Skip to content

Commit a5adeae

Browse files
committed
2 parents 60aacf6 + 57c9f71 commit a5adeae

File tree

8 files changed

+63
-57
lines changed

8 files changed

+63
-57
lines changed

.openpublishing.redirection.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42203,7 +42203,7 @@
4220342203
},
4220442204
{
4220542205
"source_path": "articles/security/fundamentals/network-security.md",
42206-
"redirect_url": "/azure/security/fundamentals/network-security",
42206+
"redirect_url": "/azure/security/fundamentals/network-overview",
4220742207
"redirect_document_id": false
4220842208
},
4220942209
{

articles/active-directory/saas-apps/cs-stars-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ To configure Azure AD single sign-on with CS Stars, perform the following steps:
108108
`https://<subdomain>.csstars.com/enterprise/`
109109

110110
> [!NOTE]
111-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [CS Stars Client support team](https://www.marshclearsight.com/support/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
111+
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [CS Stars Client support team](http://www.riskonnectclearsight.com/support/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
112112

113113
4. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
114114

@@ -126,7 +126,7 @@ To configure Azure AD single sign-on with CS Stars, perform the following steps:
126126

127127
### Configure CS Stars Single Sign-On
128128

129-
To configure single sign-on on **CS Stars** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [CS Stars support team](https://www.marshclearsight.com/support/). They set this setting to have the SAML SSO connection set properly on both sides.
129+
To configure single sign-on on **CS Stars** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [CS Stars support team](http://www.riskonnectclearsight.com/support/). They set this setting to have the SAML SSO connection set properly on both sides.
130130

131131
### Create an Azure AD test user
132132

@@ -181,7 +181,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
181181

182182
### Create CS Stars test user
183183

184-
In this section, you create a user called Britta Simon in CS Stars. Work with [CS Stars support team](https://www.marshclearsight.com/support/) to add the users in the CS Stars platform. Users must be created and activated before you use single sign-on.
184+
In this section, you create a user called Britta Simon in CS Stars. Work with [CS Stars support team](http://www.riskonnectclearsight.com/support/) to add the users in the CS Stars platform. Users must be created and activated before you use single sign-on.
185185

186186
### Test single sign-on
187187

articles/application-gateway/end-to-end-ssl-portal.md

Lines changed: 38 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Quickstart - Configure end-to-end SSL encryption with Azure Application Gateway - Azure portal | Microsoft Docs
3-
description: Learn how to use the Azure portal to create an Azure Application Gateway with end-to-end SSL encryption.
3+
description: Learn how to use the Azure portal to create an application gateway with end-to-end SSL encryption.
44
services: application-gateway
55
author: vhorne
66
ms.service: application-gateway
@@ -11,7 +11,7 @@ ms.custom: mvc
1111
---
1212
# Configure end-to-end SSL by using Application Gateway with the portal
1313

14-
This article shows you how to use the Azure portal to configure end-to-end SSL encryption with an application gateway v1 SKU.
14+
This article describes how to use the Azure portal to configure end-to-end Secure Sockets Layer (SSL) encryption through Azure Application Gateway v1 SKU.
1515

1616
> [!NOTE]
1717
> Application Gateway v2 SKU requires trusted root certificates for enabling end-to-end configuration.
@@ -20,94 +20,97 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
2020

2121
## Before you begin
2222

23-
To configure end-to-end SSL with an Application Gateway, a certificate is required for the gateway and certificates are required for the back-end servers. The gateway certificate is used to derive a symmetric key as per SSL protocol specification. The symmetric key is then used to encrypt and decrypt the traffic sent to the gateway. For end-to-end SSL encryption, the right back-end servers must be allowed in the application gateway. To do this, upload the public certificate of the back-end servers, also known as Authentication Certificates (v1) or Trusted Root Certificates (v2), to the Application Gateway. Adding the certificate ensures that the Application Gateway only communicates with known back-end instances. This further secures the end-to-end communication.
23+
To configure end-to-end SSL with an application gateway, you need a certificate for the gateway. Certificates are also required for the back-end servers. The gateway certificate is used to derive a symmetric key in compliance with the SSL protocol specification. The symmetric key is then used to encrypt and decrypt the traffic sent to the gateway.
24+
25+
For end-to-end SSL encryption, the right back-end servers must be allowed in the application gateway. To allow this access, upload the public certificate of the back-end servers, also known as Authentication Certificates (v1) or Trusted Root Certificates (v2), to the application gateway. Adding the certificate ensures that the application gateway communicates only with known back-end instances. This configuration further secures end-to-end communication.
2426

2527
To learn more, see [SSL termination and end-to-end SSL](https://docs.microsoft.com/azure/application-gateway/ssl-overview).
2628

2729
## Create a new application gateway with end-to-end SSL
2830

29-
To create a new application gateway with end-to-end SSL encryption, you'll need to first enable SSL termination while creating a new application gateway. This will enable SSL encryption for the communication between the client and application gateway. Then, you'll need to whitelist certificates for backend servers in the HTTP settings to enable SSL encryption for the communication between the application gateway and backend servers, accomplishing end-to-end SSL encryption.
31+
To create a new application gateway with end-to-end SSL encryption, you'll need to first enable SSL termination while creating a new application gateway. This action enables SSL encryption for communication between the client and application gateway. Then, you'll need to put on the Safe Recipients list the certificates for the back-end servers in the HTTP settings. This configuration enables SSL encryption for communication between the application gateway and the back-end servers. That accomplishes end-to-end SSL encryption.
3032

3133
### Enable SSL termination while creating a new application gateway
3234

33-
Refer to this article to understand how to [enable SSL termination while creating a new application gateway](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal).
35+
To learn more, see [enable SSL termination while creating a new application gateway](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal).
3436

35-
### Add authentication/root certificate of back-end servers
37+
### Add authentication/root certificates of back-end servers
3638

3739
1. Select **All resources**, and then select **myAppGateway**.
3840

39-
2. Select **HTTP settings** from the left menu. Azure automatically created a default HTTP setting, **appGatewayBackendHttpSettings**, when you created the application gateway.
41+
2. Select **HTTP settings** from the left-side menu. Azure automatically created a default HTTP setting, **appGatewayBackendHttpSettings**, when you created the application gateway.
4042

4143
3. Select **appGatewayBackendHttpSettings**.
4244

43-
4. Under **Protocol**, select **HTTPS**. A pane for **Backend authentication certificates or Trusted root certificates** will appear.
45+
4. Under **Protocol**, select **HTTPS**. A pane for **Backend authentication certificates or Trusted root certificates** appears.
4446

45-
5. Choose **Create new**.
47+
5. Select **Create new**.
4648

47-
6. Enter a suitable **Name**.
49+
6. In the **Name** field, enter a suitable name.
4850

49-
7. Select the certificate file using the **Upload CER certificate** box.
51+
7. Select the certificate file in the **Upload CER certificate** box.
5052

51-
For Standard and WAF (v1) Application Gateways, you should upload the public key of your backend server certificate in .cer format.
53+
For Standard and WAF (v1) application gateways, you should upload the public key of your back-end server certificate in .cer format.
5254

53-
![addcert](./media/end-to-end-ssl-portal/addcert.png)
55+
![Add certificate](./media/end-to-end-ssl-portal/addcert.png)
5456

55-
For Standard_v2 and WAF_v2 Application Gateways, you should upload the **root certificate** of the backend server certificate in .cer format. If the backend certificate is issued by a well-known CA, you can check the "Use Well Known CA certificate" box and there is no need to upload a certificate.
57+
For Standard_v2 and WAF_v2 application gateways, you should upload the root certificate of the back-end server certificate in .cer format. If the back-end certificate is issued by a well-known certificate authority (CA), you can select the **Use Well Known CA Certificate** check box, and then you don't have to upload a certificate.
5658

57-
![addtrustedrootcert](./media/end-to-end-ssl-portal/trustedrootcert-portal.png)
59+
![Add trusted root certificate](./media/end-to-end-ssl-portal/trustedrootcert-portal.png)
5860

59-
![rootcert](./media/end-to-end-ssl-portal/trustedrootcert.png)
61+
![Root certificate](./media/end-to-end-ssl-portal/trustedrootcert.png)
6062

6163
8. Select **Save**.
6264

63-
## Enable end-to-end SSL for existing application gateway
65+
## Enable end-to-end SSL for an existing application gateway
6466

65-
To configure an existing application gateway with end-to-end SSL encryption, you'll need to first enable SSL termination in the listener. This will enable SSL encryption for the communication between the client and application gateway. Then, you'll need to whitelist certificates for backend servers in the HTTP settings to enable SSL encryption for the communication between the application gateway and backend servers, accomplishing end-to-end SSL encryption.
67+
To configure an existing application gateway with end-to-end SSL encryption, you must first enable SSL termination in the listener. This action enables SSL encryption for communication between the client and the application gateway. Then, put those certificates for back-end servers in the HTTP settings on the Safe Recipients list. This configuration enables SSL encryption for communication between the application gateway and the back-end servers. That accomplishes end-to-end SSL encryption.
6668

67-
You'll need to use a listener with HTTPS protocol and certificate for enabling SSL termination. So, you can either choose to use an existing listener with HTTPS protocol and certificate, or create a new listener. In case you choose the former, you can ignore the below mentioned steps to **Enable SSL termination in existing application gateway** and directly move to **Add authentication/trusted root certificates for back-end servers** section. If you choose the latter, use these steps.
69+
You'll need to use a listener with the HTTPS protocol and a certificate for enabling SSL termination. You can either use an existing listener that meets those conditions or create a new listener. If you choose the former option, you can ignore the following "Enable SSL termination in an existing application gateway" section and move directly to the "Add authentication/trusted root certificates for backend servers" section.
6870

69-
### Enable SSL termination in existing application gateway
71+
If you choose the latter option, apply the steps in the following procedure.
72+
### Enable SSL termination in an existing application gateway
7073

7174
1. Select **All resources**, and then select **myAppGateway**.
7275

73-
2. Select **Listeners** from the left menu.
76+
2. Select **Listeners** from the left-side menu.
7477

75-
3. Choose between **Basic** and **Multi-site** listener as per your requirement.
78+
3. Select either **Basic** or **Multi-site** listener depending on your requirements.
7679

77-
4. Under **Protocol**, select **HTTPS**. A pane for **Certificate** will appear.
80+
4. Under **Protocol**, select **HTTPS**. A pane for **Certificate** appears.
7881

79-
5. Upload the PFX certificate that you intend to use for SSL termination between the client and application gateway.
82+
5. Upload the PFX certificate you intend to use for SSL termination between the client and the application gateway.
8083

8184
> [!NOTE]
82-
> For testing purposes, you can use a self-signed certificate. but not advised for production workloads as they are harder to manage and not completely secure. Learn how to [create a self-signed certificate](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal#create-a-self-signed-certificate).
85+
> For testing purposes, you can use a self-signed certificate. However, this is not advised for production workloads, because they're harder to manage and aren't completely secure. For more info, see [create a self-signed certificate](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal#create-a-self-signed-certificate).
8386
84-
6. Add other required settings for the **Listener** as per your requirement.
87+
6. Add other required settings for the **Listener**, depending on your requirements.
8588

8689
7. Select **OK** to save.
8790

8891
### Add authentication/trusted root certificates of back-end servers
8992

9093
1. Select **All resources**, and then select **myAppGateway**.
9194

92-
2. Select **HTTP settings** from the left menu. You can either whitelist certificates in an existing backend HTTP setting or create a new HTTP setting. In the below step, we will whitelist certificate for the default HTTP setting, **appGatewayBackendHttpSettings**.
95+
2. Select **HTTP settings** from the left-side menu. You can either put certificates in an existing back-end HTTP setting on the Safe Recipients list or create a new HTTP setting. (In the next step, the certificate for the default HTTP setting, **appGatewayBackendHttpSettings**, is added to the Safe Recipients list.)
9396

9497
3. Select **appGatewayBackendHttpSettings**.
9598

96-
4. Under **Protocol**, select **HTTPS**. A pane for **Backend authentication certificates or Trusted root certificates** will appear.
99+
4. Under **Protocol**, select **HTTPS**. A pane for **Backend authentication certificates or Trusted root certificates** appears.
97100

98-
5. Choose **Create new**.
101+
5. Select **Create new**.
99102

100-
6. Enter suitable **Name**.
103+
6. In the **Name** field, enter a suitable name.
101104

102-
7. Select the certificate file using the **Upload CER certificate** box.
105+
7. Select the certificate file in the **Upload CER certificate** box.
103106

104-
For Standard and WAF (v1) Application Gateways, you should upload the public key of your backend server certificate in .cer format.
107+
For Standard and WAF (v1) application gateways, you should upload the public key of your back-end server certificate in .cer format.
105108

106-
![addcert](./media/end-to-end-ssl-portal/addcert.png)
109+
![Add certificate](./media/end-to-end-ssl-portal/addcert.png)
107110

108-
For Standard_v2 and WAF_v2 Application Gateways, you should upload the **root certificate** of the backend server certificate in .cer format. If the backend certificate is issued by a well-known CA, you can check the "Use Well Known CA certificate" box and there is no need to upload a certificate.
111+
For Standard_v2 and WAF_v2 application gateways, you should upload the root certificate of the back-end server certificate in .cer format. If the back-end certificate is issued by a well-known CA, you can select the **Use Well Known CA Certificate** check box, and then you don't have to upload a certificate.
109112

110-
![addtrustedrootcert](./media/end-to-end-ssl-portal/trustedrootcert-portal.png)
113+
![Add trusted root certificate](./media/end-to-end-ssl-portal/trustedrootcert-portal.png)
111114

112115
8. Select **Save**.
113116

articles/automation/automation-dsc-cd-chocolatey.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ intro. In a nutshell, Chocolatey allows you to install packages from a central r
4040
packages into a Windows system using the command line. You can create and manage your own
4141
repository, and Chocolatey can install packages from any number of repositories that you designate.
4242

43-
Desired State Configuration (DSC) ([overview](/powershell/dsc/overview)) is a PowerShell tool that
43+
Desired State Configuration (DSC) ([overview](/powershell/scripting/dsc/overview/overview)) is a PowerShell tool that
4444
allows you to declare the configuration that you want for a machine. For example, you can say, "I
4545
want Chocolatey installed, I want IIS installed, I want port 80 opened, I want version 1.0.0 of my
4646
website installed." The DSC Local Configuration Manager (LCM) implements that configuration. A DSC

articles/automation/automation-dsc-compile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ For information about passing PSCredentials as parameters, see [Credential Asset
133133

134134
**Composite Resources** allow you to use DSC configurations as nested resources inside of a
135135
configuration. This enables you to apply multiple configurations to a single resource. See
136-
[Composite resources: Using a DSC configuration as a resource](/powershell/dsc/authoringresourcecomposite)
136+
[Composite resources: Using a DSC configuration as a resource](/powershell/scripting/dsc/resources/authoringresourcecomposite)
137137
to learn more about **Composite Resources**.
138138

139139
> [!NOTE]

articles/security/develop/threat-modeling-tool-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -305,7 +305,7 @@ The `<netMsmqBinding/>` element of the WCF configuration file below instructs WC
305305
| **SDL Phase** | Build |
306306
| **Applicable Technologies** | .NET Framework 3 |
307307
| **Attributes** | Client Credential Type - None |
308-
| **References** | [MSDN](https://msdn.microsoft.com/library/ff648500.aspx), [Fortify](https://vulncat.fortify.com/en/detail?id=desc.semantic.dotnet.wcf_misconfiguration_anonymous_message_client) |
308+
| **References** | [MSDN](https://msdn.microsoft.com/library/ff648500.aspx), [Fortify](https://community.microfocus.com/t5/UFT-Discussions/UFT-API-Test-with-WCF-wsHttpBinding/m-p/600927) |
309309
| **Steps** | The absence of authentication means everyone is able to access this service. A service that does not authenticate its clients allows access to all users. Configure the application to authenticate against client credentials. This can be done by setting the message clientCredentialType to Windows or Certificate. |
310310

311311
### Example
@@ -321,7 +321,7 @@ The `<netMsmqBinding/>` element of the WCF configuration file below instructs WC
321321
| **SDL Phase** | Build |
322322
| **Applicable Technologies** | Generic, .NET Framework 3 |
323323
| **Attributes** | Client Credential Type - None |
324-
| **References** | [MSDN](https://msdn.microsoft.com/library/ff648500.aspx), [Fortify](https://vulncat.fortify.com/en/detail?id=desc.semantic.dotnet.wcf_misconfiguration_anonymous_transport_client) |
324+
| **References** | [MSDN](https://msdn.microsoft.com/library/ff648500.aspx), [Fortify](https://community.microfocus.com/t5/UFT-Discussions/UFT-API-Test-with-WCF-wsHttpBinding/m-p/600927) |
325325
| **Steps** | The absence of authentication means everyone is able to access this service. A service that does not authenticate its clients allows all users to access its functionality. Configure the application to authenticate against client credentials. This can be done by setting the transport clientCredentialType to Windows or Certificate. |
326326

327327
### Example

0 commit comments

Comments
 (0)