Skip to content

Commit b3d8de1

Browse files
committed
init peer-to-peer encryption
1 parent 6149c04 commit b3d8de1

File tree

2 files changed

+13
-9
lines changed

2 files changed

+13
-9
lines changed
83.2 KB
Loading

articles/container-apps/networking.md

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -278,20 +278,24 @@ You can fully secure your ingress and egress networking traffic workload profile
278278

279279
- Configure UDR to route all traffic through [Azure Firewall](./user-defined-routes.md).
280280

281-
## <a name="mtls"></a> Environment level network encryption (preview)
281+
## <a name="peer-to-peer-encryption"></a> Peer-to-peer encryption in the Azure Container Apps environment
282282

283-
Azure Container Apps supports environment level network encryption using mutual transport layer security (mTLS). When end-to-end encryption is required, mTLS encrypts data transmitted between applications within an environment.
283+
Azure Container Apps supports peer-to-peer TLS encryption within the environment. Enabling this feature encrypts all network traffic within the environment with a private certificate that is valid within the Azure Container Apps environment scope. These certificates are automatically managed by Azure Container Apps.
284284

285-
Applications within a Container Apps environment are automatically authenticated. However, the Container Apps runtime doesn't support authorization for access control between applications using the built-in mTLS.
285+
Below is an example ingress pattern for an environment with peer-to-peer encryption enabled.
286+
287+
:::image type="content" source="media/networking/peer-to-peer-encryption-traffic-diagram.png" alt-text="Diagram of how traffic is encrypted/decrypted with peer-to-peer encryption enabled.":::
288+
289+
Applications within a Container Apps environment are automatically authenticated. However, the Container Apps runtime doesn't support authorization for access control between applications using the built-in peer-to-peer encryption.
286290

287291
When your apps are communicating with a client outside of the environment, two-way authentication with mTLS is supported. To learn more, see [configure client certificates](client-certificate-authorization.md).
288292

289293
> [!NOTE]
290-
> Enabling mTLS for your applications may increase response latency and reduce maximum throughput in high-load scenarios.
294+
> By default, peer-to-peer encryption is disabled. Enabling peer-to-peer encryption for your applications may increase response latency and reduce maximum throughput in high-load scenarios.
291295
292296
# [Azure CLI](#tab/azure-cli)
293297

294-
You can enable mTLS using the following commands.
298+
You can enable peer-to-peer encryption using the following commands.
295299

296300
On create:
297301

@@ -300,7 +304,7 @@ az containerapp env create \
300304
--name <environment-name> \
301305
--resource-group <resource-group> \
302306
--location <location> \
303-
--enable-mtls
307+
--enable-peer-to-peer-encryption
304308
```
305309

306310
For an existing container app:
@@ -309,7 +313,7 @@ For an existing container app:
309313
az containerapp env update \
310314
--name <environment-name> \
311315
--resource-group <resource-group> \
312-
--enable-mtls
316+
--enable-peer-to-peer-encryption
313317
```
314318

315319
# [ARM template](#tab/arm-template)
@@ -320,8 +324,8 @@ You can enable mTLS in the ARM template for Container Apps environments using th
320324
{
321325
...
322326
"properties": {
323-
"peerAuthentication":{
324-
"mtls": {
327+
"peerTrafficConfiguration":{
328+
"encryption": {
325329
"enabled": "true|false"
326330
}
327331
}

0 commit comments

Comments
 (0)