You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-whoiam.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,7 +60,7 @@ The following diagram shows the implementation architecture.
60
60
61
61
*[Key Vault](https://azure.microsoft.com/services/key-vault/): Store passwords
62
62
*[App Service](https://azure.microsoft.com/services/app-service/): Host the BRIMS API and admin portal services
63
-
*[Microsoft Entra ID](https://azure.microsoft.com/services/active-directory/): Authenticate administrative users for the portal
63
+
*[Microsoft Entra ID](https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id): Authenticate administrative users for the portal
64
64
*[Azure Cosmos DB](https://azure.microsoft.com/services/cosmos-db/): Store and retrieve settings
65
65
*[Application Insights overview](/azure/azure-monitor/app/app-insights-overview) (optional): Sign in to the API and the portal
Copy file name to clipboardExpand all lines: articles/api-management/api-management-capacity.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,6 +56,8 @@ Available aggregations for these metrics are as follows.
56
56
57
57
In the Developer, Basic, Standard, and Premium tiers, the **Capacity** metric is available for making decisions about scaling or upgrading an API Management instance. Its construction is complex and imposes certain behavior.
Available aggregations for this metric are as follows.
60
62
61
63
***Avg** - Average percentage of capacity used across gateway processes in every [unit](upgrade-and-scale.md) of an API Management instance.
@@ -171,6 +173,7 @@ Use capacity metrics for making decisions whether to scale an API Management ins
171
173
+ Ignore sudden spikes that are most likely not related to an increase in load (see [Capacity metric behavior](#capacity-metric-behavior) section for explanation).
172
174
+ As a general rule, upgrade or scale your instance when a capacity metric value exceeds **60% - 70%** for a long period of time (for example, 30 minutes). Different values may work better for your service or scenario.
173
175
+ If your instance or workspace gateway is configured with only 1 unit, upgrade or scale it when a capacity metric value exceeds **40%** for a long period. This recommendation is based on the need to reserve capacity for guest OS updates in the underlying service platform.
176
+
+ Use [available diagnostics](monitor-api-management.md) to monitor the response times of API calls. Consider adjusting scaling thresholds if you notice degraded response times with increasing value of capacity metric.
174
177
175
178
> [!TIP]
176
179
> If you are able to estimate your traffic beforehand, test your API Management instance or workspace gateway on workloads you expect. You can increase the request load gradually and monitor the value of the capacity metric that corresponds to your peak load. Follow the steps from the previous section to use Azure portal to understand how much capacity is used at any given time.
Copy file name to clipboardExpand all lines: articles/app-service/configure-ssl-certificate.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ You can add up to 1,000 private certificates per webspace.
55
55
56
56
## Create a free managed certificate
57
57
58
-
The free App Service managed certificate is a turn-key solution for helping to secure your custom DNS name in App Service. Without any action from you, this TLS/SSL server certificate is fully managed by App Service and is automatically renewed continuously in six-month increments, 45 days before expiration, as long as the prerequisites that you set up stay the same. All the associated bindings are updated with the renewed certificate. You create and bind the certificate to a custom domain, and let App Service do the rest.
58
+
The free App Service managed certificate is a turn-key solution for helping to secure your custom DNS name in App Service. Without any action from you, this TLS/SSL server certificate is fully managed by App Service and is automatically renewed, as long as the prerequisites that you set up stay the same. All the associated bindings are updated with the renewed certificate. You create and bind the certificate to a custom domain, and let App Service do the rest.
59
59
60
60
Before you create a free managed certificate, make sure that you [meet the prerequisites](#prerequisites) for your app.
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-configure-listener-specific-ssl-policy.md
+58-20Lines changed: 58 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,80 +5,118 @@ services: application-gateway
5
5
author: mbender-ms
6
6
ms.service: azure-application-gateway
7
7
ms.topic: how-to
8
-
ms.date: 02/18/2022
8
+
ms.date: 07/09/2025
9
9
ms.author: mbender
10
10
# Customer intent: As a cloud administrator, I want to configure listener-specific SSL policies on my Application Gateway, so that I can enhance security and performance by applying different SSL settings for each listener based on my application requirements.
11
11
---
12
12
13
13
# Configure listener-specific SSL policies on Application Gateway through portal
14
14
15
+
This article describes how to use the Azure portal to configure listener-specific SSL policies on your Azure Application Gateway. Listener-specific SSL policies allow you to configure specific listeners to use different SSL policies from each other. You can still set a default SSL policy that all listeners use unless overridden by the listener-specific SSL policy.
15
16
This article describes how to use the Azure portal to configure listener-specific SSL policies on your Application Gateway. Listener-specific SSL policies allow you to configure specific listeners to use different SSL policies from each other. You'll still be able to set a default SSL policy that all listeners use unless overwritten by the listener-specific SSL policy.
16
17
17
18
> [!IMPORTANT]
18
19
> Starting **August 31, 2025**, all clients and backend servers interacting with Azure Application Gateway must use Transport Layer Security (TLS) 1.2 or higher, as [support for TLS 1.0 and 1.1 will be discontinued](https://azure.microsoft.com/updates/azure-application-gateway-support-for-tls-10-and-tls-11-will-end-by-31-august-2025).
19
20
20
21
> [!NOTE]
21
-
> Only Standard_v2 and WAF_v2 SKUs support listenerspecific policies as listener specific policies are part of SSL profiles, and SSL profiles are only supported on v2 gateways.
22
+
> Only Standard_v2 and WAF_v2 SKUs support listener-specific policies. Listener-specific policies are part of SSL profiles, and SSL profiles are only supported on v2 Application Gateways.
22
23
23
24
24
25
25
-
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
26
+
## Prerequisites
27
+
28
+
Before you begin, ensure you have:
29
+
30
+
- An Azure subscription. If you don't have one, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
31
+
- An existing Azure Application Gateway (Standard_v2 or WAF_v2 SKU)
32
+
- Appropriate permissions to modify Application Gateway configurations
26
33
27
34
## Create a new Application Gateway
28
35
36
+
First, create a new Application Gateway as you would normally through the portal. There are no more steps needed during creation to configure listener-specific SSL policies. For more information on how to create an Application Gateway in the portal, see the [portal quickstart tutorial](./quick-create-portal.md).
37
+
29
38
First create a new Application Gateway as you would usually through the portal - there are no extra steps needed in the creation to configure listener-specific SSL policies. For more information on how to create an Application Gateway in portal, check out our [portal quickstart tutorial](./quick-create-portal.md).
30
39
31
40
## Set up a listener-specific SSL policy
32
41
33
-
Before you proceed, here are some important points related to listener-specific SSL policy.
42
+
Before you proceed, here are some important considerations for listener-specific SSL policies:
43
+
44
+
SSL-Policies
45
+
- We recommend using TLS 1.2 or higher
46
+
- You don't need to configure client authentication on an SSL profile to associate it with a listener. You can configure only client authentication, only listener-specific SSL policy, or both in your SSL profile.
47
+
- Use a [2022 Predefined](./application-gateway-ssl-policy-overview.md#predefined-tls-policy) or Custom v2 policy, enhances SSL security and performance for the entire Application Gateway (SSL Policy and SSL Profile). Therefore, you can't have different listeners using both legacy and new SSL policies simultaneously.
34
48
35
49
- We recommend using TLS 1.2 as this version will be mandated in the future.
36
50
- You don't have to configure client authentication on an SSL profile to associate it to a listener. You can have only client authentication or listener-specific SSL policy configured, or both configured in your SSL profile.
37
51
- Using a [2022 Predefined](./application-gateway-ssl-policy-overview.md#predefined-tls-policy) or Customv2 policy enhances SSL security and performance for the entire gateway (SSL Policy and SSL Profile). Therefore, you cannot have different listeners on both old and new SSL (predefined or custom) policies.
38
52
39
-
Consider this example, you're currently using SSL Policy and SSL Profile with "older" policies/ciphers. To use a "new" Predefined or Customv2 policy for any one of them will also require you to upgrade the other configuration. You may use the new predefined policies, or customv2 policy, or combination of these across the gateway.
53
+
**Example scenario**: If you're currently using SSL Policy and SSL Profile with "legacy" policies/ciphers, upgrading to a "new" Predefined or Custom v2 policy for any component requires upgrading the other configuration as well. You can use the new predefined policies, Custom v2 policy, or a combination.
54
+
55
+
SSL-Policies
56
+
To set up a listener-specific SSL policy, you need to first go to the **SSL settings** tab in the Azure portal and create a new SSL profile. When you create an SSL profile, you see two tabs: **Client Authentication** and **SSL Policy**. The **SSL Policy** tab is used to configure a listener-specific SSL policy. The **Client Authentication** tab is where you upload client certificates for mutual authentication. For more information, see [Configuring mutual authentication](./mutual-authentication-portal.md).
40
57
41
58
To set up a listener-specific SSL policy, you need to first go to the **SSL settings** tab in the Portal and create a new SSL profile. When you create an SSL profile, you see two tabs: **Client Authentication** and **SSL Policy**. The **SSL Policy** tab is to configure a listener-specific SSL policy. The **Client Authentication** tab is where to upload a client certificate for mutual authentication - for more information, check out [Configuring a mutual authentication](./mutual-authentication-portal.md).
42
59
43
-
1. Search for **Application Gateway** in portal, select **Application gateways**, and click on your existing Application Gateway.
60
+
1. Search for **Application Gateway** in the portal, select **Application gateways**, and select your existing Application Gateway.
44
61
45
62
2. Select **SSL settings** from the left-side menu.
46
63
47
-
3. Click on the plus sign next to **SSL Profiles** at the top to create a new SSL profile.
64
+
3. Select the plus sign next to **SSL Profiles** at the top to create a new SSL profile.
65
+
66
+
4. Enter a name under **SSL Profile Name**. In this example, we name our SSL profile *applicationGatewaySSLProfile*.
48
67
49
-
4. Enter a name under **SSL Profile Name**. In this example, we call our SSL profile *applicationGatewaySSLProfile*.
68
+
5. Go to the **SSL Policy** tab and check the **Enable listener-specific SSL Policy** checkbox.
50
69
51
-
5. Go to the **SSL Policy** tab and check the **Enable listener-specific SSL Policy** box.
70
+
6. Configure your listener-specific SSL policy according to your requirements. You can choose between predefined SSL policies and customizing your own SSL policy. For more information on SSL policies, see [SSL policy overview](./application-gateway-ssl-policy-overview.md). We recommend using TLS 1.2 or higher.
52
71
53
-
6. Set up your listener-specific SSL policy given your requirements. You can choose between predefined SSL policies and customizing your own SSL policy. For more information on SSL policies, visit [SSL policy overview](./application-gateway-ssl-policy-overview.md). We recommend using TLS 1.2
72
+
> [!NOTE]
73
+
> This policy is the latest version of the SSL policy available, which is recommended to ensure the best SSL security. If your gateway is configured to handle older traffic, you may need to choose an older policy to ensure that all traffic is handled correctly.
54
74
55
75
7. Select **Add** to save.
56
76
57
-

77
+
:::image type="content" source="./media/application-gateway-configure-listener-specific-ssl-policy/listener-specific-ssl-policy-ssl-profile.png" alt-text="Screenshot of adding listener-specific SSL policy to SSL profile in Azure portal.":::
58
78
59
79
## Associate the SSL profile with a listener
60
80
61
-
Now that we've created an SSL profile with a listener-specific SSL policy, we need to associate the SSL profile to the listener to put the listener-specific policy in action.
81
+
Now you created an SSL profile with a listener-specific SSL policy. You need to associate the SSL profile with the listener to activate the listener-specific policy.
62
82
63
-
1. Navigate to your existing Application Gateway. If you just completed the steps above, you don't need to do anything here.
83
+
1. Navigate to your existing Application Gateway.
64
84
65
85
2. Select **Listeners** from the left-side menu.
66
86
67
-
3.Click on **Add listener** if you don't already have an HTTPS listener set up. If you already have an HTTPS listener, click on it from the list.
87
+
3.Select on **Add listener** if you don't already have an HTTPS listener set up. If you already have an HTTPS listener, Select on it from the list.
68
88
69
-
4. Fill out the **Listener name**, **Frontend IP**, **Port**, **Protocol**, and other **HTTPS Settings** to fit your requirements.
89
+
4. Fill out the **Listener name**, **Frontend IP**, **Port**, and other HTTPS Settings to fit your requirements.
70
90
71
-
5.Check the **Enable SSL Profile** checkbox so that you can select which SSL Profile to associate with the listener.
91
+
5.Select Add to save your new listener with the SSL profile associated to it.
72
92
73
-
6. Select the SSL profile you created from the dropdown list. In this example, we choose the SSL profile we created from the earlier steps: *applicationGatewaySSLProfile*.
93
+
6. Check to see **SSL Policy** is correct or select **Change** for choose another SSL Policy. The options available include:
94
+
- Default
95
+
- Predefined
96
+
- Custom
97
+
- CustomV2
98
+
Select the SSL profile you created from the dropdown list. In this example, we choose the SSL profile created in the earlier steps: *applicationGatewaySSLProfile*.
74
99
75
-
7.Continue configuring the remainder of the listener to fit your requirements.
100
+
7.Select on tab **Listener TLS Certificates** on the second tab.
76
101
77
-
8.Click**Add** to save your new listener with the SSL profile associated to it.
102
+
8.Select**+ Add Certificate**.
78
103
79
-

104
+
9. Fill out the **Certificate name**, **PFX Certificate File**, **Type** , and other **Password** to fit your requirements.
105
+
106
+
10. Select **Add** to save your new listener TLS Certificate with the SSL profile associated to it.
107
+
108
+
11. Continue configuring the remainder of the listener according to your requirements.
109
+
110
+
:::image type="content" source="./media/application-gateway-configure-listener-specific-ssl-policy/listener-certificate.png" alt-text="Screenshot of SSL profile association for a new listener.":::
80
111
81
112
### Limitations
113
+
SSL-Policies
114
+
115
+
There are current limitations with Azure Application Gateway regarding SSL policies:
116
+
117
+
- Different listeners using the same port can't have SSL policies (predefined or custom) with different TLS protocol versions.
118
+
- Configuring the same TLS version for different listeners works for setting cipher suite preferences for each listener.
119
+
- To use different TLS protocol versions for separate listeners, you must use distinct ports for each listener.
82
120
There is a limitation right now on Application Gateway that different listeners using the same port cannot have SSL policies (predefined or custom) with different TLS protocol versions. Choosing the same TLS version for different listeners work for configuring cipher suite preference for each listener. However, to use different TLS protocol versions for separate listeners, you need to use distinct ports for each.
0 commit comments