You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can restrict access to your Azure App Service app by enabling different types of authentication for it. One way to do it is to request a client certificate when the client request is over TLS/SSL and validate the certificate. This mechanism is called TLS mutual authentication or client certificate authentication. This article shows how to set up your app to use client certificate authentication.
16
16
17
17
> [!NOTE]
18
+
> Your app code is responsible for validating the client certificate. App Service doesn't do anything with this client certificate other than forwarding it to your app.
19
+
>
18
20
> If you access your site over HTTP and not HTTPS, you will not receive any client certificate. So if your application requires client certificates, you should not allow requests to your application over HTTP.
19
-
>
20
21
21
22
[!INCLUDE [Prepare your web app](../../includes/app-service-ssl-prepare-app.md)]
22
23
@@ -26,7 +27,13 @@ To set up your app to require client certificates:
26
27
27
28
1. From the left navigation of your app's management page, select **Configuration** > **General Settings**.
28
29
29
-
1. Set **Client certificate mode** to **Require**. Select **Save** at the top of the page.
30
+
1. Select **Client certificate mode** of choice. Select **Save** at the top of the page.
31
+
32
+
|Client certificate modes|Description|
33
+
|-|-|
34
+
|Required|All requests require a client certificate.|
35
+
|Optional|Requests may or may not use a client certificate. Clients will be prompted for a certificate by default. For example, browser clients will show a prompt to select a certificate for authentication.|
36
+
|Optional Interactive User|Requests may or may not use a client certificate. Clients will not be prompted for a certificate by default. For example, browser clients will not show a prompt to select a certificate for authentication.|
30
37
31
38
### [Azure CLI](#tab/azurecli)
32
39
To do the same with Azure CLI, run the following command in the [Cloud Shell](https://shell.azure.com):
Copy file name to clipboardExpand all lines: articles/app-service/configure-ssl-app-service-certificate.md
+33-1Lines changed: 33 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -110,7 +110,7 @@ Once your certificate is domain-verified, [you're ready to import it into an App
110
110
By default, App Service certificates have a one-year validity period. Before the expiration date, you can automatically or manually renew App Service certificates in one-year increments. The renewal process effectively gives you a new App Service certificate with the expiration date extended to one year from the existing certificate's expiration date.
111
111
112
112
> [!NOTE]
113
-
> Starting September 23 2021, if you haven't verified the domain in the last 395 days, App Service certificates require domain verification during a renewor rekey process. The new certificate order remains in "pending issuance" mode during the renew or rekey process until you complete the domain verification.
113
+
> Starting September 23 2021, if you haven't verified the domain in the last 395 days, App Service certificates require domain verification during a renew, auto-renew, or rekey process. The new certificate order remains in "pending issuance" mode during the renew, auto-renew, or rekey process until you complete the domain verification.
114
114
>
115
115
> Unlike the free App Service managed certificate, purchased App Service certificates don't have automated domain re-verification. Failure to verify domain ownership results in failed renewals. For more information about how to verify your App Service certificate, review [Confirm domain ownership](#confirm-domain-ownership).
The downloaded PFX file is a raw PKCS12 file that contains both the public and private certificates and has an import password that's an empty string. You can locally install the file by leaving the password field empty. You can't [upload the file as-is into App Service](configure-ssl-certificate.md#upload-a-private-certificate) because the file isn't [password protected](configure-ssl-certificate.md#private-certificate-requirements).
209
209
210
+
## Use Azure Advisor for App Service certificate
211
+
212
+
App Service certificate is integrated with [Azure Advisor](/azure/advisor/advisor-overview) to provide reliability recommendations for when your certificate requires domain verification. You must verify domain ownership for your certificate during renew, auto-renew, or rekey process if you haven't verified the domain in the last 395 days. To ensure you do not miss any certificate that requires verification or risk any certificate from expiring, you can utlize Azure Advisor to view and set up alerts for App Service certificate.
213
+
214
+
### View Advisor recommendation
215
+
216
+
To view Advisor recommendation for App Service certificate:
217
+
218
+
1. Navigate to the [Azure Advisor page](https://portal.azure.com/#view/Microsoft_Azure_Expert/AdvisorMenuBlade/~/overview).
219
+
220
+
1. From the left menu, select **Recommendations** > **Reliability**
221
+
222
+
1. Select the filter option **Type equals** and search for **App Service Certificates** from the dropdown list. If the value does not exist on the dropdown menu, then that means no recommendation has been generated for your App Service certificate resources because none of them requires domain ownership verification.
223
+
224
+
### Create Advisor Alerts
225
+
226
+
You [create Azure Advisor alerts on new recommendations] using different configurations. To set up Advisor Alerts specifically for App Serivice certificate so you can get notifications when your certificate requires domain ownership validation:
227
+
228
+
1. Navigate to the [Azure Advisor page](https://portal.azure.com/#view/Microsoft_Azure_Expert/AdvisorMenuBlade/~/overview).
229
+
230
+
1. From the left menu, select **Monitoring** > **Alerts (Preview)**
231
+
232
+
1. Click on **+ New Advisor Alert** on the action bar at the top. This will open a new blade called "Create Advisor Alerts".
233
+
234
+
1. Under **Condition** select the following:
235
+
236
+
|Configured by| Recommendation Type|
237
+
|-|-|
238
+
|Recommendation Type|Domain verification required to issue your App Service Certificate|
239
+
240
+
1. Fill out the rest of the required fields, then select the **Create alert** button at the bottom.
241
+
210
242
## Delete an App Service certificate
211
243
212
244
If you delete an App Service certificate, the delete operation is irreversible and final. The result is a revoked certificate, and any binding in App Service that uses the certificate becomes invalid.
Copy file name to clipboardExpand all lines: articles/iot-hub-device-update/import-update.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,10 @@ Learn how to obtain a new update and import it into Device Update for IoT Hub. I
16
16
## Prerequisites
17
17
18
18
* Access to [an IoT Hub with Device Update for IoT Hub enabled](create-device-update-account.md).
19
+
* An Azure Storage container *without* Private Endpoint enabled.
20
+
21
+
- If you're not sure if Private Endpoint is enabled, go to [Private Link Center](https://portal.azure.com/#blade/Microsoft_Azure_Network/PrivateLinkCenterBlade/overview), select "Private endpoints" on the left, then look for your Azure Storage account name in the "Resources" column.
22
+
19
23
* An IoT device (or simulator) [provisioned for Device Update](device-update-agent-provisioning.md) within IoT Hub.
20
24
* Follow the steps in [Prepare an update to import into Device Update for IoT Hub](create-update.md) to create the import manifest for your update files.
Copy file name to clipboardExpand all lines: articles/iot-operations/secure-iot-ops/howto-validate-images.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Validate that Azure IoT Operations docker and helm images are legit
4
4
author: kgremban
5
5
ms.author: kgremban
6
6
ms.topic: how-to
7
-
ms.date: 09/24/2024
7
+
ms.date: 11/01/2024
8
8
9
9
#CustomerIntent: As an IT professional, I want to ensure that the images I download for Azure IoT Operations are legitimate.
10
10
---
@@ -73,10 +73,12 @@ Azure IoT Operations signs its docker and helm images to allow users to verify t
73
73
74
74
1. Use notation to verify your downloaded images against the trustpolicy.
75
75
76
+
Replace the version placeholder with the version number of the image that you want to check. For an existing instance of Azure IoT Operations, you can find the version number on the instance overview page in the Azure portal or by running [az iot ops show](/cli/azure/iot/ops#az-iot-ops-show). For a full list of available versions, see [azure-iot-operations releases](https://github.com/Azure/azure-iot-operations/releases).
0 commit comments