Skip to content

Commit bbf026d

Browse files
committed
Update how-to-enable-end-to-end-tls.md to add new ingress-to-app info
1 parent 0e3d080 commit bbf026d

File tree

1 file changed

+18
-15
lines changed

1 file changed

+18
-15
lines changed

articles/spring-cloud/how-to-enable-ingress-to-app-tls.md

Lines changed: 18 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,41 +1,43 @@
11
---
2-
title: Enable ingress-to-app Transport Layer Security
2+
title: Enable ingress-to-app Transport Layer Security in Azure Spring Cloud
33
titleSuffix: Azure Spring Cloud
44
description: How to enable ingress-to-app Transport Layer Security for an application.
5-
author: Descatles
5+
author: karlerickson
66
ms.author: wenhaozhang
77
ms.service: spring-cloud
88
ms.topic: how-to
9-
ms.date: 01/19/2022
9+
ms.date: 04/12/2022
1010
ms.custom: devx-track-java
1111
---
1212
# Enable ingress-to-app TLS for an application
1313

1414
**This article applies to:** ✔️ Basic/Standard tier ✔️ Enterprise tier
1515

16-
This article describes what the secure communication of Azure Spring Cloud like and the following picture shows the overall secure communication support in Azure Spring Cloud.
16+
This article describes secure communications in Azure Spring Cloud, and how to enable ingress-to-app SSL/TLS to secure traffic from an ingress controller to applications that support HTTPS.
1717

18-
![Graph of communications secured by TLS.](media/enable-end-to-end-tls/secured-tls.png)
18+
The following picture shows the overall secure communication support in Azure Spring Cloud.
19+
20+
![Secured TLS in Azure Spring Cloud diagram.](media/enable-end-to-end-tls/secured-tls.png)
1921

2022
## Secure communication model within Azure Spring Cloud
2123

22-
Here we would explain the secure communication model in Azure spring cloud in detail according to the overview picture.
24+
This section explains the secure communication model shown in the overview diagram above.
2325

24-
1. Client request either from mobile or Browser or other clients to azure spring cloud apps would first come into the ingress controller. By default, the request could be either HTTP or HTTPS and the TLS certificate returned by ingress controller is issued by Microsoft Azure TLS issuing CA.
26+
1. The client request from the client to the application in Azure Spring Cloud comes into the ingress controller. The request can be either HTTP or HTTPS. The TLS certificate returned by the ingress controller is issued by the Microsoft Azure TLS issuing CA.
2527

26-
If the app has been mapped to an existing custom domain and is configured as HTTPS only, the request to the ingress controller could only be HTTPS and the TLS certificate returned by ingress controller is the SSL binding certificate for that custom domain. The server side SSL/TLS verification for custom domain is accomplished in ingress controller.
28+
If the app has been mapped to an existing custom domain and is configured as HTTPS only, the request to the ingress controller can only be HTTPS and the TLS certificate returned by the ingress controller is the SSL binding certificate for that custom domain. The server side SSL/TLS verification for the custom domain is done in the ingress controller.
2729

28-
2. The secure communication between ingress controller and azure spring cloud applications is controlled by ingress-to-app TLS. This could be controlled by customers through portal or cli, and we would explain the way to enable it in this article later. If ingress-to-app TLS is disabled, the communication between ingress controller and azure spring cloud apps is HTTP and it would be HTTPS if the ingress-to-app TLS is enabled. This has no relation to the communication way from clients to ingress controller and the ingress controller would not verify the certificate returned from azure spring cloud apps because the ingress-to-app TLS is just meant to encrypt the communication as not to be visible to anyone including Microsoft.
30+
2. The secure communication between the ingress controller and the applicaitons in Azure Spring Cloud are controlled by the ingress-to-app TLS. This can also controlled by customers through portal or cli, and will be explained later in this article. If ingress-to-app TLS is disabled, the communication between the ingress controller and the apps in Azure Spring Cloud is HTTP. If ingress-to-app TLS is enabled, the communication will be HTTPS. This has no relation to the communication between the clients and the ingress controller. The ingress controller will not verify the certificate returned from the apps because the ingress-to-app TLS encrypts the communication and is not visible to anyone including Microsoft.
2931

30-
3. Communication between Azure Spring Cloud applications and Azure Spring Cloud service runtime like config server, service registry and eureka server is always HTTPS and it is fully took care of by Azure Spring Cloud. Customers do not need to concern about them.
32+
3. Communication between the apps and the Azure Spring Cloud services such as config server, service registry, and Eureka server is always HTTPS and is handled by Azure Spring Cloud.
3133

32-
4. The communication between Azure Spring Cloud applications is fully managed by customers, and customers could also take the convenience of Azure Spring Cloud provided feature [Use TLS/SSL certificates in an application](./how-to-use-tls-certificate.md) to load certificates into application's trust store.
34+
4. You manage the communication between the applications. You can also take advantage of Azure Spring Cloud features to load certificates into the application's trust store. See [Use TLS/SSL certificates in an application](./how-to-use-tls-certificate.md) for more information.
3335

34-
5. The communication between azure spring cloud applications and external service is fully managed by customers, too. To reduce customer's developing effort, Azure Spring Cloud provides a convenient way to help customers manage their public certificates and load them into application's trust store. Follow this could [Use TLS/SSL certificates in an application](./how-to-use-tls-certificate.md) to use this feature.
36+
5. You manage the communication between applications and external services. To reduce your developing effort, Azure Spring Cloud helps youmanage your public certificates and load them into application's trust store. See [Use TLS/SSL certificates in an application](./how-to-use-tls-certificate.md) for more information.
3537

3638
## Enable ingress-to-app TLS for an application
3739

38-
The following part of this article shows how to enable ingress-to-app SSL/TLS to secure traffic from an ingress controller to applications that support HTTPS.
40+
The following section shows you how to enable ingress-to-app SSL/TLS to secure traffic from an ingress controller to applications that support HTTPS.
3941

4042
### Prerequisites
4143

@@ -52,7 +54,7 @@ az spring-cloud app update --enable-ingress-to-app-tls -n app_name -s service_na
5254
az spring-cloud app update --enable-ingress-to-app-tls false -n app_name -s service_name -g resource_group_name
5355
```
5456

55-
### Enable ingress-to-app TLS when you bind custom domain
57+
### Enable ingress-to-app TLS when you bind a custom domain
5658

5759
Use the command `az spring-cloud app custom-domain update --enable-ingress-to-app-tls` or `az spring-cloud app custom-domain bind --enable-ingress-to-app-tls` to enable or disable ingress-to-app TLS for an app.
5860

@@ -61,7 +63,8 @@ az spring-cloud app custom-domain update --enable-ingress-to-app-tls -n app_name
6163
az spring-cloud app custom-domain bind --enable-ingress-to-app-tls -n app_name -s service_name -g resource_group_name
6264
```
6365

64-
### Enable ingress-to-app TLS using Azure portal
66+
### Enable ingress-to-app TLS using the Azure portal
67+
6568
To enable ingress-to-app TLS in the [Azure portal](https://portal.azure.com/), first create an app, and then enable the feature.
6669

6770
1. Create an app in the portal as you normally would. Navigate to it in the portal.

0 commit comments

Comments
 (0)