You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## <aname="peer-to-peer-encryption"></a> Peer-to-peer encryption in the Azure Container Apps environment
282
282
283
-
Azure Container Apps supports environment level network encryption using mutual transport layer security (mTLS). When end-to-end encryption is required, mTLS encrypts data transmitted between applications within an environment.
283
+
Azure Container Apps supports peer-to-peer TLS encryption within the environment. Enabling this feature encrypts all network traffic within the environment with a private certificate that is valid within the Azure Container Apps environment scope. These certificates are automatically managed by Azure Container Apps.
284
284
285
-
Applications within a Container Apps environment are automatically authenticated. However, the Container Apps runtime doesn't support authorization for access control between applications using the built-in mTLS.
285
+
Below is an example ingress pattern for an environment with peer-to-peer encryption enabled.
286
+
287
+
:::image type="content" source="media/networking/peer-to-peer-encryption-traffic-diagram.png" alt-text="Diagram of how traffic is encrypted/decrypted with peer-to-peer encryption enabled.":::
288
+
289
+
Applications within a Container Apps environment are automatically authenticated. However, the Container Apps runtime doesn't support authorization for access control between applications using the built-in peer-to-peer encryption.
286
290
287
291
When your apps are communicating with a client outside of the environment, two-way authentication with mTLS is supported. To learn more, see [configure client certificates](client-certificate-authorization.md).
288
292
289
293
> [!NOTE]
290
-
> Enabling mTLS for your applications may increase response latency and reduce maximum throughput in high-load scenarios.
294
+
> By default, peer-to-peer encryption is disabled. Enabling peer-to-peer encryption for your applications may increase response latency and reduce maximum throughput in high-load scenarios.
291
295
292
296
# [Azure CLI](#tab/azure-cli)
293
297
294
-
You can enable mTLS using the following commands.
298
+
You can enable peer-to-peer encryption using the following commands.
295
299
296
300
On create:
297
301
@@ -300,7 +304,7 @@ az containerapp env create \
300
304
--name <environment-name> \
301
305
--resource-group <resource-group> \
302
306
--location <location> \
303
-
--enable-mtls
307
+
--enable-peer-to-peer-encryption
304
308
```
305
309
306
310
For an existing container app:
@@ -309,7 +313,7 @@ For an existing container app:
309
313
az containerapp env update \
310
314
--name <environment-name> \
311
315
--resource-group <resource-group> \
312
-
--enable-mtls
316
+
--enable-peer-to-peer-encryption
313
317
```
314
318
315
319
# [ARM template](#tab/arm-template)
@@ -320,8 +324,8 @@ You can enable mTLS in the ARM template for Container Apps environments using th
0 commit comments