Skip to content

Commit a09f6b4

Browse files
authored
Merge pull request #109339 from TimShererWithAquent/us1679050bt
Change SSL to TLS per 1679050
2 parents 0a3eba1 + 83add29 commit a09f6b4

File tree

3 files changed

+10
-10
lines changed

3 files changed

+10
-10
lines changed

articles/site-recovery/physical-manage-configuration-server.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -285,8 +285,8 @@ Upgrade the server as follows:
285285
> [!NOTE]
286286
> The **-Force** option in the Remove-AzSiteRecoveryFabric can be used to force the removal/deletion of the Configuration server.
287287
288-
## Renew SSL certificates
289-
The configuration server has an inbuilt web server, which orchestrates activities of the Mobility service, process servers, and master target servers connected to it. The web server uses an SSL certificate to authenticate clients. The certificate expires after three years, and can be renewed at any time.
288+
## Renew TLS/SSL certificates
289+
The configuration server has an inbuilt web server, which orchestrates activities of the Mobility service, process servers, and master target servers connected to it. The web server uses a TLS/SSL certificate to authenticate clients. The certificate expires after three years, and can be renewed at any time.
290290
291291
### Check expiry
292292

articles/site-recovery/site-recovery-failover-to-azure-troubleshoot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ This is normally not a cause for concern and can usually be ignored for unplanne
122122

123123
This issue is indicated when you are unable to see the datastore in Azure the portal when trying to reprotect the virtual machine that has experienced a failover. This is because the Master target is not recognized as a virtual machine under vCenters added to Azure Site Recovery.
124124

125-
For more information about reprotecting a vitual machine, see [Reprotect and fail back machines to an on-premises site after failover to Azure](vmware-azure-reprotect.md).
125+
For more information about reprotecting a virtual machine, see [Reprotect and fail back machines to an on-premises site after failover to Azure](vmware-azure-reprotect.md).
126126

127127
To resolve the issue:
128128

@@ -132,7 +132,7 @@ Manually create the Master target in the vCenter that manages your source machin
132132
>
133133
> The discovery and refresh fabric operations can take up to 30 minutes to complete.
134134
135-
## Linux Master Target registration with CS fails with an SSL error 35
135+
## Linux Master Target registration with CS fails with a TLS error 35
136136

137137
The Azure Site Recovery Master Target registration with the configuration server fails due to the Authenticated Proxy being enabled on the Master Target.
138138

articles/site-recovery/site-recovery-iis.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.author: mayg
1313

1414
Application software is the engine of business productivity in an organization. Various web applications can serve different purposes in an organization. Some applications, like applications used for payroll processing, financial applications, and customer-facing websites, might be critical to an organization. To prevent loss of productivity, it's important for the organization to have these applications continuously up and running. More importantly, having these applications consistently available can help prevent damage to the brand or image of the organization.
1515

16-
Critical web applications are typically set up as multi-tier applications: the web, database, and application are on different tiers. In addition to being spread across various tiers, the applications might also use multiple servers in each tier to load balance the traffic. Moreover, the mappings between various tiers and on the web server might be based on static IP addresses. On failover, some of these mappings need to be updated, especially if multiple websites are configured on the web server. If web applications use SSL, you must update certificate bindings.
16+
Critical web applications are typically set up as multi-tier applications: the web, database, and application are on different tiers. In addition to being spread across various tiers, the applications might also use multiple servers in each tier to load balance the traffic. Moreover, the mappings between various tiers and on the web server might be based on static IP addresses. On failover, some of these mappings need to be updated, especially if multiple websites are configured on the web server. If web applications use TLS, you must update certificate bindings.
1717

1818
Traditional recovery methods that aren't based on replication involve backing up various configuration files, registry settings, bindings, custom components (COM or .NET), content, and certificates. Files are recovered through a set of manual steps. The traditional recovery methods of backing up and manually recovering files are cumbersome, error-prone, and not scalable. For example, you might easily forget to back up certificates. After failover, you're left with no choice but to buy new certificates for the server.
1919

@@ -113,22 +113,22 @@ Every site consists of binding information. The binding information includes the
113113
>
114114
> If you set the site binding to **All unassigned**, you don't need to update this binding post-failover. Also, if the IP address associated with a site isn't changed post-failover, you don't need to update the site binding. (The retention of the IP address depends on the network architecture and subnets assigned to the primary and recovery sites. Updating them might not be feasible for your organization.)
115115
116-
![Screenshot that shows setting the SSL binding](./media/site-recovery-iis/sslbinding.png)
116+
![Screenshot that shows setting the TLS/SSL binding](./media/site-recovery-iis/sslbinding.png)
117117

118118
If you associated the IP address with a site, update all site bindings with the new IP address. To change the site bindings, add an [IIS web tier update script](https://aka.ms/asr-web-tier-update-runbook-classic) after Group 3 in the recovery plan.
119119

120120
#### Update the load balancer IP address
121121
If you have an ARR virtual machine, to update the IP address, add an [IIS ARR failover script](https://aka.ms/asr-iis-arrtier-failover-script-classic) after Group 4.
122122

123-
#### SSL certificate binding for an HTTPS connection
124-
A website might have an associated SSL certificate that helps ensure a secure communication between the web server and the user’s browser. If the website has an HTTPS connection, and also has an associated HTTPS site binding to the IP address of the IIS server with an SSL certificate binding, you must add a new site binding for the certificate with the IP address of the IIS virtual machine post-failover.
123+
#### TLS/SSL certificate binding for an HTTPS connection
124+
A website might have an associated TLS/SSL certificate that helps ensure a secure communication between the web server and the user’s browser. If the website has an HTTPS connection, and also has an associated HTTPS site binding to the IP address of the IIS server with a TLS/SSL certificate binding, you must add a new site binding for the certificate with the IP address of the IIS virtual machine post-failover.
125125

126-
The SSL certificate can be issued against these components:
126+
The TLS/SSL certificate can be issued against these components:
127127

128128
* The fully qualified domain name of the website.
129129
* The name of the server.
130130
* A wildcard certificate for the domain name.
131-
* An IP address. If the SSL certificate is issued against the IP address of the IIS server, another SSL certificate needs to be issued against the IP address of the IIS server on the Azure site. An additional SSL binding for this certificate needs to be created. Because of this, we recommend not using an SSL certificate issued against the IP address. This option is less widely used and will soon be deprecated in accordance with new certificate authority/browser forum changes.
131+
* An IP address. If the TLS/SSL certificate is issued against the IP address of the IIS server, another TLS/SSL certificate needs to be issued against the IP address of the IIS server on the Azure site. An additional TLS binding for this certificate needs to be created. Because of this, we recommend not using a TLS/SSL certificate issued against the IP address. This option is less widely used and will soon be deprecated in accordance with new certificate authority/browser forum changes.
132132

133133
#### Update the dependency between the web tier and the application tier
134134
If you have an application-specific dependency that's based on the IP address of the virtual machines, you must update this dependency post-failover.

0 commit comments

Comments
 (0)