You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/app-service-configuration-references.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.author: mubatra
9
9
10
10
---
11
11
12
-
# Use App Configuration references for App Service and Azure Functions
12
+
# Use App Configuration references for Azure App Service and Azure Functions
13
13
14
14
This article shows you how to work with configuration data in your Azure App Service or Azure Functions application without making any code changes. [Azure App Configuration](../azure-app-configuration/overview.md) is an Azure service you can use to centrally manage application configuration. It's also an effective audit tool for your configuration values over time or across releases.
Copy file name to clipboardExpand all lines: articles/app-service/configure-authentication-oauth-tokens.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Work with OAuth tokens in AuthN/AuthZ
2
+
title: Work with OAuth Tokens in AuthN/AuthZ
3
3
description: Learn how to retrieve tokens, refresh tokens, and extend sessions when you use the built-in authentication and authorization in Azure App Service.
Copy file name to clipboardExpand all lines: articles/app-service/overview-security.md
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Overview of Security
2
+
title: Security Overview
3
3
description: Learn about how Azure App Service helps secure your app, and how you can help lock down your app from threats.
4
4
keywords: azure app service, web app, mobile app, api app, function app, security, secure, secured, compliance, compliant, certificate, certificates, https, ftps, tls, trust, encryption, encrypt, encrypted, ip restriction, authentication, authorization, authn, autho, msi, managed service identity, managed identity, secrets, secret, patching, patch, patches, version, isolation, network isolation, ddos, mitm
5
5
ms.topic: overview
@@ -11,15 +11,15 @@ ms.author: cephalin
11
11
---
12
12
# Security in Azure App Service overview
13
13
14
-
This article describes how [Azure App Service](overview.md) helps secure your web app, mobile app back end, API app, and [function app](../azure-functions/index.yml). It also shows how you can further help secure your app by using built-in App Service features.
14
+
This article describes how [Azure App Service](overview.md) helps secure your web app, mobile app back end, API app, and [function app](../azure-functions/index.yml). It also shows you how to further help secure your app by using built-in App Service features.
The following sections show you how to further help protect your App Service app from threats.
19
19
20
20
## HTTPS and certificates
21
21
22
-
You can use App Service to secure your apps through [HTTPS](https://wikipedia.org/wiki/HTTPS). When your app is created, its default domain name (`<app_name>.azurewebsites.net`) is already accessible by using HTTPS. If you [configure a custom domain for your app](app-service-web-tutorial-custom-domain.md), you should also [help secure it with a TLS/SSL certificate](configure-ssl-bindings.md) so that client browsers can make secured HTTPS connections to your custom domain.
22
+
You can use App Service to secure your apps through [HTTPS](https://wikipedia.org/wiki/HTTPS). When your app is created, its default domain name (`<app_name>.azurewebsites.net`) is already accessible by using HTTPS. If you [configure a custom domain for your app](app-service-web-tutorial-custom-domain.md), you should also [help secure it with a TLS/SSL certificate](configure-ssl-bindings.md) so that client browsers can make secured HTTPS connections to your custom domain.
23
23
24
24
App Service supports these types of certificates:
25
25
@@ -34,9 +34,9 @@ For more information, see [Add a TLS/SSL certificate in Azure App Service](confi
34
34
35
35
To secure your app against all unencrypted (HTTP) connections, App Service provides one-click configuration to enforce HTTPS. Unsecured requests are turned away before they even reach your application code. For more information, see [Enforce HTTPS](configure-ssl-bindings.md#enforce-https).
36
36
37
-
[TLS](https://wikipedia.org/wiki/Transport_Layer_Security) 1.0 is no longer considered secure by industry standards, such as [PCI DSS](https://wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard). Use App Service to disable outdated protocols by [enforcing TLS 1.1/1.2](configure-ssl-bindings.md#enforce-tls-versions).
37
+
[TLS](https://wikipedia.org/wiki/Transport_Layer_Security) 1.0 is no longer considered secure by industry standards, such as the [PCI DSS](https://wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard). Use App Service to disable outdated protocols by [enforcing TLS 1.1/TLS 1.2](configure-ssl-bindings.md#enforce-tls-versions).
38
38
39
-
App Service supports both FTP and FTPS for deploying your files. But use FTPS instead of FTP, if at all possible. When one or both of these protocols aren't in use, you should [disable them](deploy-ftp.md#enforce-ftps).
39
+
App Service supports both FTP and FTPS for deploying your files. To increase security, use FTPS instead of FTP, if at all possible. When one or both of these protocols aren't in use, you should [disable them](deploy-ftp.md#enforce-ftps).
40
40
41
41
## Static IP restrictions
42
42
@@ -52,10 +52,10 @@ App Service authentication and authorization support multiple authentication pro
52
52
53
53
## Service-to-service authentication
54
54
55
-
When you authenticate against a back-end service, App Service provides two different mechanisms depending on your need:
55
+
When you authenticate against a back-end service, App Service provides two mechanisms depending on your need:
56
56
57
-
-**Service identity** - Sign in to the remote resource by using the identity of the app itself. App Service lets you easily create a [managed identity](overview-managed-identity.md), which you can use to authenticate with other services, such as [Azure SQL Database](/azure/sql-database/) or [Azure Key Vault](/azure/key-vault/). For an end-to-end tutorial of this approach, see [Secure an Azure SQL Database connection from App Service by using a managed identity](tutorial-connect-msi-sql-database.md).
58
-
-**On behalf of (OBO)** - Make delegated access to remote resources on behalf of the user. With Microsoft Entra ID as the authentication provider, your App Service app can perform delegated sign-in to a remote service, such as [Microsoft Graph](/graph/overview) or a remote API app in App Service. For an end-to-end tutorial of this approach, see [Authenticate and authorize users end-to-end in Azure App Service](tutorial-auth-aad.md).
57
+
-**Service identity** - Sign in to the remote resource by using the identity of the app itself. In App Service, you can easily create a [managed identity](overview-managed-identity.md), which you can use to authenticate with other services, such as [Azure SQL Database](/azure/sql-database/) or [Azure Key Vault](/azure/key-vault/). For an end-to-end tutorial of this approach, see [Secure an Azure SQL Database connection from App Service by using a managed identity](tutorial-connect-msi-sql-database.md).
58
+
-**On behalf of (OBO)** - Make delegated access to remote resources on behalf of the user. With Microsoft Entra ID as the authentication provider, your App Service app can perform delegated sign-in to a remote service, such as to [Microsoft Graph](/graph/overview) or to a remote API app in App Service. For an end-to-end tutorial of this approach, see [Authenticate and authorize users end-to-end in Azure App Service](tutorial-auth-aad.md).
59
59
60
60
## Connectivity to remote resources
61
61
@@ -65,7 +65,7 @@ Your app might need to access three types of remote resources:
65
65
-[Resources inside an Azure virtual network](#resources-inside-an-azure-virtual-network)
66
66
-[On-premises resources](#on-premises-resources)
67
67
68
-
In each of these scenarios, App Service provides a way for you to make secure connections, but you should still observe security best practices. For example, always use encrypted connections even if the back-end resource allows unencrypted connections. Furthermore, make sure that your back-end Azure service allows the minimum set of IP addresses. You can find the outbound IP addresses for your app at [Inbound and outbound IP addresses in Azure App Service](overview-inbound-outbound-ips.md).
68
+
In each of these scenarios, App Service provides a way for you to make secure connections, but you should still observe security best practices. For example, always use encrypted connections, even if the back-end resource allows unencrypted connections. Also ensure that your back-end Azure service allows the minimum set of IP addresses. You can find the outbound IP addresses for your app at [Inbound and outbound IP addresses in Azure App Service](overview-inbound-outbound-ips.md).
69
69
70
70
### Azure resources
71
71
@@ -77,31 +77,31 @@ If your app is hosted in an [App Service Environment](environment/intro.md), you
77
77
78
78
Your app can access resources in an [Azure virtual network](../virtual-network/index.yml) through [virtual network integration](./overview-vnet-integration.md). The integration is established with a virtual network by using a point-to-site VPN. The app can then access the resources in the virtual network by using their private IP addresses. The point-to-site connection, however, still traverses the shared networks in Azure.
79
79
80
-
To isolate your resource connectivity completely from the shared networks in Azure, create your app in an [App Service Environment](environment/intro.md). Because an App Service Environment is always deployed to a dedicated virtual network, connectivity between your app and resources in the virtual network is fully isolated. For other aspects of network security in an App Service Environment, see [Network isolation](#network-isolation).
80
+
To isolate your resource connectivity completely from the shared networks in Azure, create your app in an [App Service Environment](environment/intro.md). Because an App Service Environment is always deployed to a dedicated virtual network, connectivity between your app and resources in the virtual network is fully isolated. For more information about network security in an App Service Environment, see [Network isolation](#network-isolation).
81
81
82
82
### On-premises resources
83
83
84
84
You can securely access on-premises resources, such as databases, in three ways:
85
85
86
-
-*[Hybrid connection](app-service-hybrid-connections.md)* - Use a hybrid connection to establish a point-to-point connection to your remote resource through a TCP tunnel. The TCP tunnel is established by using TLS 1.2 with shared access signature keys.
87
-
-*[Virtual network integration](./overview-vnet-integration.md) with a site-to-site VPN* - As described in [Resources inside an Azure virtual network](#resources-inside-an-azure-virtual-network), but in virtual network integration, the virtual network can be connected to your on-premises network through a [site-to-site VPN](../vpn-gateway/tutorial-site-to-site-portal.md). In this network topology, your app can connect to on-premises resources like it connects to other resources in the virtual network.
88
-
-*[App Service Environment](environment/intro.md) with a site-to-site VPN* - As described in [Resources inside an Azure virtual network](#resources-inside-an-azure-virtual-network), but in an App Service Environment, the virtual network can be connected to your on-premises network through a [site-to-site VPN](../vpn-gateway/tutorial-site-to-site-portal.md). In this network topology, your app can connect to on-premises resources like it connects to other resources in the virtual network.
86
+
-**[Hybrid connection](app-service-hybrid-connections.md)** - Use a hybrid connection to establish a point-to-point connection to your remote resource through a TCP tunnel. The TCP tunnel is established by using TLS 1.2 with shared access signature keys.
87
+
-**[Virtual network integration](./overview-vnet-integration.md) with a site-to-site VPN** - As described in [Resources inside an Azure virtual network](#resources-inside-an-azure-virtual-network), but in virtual network integration, the virtual network can be connected to your on-premises network through a [site-to-site VPN](../vpn-gateway/tutorial-site-to-site-portal.md). In this network topology, your app can connect to on-premises resources like it connects to other resources in the virtual network.
88
+
-**[App Service Environment](environment/intro.md) with a site-to-site VPN** - As described in [Resources inside an Azure virtual network](#resources-inside-an-azure-virtual-network), but in an App Service Environment, the virtual network can be connected to your on-premises network through a [site-to-site VPN](../vpn-gateway/tutorial-site-to-site-portal.md). In this network topology, your app can connect to on-premises resources like it connects to other resources in the virtual network.
89
89
90
90
## Application secrets
91
91
92
-
Don't store application secrets like database credentials, API tokens, and private keys in your code or configuration files. The commonly accepted approach is to access them as [environment variables](https://wikipedia.org/wiki/Environment_variable) by using the standard pattern in your language of choice. In App Service, the way to define environment variables is through [app settings](configure-common.md#configure-app-settings) (and, especially for .NET applications, [connection strings](configure-common.md#configure-connection-strings)). App settings and connection strings are stored encrypted in Azure, and they're decrypted only before they're injected into your app's process memory when the app starts. The encryption keys are rotated regularly.
92
+
Don't store application secrets like database credentials, API tokens, and private keys in your code or configuration files. The commonly accepted approach is to access them as [environment variables](https://wikipedia.org/wiki/Environment_variable) by using the standard pattern in your language of choice. In App Service, the way to define environment variables is through [app settings](configure-common.md#configure-app-settings) (and, especially for .NET applications, [connection strings](configure-common.md#configure-connection-strings)). App settings and connection strings are stored encrypted in Azure. They're decrypted only before they're injected into your app's process memory when the app starts. The encryption keys are rotated regularly.
93
93
94
-
Alternatively, you can integrate your App Service app with [Azure Key Vault](/azure/key-vault/) for advanced secrets management. By [accessing the key vault with a managed identity](/azure/key-vault/general/tutorial-net-create-vault-azure-web-app), your App Service app can securely access the secrets you need.
94
+
Alternatively, you can integrate your App Service app with [Azure Key Vault](/azure/key-vault/) for advanced secrets management. By [accessing the key vault by using a managed identity](/azure/key-vault/general/tutorial-net-create-vault-azure-web-app), your App Service app can securely access the secrets you need.
95
95
96
96
## Network isolation
97
97
98
-
Except for the **Isolated** pricing tier, all tiers run your apps on the shared network infrastructure in App Service. For example, the public IP addresses and front-end load balancers are shared with other tenants. The **Isolated** tier gives you complete network isolation by running your apps inside a dedicated [App Service Environment](environment/intro.md). An App Service Environment runs in your own instance of [Azure Virtual Network](../virtual-network/index.yml).
98
+
Except for the **Isolated** pricing tier, all tiers run your apps on the shared network infrastructure in App Service. For example, the public IP addresses and front-end load balancers are shared with other tenants. The Isolated tier gives you complete network isolation by running your apps inside a dedicated [App Service Environment](environment/intro.md). An App Service Environment runs in your own instance of [Azure Virtual Network](../virtual-network/index.yml).
99
99
100
100
You can:
101
101
102
102
- Serve your apps through a dedicated public endpoint, with dedicated front ends.
103
103
- Serve internal application by using an internal load balancer (ILB), which allows access only from inside your Azure virtual network. The ILB has an IP address from your private subnet, which provides total isolation of your apps from the internet.
104
-
-[Use an ILB behind a web application firewall (WAF)](environment/integrate-with-application-gateway.md). The WAF offers enterprise-level protection to your public-facing applications, such as protection from Distributed Denial-of-Service (DDoS) attacks, URI filtering, and preventing SQL injection.
104
+
-[Use an ILB behind a web application firewall (WAF)](environment/integrate-with-application-gateway.md). The WAF offers enterprise-level protection to your public-facing applications, such as protection from distributed denial-of-service (DDoS), URI filtering, and SQL injection.
Copy file name to clipboardExpand all lines: articles/app-service/overview-tls.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: TLS and SSL overview
2
+
title: TLS and SSL Overview
3
3
description: Learn how TLS and SSL work in Azure App Service, including TLS version support, certificate management, bindings, and mutual authentication to protect web app traffic.
0 commit comments