Skip to content

Commit b2af810

Browse files
committed
edits
1 parent aaf1031 commit b2af810

9 files changed

+44
-44
lines changed

articles/app-service/app-service-configuration-references.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.author: mubatra
99

1010
---
1111

12-
# Use App Configuration references for App Service and Azure Functions
12+
# Use App Configuration references for Azure App Service and Azure Functions
1313

1414
This article shows you how to work with configuration data in your Azure App Service or Azure Functions application without making any code changes. [Azure App Configuration](../azure-app-configuration/overview.md) is an Azure service you can use to centrally manage application configuration. It's also an effective audit tool for your configuration values over time or across releases.
1515

articles/app-service/app-service-web-configure-tls-mutual-auth.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Set Up TLS mutual authentication
2+
title: Set Up TLS Mutual Authentication
33
description: Learn how to set up TLS mutual authentication in Azure App Service to help secure two-way communication between client and server.
44
keywords: TLS mutual authentication, Azure App Service security, secure client-server communication
55
author: msangapu-msft

articles/app-service/configure-authentication-oauth-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Work with OAuth tokens in AuthN/AuthZ
2+
title: Work with OAuth Tokens in AuthN/AuthZ
33
description: Learn how to retrieve tokens, refresh tokens, and extend sessions when you use the built-in authentication and authorization in Azure App Service.
44
ms.topic: how-to
55
ms.date: 03/29/2021

articles/app-service/deploy-local-git.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Deploy from a Local Git Repository
2+
title: Deploy From a Local Git Repository
33
description: Learn how to enable local Git deployment to Azure App Service. One of the simplest ways to deploy code is from your local computer.
44
ms.topic: how-to
55
ms.date: 02/29/2024

articles/app-service/overview-app-gateway-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Overview of Application Gateway integration
2+
title: Application Gateway Integration Overview
33
description: Learn how Application Gateway integrates with Azure App Service.
44
services: app-service
55
author: madsd

articles/app-service/overview-security.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Overview of Security
2+
title: Security Overview
33
description: Learn about how Azure App Service helps secure your app, and how you can help lock down your app from threats.
44
keywords: azure app service, web app, mobile app, api app, function app, security, secure, secured, compliance, compliant, certificate, certificates, https, ftps, tls, trust, encryption, encrypt, encrypted, ip restriction, authentication, authorization, authn, autho, msi, managed service identity, managed identity, secrets, secret, patching, patch, patches, version, isolation, network isolation, ddos, mitm
55
ms.topic: overview
@@ -11,15 +11,15 @@ ms.author: cephalin
1111
---
1212
# Security in Azure App Service overview
1313

14-
This article describes how [Azure App Service](overview.md) helps secure your web app, mobile app back end, API app, and [function app](../azure-functions/index.yml). It also shows how you can further help secure your app by using built-in App Service features.
14+
This article describes how [Azure App Service](overview.md) helps secure your web app, mobile app back end, API app, and [function app](../azure-functions/index.yml). It also shows you how to further help secure your app by using built-in App Service features.
1515

1616
[!INCLUDE [app-service-security-intro](../../includes/app-service-security-intro.md)]
1717

1818
The following sections show you how to further help protect your App Service app from threats.
1919

2020
## HTTPS and certificates
2121

22-
You can use App Service to secure your apps through [HTTPS](https://wikipedia.org/wiki/HTTPS). When your app is created, its default domain name (`<app_name>.azurewebsites.net`) is already accessible by using HTTPS. If you [configure a custom domain for your app](app-service-web-tutorial-custom-domain.md), you should also [help secure it with a TLS/SSL certificate](configure-ssl-bindings.md) so that client browsers can make secured HTTPS connections to your custom domain.
22+
You can use App Service to secure your apps through [HTTPS](https://wikipedia.org/wiki/HTTPS). When your app is created, its default domain name (`<app_name>.azurewebsites.net`) is already accessible by using HTTPS. If you [configure a custom domain for your app](app-service-web-tutorial-custom-domain.md), you should also [help secure it with a TLS/SSL certificate](configure-ssl-bindings.md) so that client browsers can make secured HTTPS connections to your custom domain.
2323

2424
App Service supports these types of certificates:
2525

@@ -34,9 +34,9 @@ For more information, see [Add a TLS/SSL certificate in Azure App Service](confi
3434

3535
To secure your app against all unencrypted (HTTP) connections, App Service provides one-click configuration to enforce HTTPS. Unsecured requests are turned away before they even reach your application code. For more information, see [Enforce HTTPS](configure-ssl-bindings.md#enforce-https).
3636

37-
[TLS](https://wikipedia.org/wiki/Transport_Layer_Security) 1.0 is no longer considered secure by industry standards, such as [PCI DSS](https://wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard). Use App Service to disable outdated protocols by [enforcing TLS 1.1/1.2](configure-ssl-bindings.md#enforce-tls-versions).
37+
[TLS](https://wikipedia.org/wiki/Transport_Layer_Security) 1.0 is no longer considered secure by industry standards, such as the [PCI DSS](https://wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard). Use App Service to disable outdated protocols by [enforcing TLS 1.1/TLS 1.2](configure-ssl-bindings.md#enforce-tls-versions).
3838

39-
App Service supports both FTP and FTPS for deploying your files. But use FTPS instead of FTP, if at all possible. When one or both of these protocols aren't in use, you should [disable them](deploy-ftp.md#enforce-ftps).
39+
App Service supports both FTP and FTPS for deploying your files. To increase security, use FTPS instead of FTP, if at all possible. When one or both of these protocols aren't in use, you should [disable them](deploy-ftp.md#enforce-ftps).
4040

4141
## Static IP restrictions
4242

@@ -52,10 +52,10 @@ App Service authentication and authorization support multiple authentication pro
5252

5353
## Service-to-service authentication
5454

55-
When you authenticate against a back-end service, App Service provides two different mechanisms depending on your need:
55+
When you authenticate against a back-end service, App Service provides two mechanisms depending on your need:
5656

57-
- **Service identity** - Sign in to the remote resource by using the identity of the app itself. App Service lets you easily create a [managed identity](overview-managed-identity.md), which you can use to authenticate with other services, such as [Azure SQL Database](/azure/sql-database/) or [Azure Key Vault](/azure/key-vault/). For an end-to-end tutorial of this approach, see [Secure an Azure SQL Database connection from App Service by using a managed identity](tutorial-connect-msi-sql-database.md).
58-
- **On behalf of (OBO)** - Make delegated access to remote resources on behalf of the user. With Microsoft Entra ID as the authentication provider, your App Service app can perform delegated sign-in to a remote service, such as [Microsoft Graph](/graph/overview) or a remote API app in App Service. For an end-to-end tutorial of this approach, see [Authenticate and authorize users end-to-end in Azure App Service](tutorial-auth-aad.md).
57+
- **Service identity** - Sign in to the remote resource by using the identity of the app itself. In App Service, you can easily create a [managed identity](overview-managed-identity.md), which you can use to authenticate with other services, such as [Azure SQL Database](/azure/sql-database/) or [Azure Key Vault](/azure/key-vault/). For an end-to-end tutorial of this approach, see [Secure an Azure SQL Database connection from App Service by using a managed identity](tutorial-connect-msi-sql-database.md).
58+
- **On behalf of (OBO)** - Make delegated access to remote resources on behalf of the user. With Microsoft Entra ID as the authentication provider, your App Service app can perform delegated sign-in to a remote service, such as to [Microsoft Graph](/graph/overview) or to a remote API app in App Service. For an end-to-end tutorial of this approach, see [Authenticate and authorize users end-to-end in Azure App Service](tutorial-auth-aad.md).
5959

6060
## Connectivity to remote resources
6161

@@ -65,7 +65,7 @@ Your app might need to access three types of remote resources:
6565
- [Resources inside an Azure virtual network](#resources-inside-an-azure-virtual-network)
6666
- [On-premises resources](#on-premises-resources)
6767

68-
In each of these scenarios, App Service provides a way for you to make secure connections, but you should still observe security best practices. For example, always use encrypted connections even if the back-end resource allows unencrypted connections. Furthermore, make sure that your back-end Azure service allows the minimum set of IP addresses. You can find the outbound IP addresses for your app at [Inbound and outbound IP addresses in Azure App Service](overview-inbound-outbound-ips.md).
68+
In each of these scenarios, App Service provides a way for you to make secure connections, but you should still observe security best practices. For example, always use encrypted connections, even if the back-end resource allows unencrypted connections. Also ensure that your back-end Azure service allows the minimum set of IP addresses. You can find the outbound IP addresses for your app at [Inbound and outbound IP addresses in Azure App Service](overview-inbound-outbound-ips.md).
6969

7070
### Azure resources
7171

@@ -77,31 +77,31 @@ If your app is hosted in an [App Service Environment](environment/intro.md), you
7777

7878
Your app can access resources in an [Azure virtual network](../virtual-network/index.yml) through [virtual network integration](./overview-vnet-integration.md). The integration is established with a virtual network by using a point-to-site VPN. The app can then access the resources in the virtual network by using their private IP addresses. The point-to-site connection, however, still traverses the shared networks in Azure.
7979

80-
To isolate your resource connectivity completely from the shared networks in Azure, create your app in an [App Service Environment](environment/intro.md). Because an App Service Environment is always deployed to a dedicated virtual network, connectivity between your app and resources in the virtual network is fully isolated. For other aspects of network security in an App Service Environment, see [Network isolation](#network-isolation).
80+
To isolate your resource connectivity completely from the shared networks in Azure, create your app in an [App Service Environment](environment/intro.md). Because an App Service Environment is always deployed to a dedicated virtual network, connectivity between your app and resources in the virtual network is fully isolated. For more information about network security in an App Service Environment, see [Network isolation](#network-isolation).
8181

8282
### On-premises resources
8383

8484
You can securely access on-premises resources, such as databases, in three ways:
8585

86-
- *[Hybrid connection](app-service-hybrid-connections.md)* - Use a hybrid connection to establish a point-to-point connection to your remote resource through a TCP tunnel. The TCP tunnel is established by using TLS 1.2 with shared access signature keys.
87-
- *[Virtual network integration](./overview-vnet-integration.md) with a site-to-site VPN* - As described in [Resources inside an Azure virtual network](#resources-inside-an-azure-virtual-network), but in virtual network integration, the virtual network can be connected to your on-premises network through a [site-to-site VPN](../vpn-gateway/tutorial-site-to-site-portal.md). In this network topology, your app can connect to on-premises resources like it connects to other resources in the virtual network.
88-
- *[App Service Environment](environment/intro.md) with a site-to-site VPN* - As described in [Resources inside an Azure virtual network](#resources-inside-an-azure-virtual-network), but in an App Service Environment, the virtual network can be connected to your on-premises network through a [site-to-site VPN](../vpn-gateway/tutorial-site-to-site-portal.md). In this network topology, your app can connect to on-premises resources like it connects to other resources in the virtual network.
86+
- **[Hybrid connection](app-service-hybrid-connections.md)** - Use a hybrid connection to establish a point-to-point connection to your remote resource through a TCP tunnel. The TCP tunnel is established by using TLS 1.2 with shared access signature keys.
87+
- **[Virtual network integration](./overview-vnet-integration.md) with a site-to-site VPN** - As described in [Resources inside an Azure virtual network](#resources-inside-an-azure-virtual-network), but in virtual network integration, the virtual network can be connected to your on-premises network through a [site-to-site VPN](../vpn-gateway/tutorial-site-to-site-portal.md). In this network topology, your app can connect to on-premises resources like it connects to other resources in the virtual network.
88+
- **[App Service Environment](environment/intro.md) with a site-to-site VPN** - As described in [Resources inside an Azure virtual network](#resources-inside-an-azure-virtual-network), but in an App Service Environment, the virtual network can be connected to your on-premises network through a [site-to-site VPN](../vpn-gateway/tutorial-site-to-site-portal.md). In this network topology, your app can connect to on-premises resources like it connects to other resources in the virtual network.
8989

9090
## Application secrets
9191

92-
Don't store application secrets like database credentials, API tokens, and private keys in your code or configuration files. The commonly accepted approach is to access them as [environment variables](https://wikipedia.org/wiki/Environment_variable) by using the standard pattern in your language of choice. In App Service, the way to define environment variables is through [app settings](configure-common.md#configure-app-settings) (and, especially for .NET applications, [connection strings](configure-common.md#configure-connection-strings)). App settings and connection strings are stored encrypted in Azure, and they're decrypted only before they're injected into your app's process memory when the app starts. The encryption keys are rotated regularly.
92+
Don't store application secrets like database credentials, API tokens, and private keys in your code or configuration files. The commonly accepted approach is to access them as [environment variables](https://wikipedia.org/wiki/Environment_variable) by using the standard pattern in your language of choice. In App Service, the way to define environment variables is through [app settings](configure-common.md#configure-app-settings) (and, especially for .NET applications, [connection strings](configure-common.md#configure-connection-strings)). App settings and connection strings are stored encrypted in Azure. They're decrypted only before they're injected into your app's process memory when the app starts. The encryption keys are rotated regularly.
9393

94-
Alternatively, you can integrate your App Service app with [Azure Key Vault](/azure/key-vault/) for advanced secrets management. By [accessing the key vault with a managed identity](/azure/key-vault/general/tutorial-net-create-vault-azure-web-app), your App Service app can securely access the secrets you need.
94+
Alternatively, you can integrate your App Service app with [Azure Key Vault](/azure/key-vault/) for advanced secrets management. By [accessing the key vault by using a managed identity](/azure/key-vault/general/tutorial-net-create-vault-azure-web-app), your App Service app can securely access the secrets you need.
9595

9696
## Network isolation
9797

98-
Except for the **Isolated** pricing tier, all tiers run your apps on the shared network infrastructure in App Service. For example, the public IP addresses and front-end load balancers are shared with other tenants. The **Isolated** tier gives you complete network isolation by running your apps inside a dedicated [App Service Environment](environment/intro.md). An App Service Environment runs in your own instance of [Azure Virtual Network](../virtual-network/index.yml).
98+
Except for the **Isolated** pricing tier, all tiers run your apps on the shared network infrastructure in App Service. For example, the public IP addresses and front-end load balancers are shared with other tenants. The Isolated tier gives you complete network isolation by running your apps inside a dedicated [App Service Environment](environment/intro.md). An App Service Environment runs in your own instance of [Azure Virtual Network](../virtual-network/index.yml).
9999

100100
You can:
101101

102102
- Serve your apps through a dedicated public endpoint, with dedicated front ends.
103103
- Serve internal application by using an internal load balancer (ILB), which allows access only from inside your Azure virtual network. The ILB has an IP address from your private subnet, which provides total isolation of your apps from the internet.
104-
- [Use an ILB behind a web application firewall (WAF)](environment/integrate-with-application-gateway.md). The WAF offers enterprise-level protection to your public-facing applications, such as protection from Distributed Denial-of-Service (DDoS) attacks, URI filtering, and preventing SQL injection.
104+
- [Use an ILB behind a web application firewall (WAF)](environment/integrate-with-application-gateway.md). The WAF offers enterprise-level protection to your public-facing applications, such as protection from distributed denial-of-service (DDoS), URI filtering, and SQL injection.
105105

106106
## DDoS protection
107107

articles/app-service/overview-tls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: TLS and SSL overview
2+
title: TLS and SSL Overview
33
description: Learn how TLS and SSL work in Azure App Service, including TLS version support, certificate management, bindings, and mutual authentication to protect web app traffic.
44
keywords: Azure App Service, SSL, TLS, HTTPS, certificate management, TLS mutual authentication, secure bindings, SSL certificates, App Service Certificates, SSL in code, TLS versions
55
ms.topic: overview

0 commit comments

Comments
 (0)