You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -43,26 +43,26 @@ If those options are not available, you can generate **self-signed certificates*
43
43
%ProgramFiles(x86)%\Windows Kits\x.y\bin\x86
44
44
* Get the WDK from [Windows 8.1: Download kits and tools](https://msdn.microsoft.com/windows/hardware/gg454513#drivers)
45
45
46
-
## To configure the SSL certificate
46
+
## To configure the TLS/SSL certificate
47
47
48
-
An SSL certificate is required to encrypt the communication and authenticate the server. Choose the most applicable of the three scenarios below, and execute all its steps:
48
+
A TLS/SSL certificate is required to encrypt the communication and authenticate the server. Choose the most applicable of the three scenarios below, and execute all its steps:
49
49
50
50
### Create a new self-signed certificate
51
51
52
52
1.[Create a Self-Signed Certificate](#create-a-self-signed-certificate)
53
-
2.[Create PFX file for Self-Signed SSL Certificate](#create-pfx-file-for-self-signed-ssl-certificate)
54
-
3.[Upload SSL Certificate to Cloud Service](#upload-ssl-certificate-to-cloud-service)
55
-
4.[Update SSL Certificate in Service Configuration File](#update-ssl-certificate-in-service-configuration-file)
### To use an existing certificate from the certificate store
59
-
1.[Export SSL Certificate From Certificate Store](#export-ssl-certificate-from-certificate-store)
60
-
2.[Upload SSL Certificate to Cloud Service](#upload-ssl-certificate-to-cloud-service)
61
-
3.[Update SSL Certificate in Service Configuration File](#update-ssl-certificate-in-service-configuration-file)
59
+
1.[Export TLS/SSL Certificate From Certificate Store](#export-tlsssl-certificate-from-certificate-store)
60
+
2.[Upload TLS/SSL Certificate to Cloud Service](#upload-tlsssl-certificate-to-cloud-service)
61
+
3.[Update TLS/SSL Certificate in Service Configuration File](#update-tlsssl-certificate-in-service-configuration-file)
62
62
63
63
### To use an existing certificate in a PFX file
64
-
1.[Upload SSL Certificate to Cloud Service](#upload-ssl-certificate-to-cloud-service)
65
-
2.[Update SSL Certificate in Service Configuration File](#update-ssl-certificate-in-service-configuration-file)
64
+
1.[Upload TLS/SSL Certificate to Cloud Service](#upload-tlsssl-certificate-to-cloud-service)
65
+
2.[Update TLS/SSL Certificate in Service Configuration File](#update-tlsssl-certificate-in-service-configuration-file)
66
66
67
67
## To configure client certificates
68
68
Client certificates are required in order to authenticate requests to the service. Choose the most applicable of the three scenarios below, and execute all its steps:
@@ -96,7 +96,7 @@ A certificate is required to encrypt the credentials that are stored in the meta
96
96
97
97
### Use a new self-signed certificate
98
98
1.[Create a Self-Signed Certificate](#create-a-self-signed-certificate)
99
-
2.[Create PFX file for Self-Signed Encryption Certificate](#create-pfx-file-for-self-signed-ssl-certificate)
99
+
2.[Create PFX file for Self-Signed Encryption Certificate](#create-pfx-file-for-self-signed-tlsssl-certificate)
100
100
3.[Upload Encryption Certificate to Cloud Service](#upload-encryption-certificate-to-cloud-service)
101
101
4.[Update Encryption Certificate in Service Configuration File](#update-encryption-certificate-in-service-configuration-file)
102
102
@@ -180,7 +180,7 @@ Refer to the documentation for Dynamic IP Security in IIS for other supported va
180
180
## Operations for configuring service certificates
181
181
This topic is for reference only. Follow the configuration steps outlined in:
182
182
183
-
* Configure the SSL certificate
183
+
* Configure the TLS/SSL certificate
184
184
* Configure client certificates
185
185
186
186
## Create a self-signed certificate
@@ -199,7 +199,7 @@ To customize:
199
199
* -e with the certificate expiration date
200
200
Create a strong password and specify it when prompted.
201
201
202
-
## Create PFX file for self-signed SSL certificate
202
+
## Create PFX file for self-signed TLS/SSL certificate
203
203
Execute:
204
204
205
205
pvk2pfx -pvk MySSL.pvk -spc MySSL.cer
@@ -209,25 +209,25 @@ Enter password and then export certificate with these options:
209
209
* Yes, export the private key
210
210
* Export all extended properties
211
211
212
-
## Export SSL certificate from certificate store
212
+
## Export TLS/SSL certificate from certificate store
213
213
* Find certificate
214
214
* Click Actions -> All tasks -> Export…
215
215
* Export certificate into a .PFX file with these options:
216
216
* Yes, export the private key
217
217
* Include all certificates in the certification path if possible
218
218
*Export all extended properties
219
219
220
-
## Upload SSL certificate to cloud service
221
-
Upload certificate with the existing or generated .PFX file with the SSL key pair:
220
+
## Upload TLS/SSL certificate to cloud service
221
+
Upload certificate with the existing or generated .PFX file with the TLS key pair:
222
222
223
223
* Enter the password protecting the private key information
224
224
225
-
## Update SSL certificate in service configuration file
225
+
## Update TLS/SSL certificate in service configuration file
226
226
Update the thumbprint value of the following setting in the service configuration file with the thumbprint of the certificate uploaded to the cloud service:
@@ -407,7 +407,7 @@ Update the thumbprint value of the following settings in the service configurati
407
407
```
408
408
409
409
## Common certificate operations
410
-
* Configure the SSL certificate
410
+
* Configure the TLS/SSL certificate
411
411
* Configure client certificates
412
412
413
413
## Find certificate
@@ -473,7 +473,7 @@ In the [Azure portal](https://portal.azure.com/)
473
473
7. Once completed, copy the certificate thumbprint from the new entry in the list.
474
474
475
475
## Other security considerations
476
-
The SSL settings described in this document encrypt communication between the service and its clients when the HTTPS endpoint is used. This is important since credentials for database access and potentially other sensitive information are contained in the communication. Note, however, that the service persists internal status, including credentials, in its internal tables in the Microsoft Azure SQL database that you have provided for metadata storage in your Microsoft Azure subscription. That database was defined as part of the following setting in your service configuration file (.CSCFG file):
476
+
The TLS settings described in this document encrypt communication between the service and its clients when the HTTPS endpoint is used. This is important since credentials for database access and potentially other sensitive information are contained in the communication. Note, however, that the service persists internal status, including credentials, in its internal tables in the Microsoft Azure SQL database that you have provided for metadata storage in your Microsoft Azure subscription. That database was defined as part of the following setting in your service configuration file (.CSCFG file):
0 commit comments