbase.com. You must accept the lack of security if using a self-signed certificate.
94
+
7. Use a browser on that VM and go to `https://mytestapp.ilbase.com` (or whatever your web app name is with your subdomain).
95
+
8. Use a browser on that VM and go to `https://mytestapp.ilbase.com`. You must accept the lack of security if using a self-signed certificate.
96
96
97
97
The IP address for your ILB is listed in your Properties as the Virtual IP Address.
Copy file name to clipboardExpand all lines: articles/app-service/environment/create-from-template.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ To automate your ASE creation:
33
33
34
34
2. After your ILB ASE is created, an SSL certificate that matches your ILB ASE domain is uploaded.
35
35
36
-
3. The uploaded SSL certificate is assigned to the ILB ASE as its "default" SSL certificate. This certificate is used for SSL traffic to apps on the ILB ASE when they use the common root domain that's assigned to the ASE (for example, https://someapp.mycustomrootdomain.com).
36
+
3. The uploaded SSL certificate is assigned to the ILB ASE as its "default" SSL certificate. This certificate is used for SSL traffic to apps on the ILB ASE when they use the common root domain that's assigned to the ASE (for example, `https://someapp.mycustomrootdomain.com`).
It takes about an hour for the ASE to be created. Then the ASE shows up in the portal in the list of ASEs for the subscription that triggered the deployment.
58
58
59
59
## Upload and configure the "default" SSL certificate
60
-
An SSL certificate must be associated with the ASE as the "default" SSL certificate that's used to establish SSL connections to apps. If the ASE's default DNS suffix is *internal-contoso.com*, a connection to https://some-random-app.internal-contoso.com requires an SSL certificate that's valid for **.internal-contoso.com*.
60
+
An SSL certificate must be associated with the ASE as the "default" SSL certificate that's used to establish SSL connections to apps. If the ASE's default DNS suffix is *internal-contoso.com*, a connection to `https://some-random-app.internal-contoso.com` requires an SSL certificate that's valid for **.internal-contoso.com*.
61
61
62
62
Obtain a valid SSL certificate by using internal certificate authorities, purchasing a certificate from an external issuer, or using a self-signed certificate. Regardless of the source of the SSL certificate, the following certificate attributes must be configured properly:
It takes roughly 40 minutes per ASE front end to apply the change. For example, for a default-sized ASE that uses two front ends, the template takes around one hour and 20 minutes to complete. While the template is running, the ASE can't scale.
144
144
145
-
After the template finishes, apps on the ILB ASE can be accessed over HTTPS. The connections are secured by using the default SSL certificate. The default SSL certificate is used when apps on the ILB ASE are addressed by using a combination of the application name plus the default host name. For example, https://mycustomapp.internal-contoso.com uses the default SSL certificate for **.internal-contoso.com*.
145
+
After the template finishes, apps on the ILB ASE can be accessed over HTTPS. The connections are secured by using the default SSL certificate. The default SSL certificate is used when apps on the ILB ASE are addressed by using a combination of the application name plus the default host name. For example, `https://mycustomapp.internal-contoso.com` uses the default SSL certificate for **.internal-contoso.com*.
146
146
147
147
However, just like apps that run on the public multitenant service, developers can configure custom host names for individual apps. They also can configure unique SNI SSL certificate bindings for individual apps.
Enter your domain name into the address bar of your browser. Such as, https://www.contoso.com.
254
+
Enter your domain name into the address bar of your browser. Such as, `https://www.contoso.com`.
255
255
256
256

Copy file name to clipboardExpand all lines: articles/application-gateway/configuration-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -336,7 +336,7 @@ For a custom domain whose existing custom DNS name is mapped to the app service,
336
336
337
337
This capability replaces the *host* header in the incoming request on the application gateway with the host name that you specify.
338
338
339
-
For example, if *www.contoso.com* is specified in the **Host name** setting, the original request *https://appgw.eastus.cloudapp.azure.com/path1 is changed to *https://www.contoso.com/path1 when the request is forwarded to the back-end server.
339
+
For example, if *www.contoso.com* is specified in the **Host name** setting, the original request *`https://appgw.eastus.cloudapp.azure.com/path1` is changed to *`https://www.contoso.com/path1` when the request is forwarded to the back-end server.
Copy file name to clipboardExpand all lines: articles/application-gateway/self-signed-certificates.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.author: victorh
14
14
15
15
The Application Gateway v2 SKU introduces the use of Trusted Root Certificates to allow backend servers. This removes authentication certificates that were required in the v1 SKU. The *root certificate* is a Base-64 encoded X.509(.CER) format root certificate from the backend certificate server. It identifies the root certificate authority (CA) that issued the server certificate and the server certificate is then used for the SSL communication.
16
16
17
-
Application Gateway trusts your website’s certificate by default if it's signed by a well-known CA (for example, GoDaddy or DigiCert). You don’t need to explicitly upload the root certificate in that case. For more information, see [Overview of SSL termination and end to end SSL with Application Gateway](ssl-overview.md). However, if you have a dev/test environment and don't want to purchase a verified CA signed certificate, you can create your own custom CA and create a self-signed certificate with it.
17
+
Application Gateway trusts your website's certificate by default if it's signed by a well-known CA (for example, GoDaddy or DigiCert). You don't need to explicitly upload the root certificate in that case. For more information, see [Overview of SSL termination and end to end SSL with Application Gateway](ssl-overview.md). However, if you have a dev/test environment and don't want to purchase a verified CA signed certificate, you can create your own custom CA and create a self-signed certificate with it.
18
18
19
19
> [!NOTE]
20
20
> Self-signed certificates are not trusted by default and they can be difficult to maintain. Also, they may use outdated hash and cipher suites that may not be strong. For better security, purchase a certificate signed by a well-known certificate authority.
@@ -70,7 +70,7 @@ Create your root CA certificate using OpenSSL.
70
70
71
71
Next, you'll create a server certificate using OpenSSL.
72
72
73
-
### Create the certificate’s key
73
+
### Create the certificate's key
74
74
75
75
Use the following command to generate the key for the server certificate.
76
76
@@ -83,7 +83,7 @@ Use the following command to generate the key for the server certificate.
83
83
The CSR is a public key that is given to a CA when requesting a certificate. The CA issues the certificate for this specific request.
84
84
85
85
> [!NOTE]
86
-
> The CN (Common Name) for the server certificate must be different from the issuer’s domain. For example, in this case, the CN for the issuer is `www.contoso.com` and the server certificate’s CN is `www.fabrikam.com`.
86
+
> The CN (Common Name) for the server certificate must be different from the issuer's domain. For example, in this case, the CN for the issuer is `www.contoso.com` and the server certificate's CN is `www.fabrikam.com`.
87
87
88
88
89
89
1. Use the following command to generate the CSR:
@@ -96,7 +96,7 @@ The CSR is a public key that is given to a CA when requesting a certificate. The
### Generate the certificate with the CSR and the key and sign it with the CA’s root key
99
+
### Generate the certificate with the CSR and the key and sign it with the CA's root key
100
100
101
101
1. Use the following command to create the certificate:
102
102
@@ -120,9 +120,9 @@ The CSR is a public key that is given to a CA when requesting a certificate. The
120
120
- fabrikam.crt
121
121
- fabrikam.key
122
122
123
-
## Configure the certificate in your web server’s SSL settings
123
+
## Configure the certificate in your web server's SSL settings
124
124
125
-
In your web server, configure SSL using the fabrikam.crt and fabrikam.key files. If your web server can’t take two files, you can combine them to a single .pem or .pfx file using OpenSSL commands.
125
+
In your web server, configure SSL using the fabrikam.crt and fabrikam.key files. If your web server can't take two files, you can combine them to a single .pem or .pfx file using OpenSSL commands.
126
126
127
127
### IIS
128
128
@@ -152,7 +152,7 @@ The following configuration is an example [NGINX server block](https://nginx.org
152
152
153
153
## Access the server to verify the configuration
154
154
155
-
1. Add the root certificate to your machine’s trusted root store. When you access the website, ensure the entire certificate chain is seen in the browser.
155
+
1. Add the root certificate to your machine's trusted root store. When you access the website, ensure the entire certificate chain is seen in the browser.
## Upload the root certificate to Application Gateway’s HTTP Settings
173
+
## Upload the root certificate to Application Gateway's HTTP Settings
174
174
175
175
To upload the certificate in Application Gateway, you must export the .crt certificate into a .cer format Base-64 encoded. Since .crt already contains the public key in the base-64 encoded format, just rename the file extension from .crt to .cer.
In the previous example, notice that the response header has a status code of 301 for redirection. The location header has the app service’s host name instead of the original host name `www.contoso.com`.
75
+
In the previous example, notice that the response header has a status code of 301 for redirection. The location header has the app service's host name instead of the original host name `www.contoso.com`.
76
76
77
77
## Solution: Rewrite the location header
78
78
@@ -102,7 +102,7 @@ You must own a custom domain and follow this process:
102
102
> [!NOTE]
103
103
> For the next step, make sure that your custom probe isn't associated to your back-end HTTP settings. Your HTTP settings still have the **Pick Hostname from Backend Address** switch enabled at this point.
104
104
105
-
- Set your application gateway’s HTTP settings to disable **Pick Hostname from Backend Address**. In the Azure portal, clear the check box. In PowerShell, don't use the **-PickHostNameFromBackendAddress** switch in the **Set-AzApplicationGatewayBackendHttpSettings** command.
105
+
- Set your application gateway's HTTP settings to disable **Pick Hostname from Backend Address**. In the Azure portal, clear the check box. In PowerShell, don't use the **-PickHostNameFromBackendAddress** switch in the **Set-AzApplicationGatewayBackendHttpSettings** command.
106
106
107
107
- Associate the custom probe back to the back-end HTTP settings, and verify that the back end is healthy.
0 commit comments