You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-apps/ingress-overview.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,8 +96,9 @@ Container Apps supports IP restrictions for ingress. You can create rules to eit
96
96
97
97
Azure Container Apps provides built-in authentication and authorization features to secure your external ingress-enabled container app. For more information, see [Authentication and authorization in Azure Container Apps](authentication.md).
98
98
99
-
You can configure your app to support client certificates (mTLS) for authentication and traffic encryption. For more information, see [Configure client certificates](client-certificate-authorization.md)
99
+
You can configure your app to support client certificates (mTLS) for authentication and traffic encryption. For more information, see [Configure client certificates](client-certificate-authorization.md).
100
100
101
+
For details on how to use mTLS for environment level network encryption, see the [networking overview](./networking.md#mtls).
Copy file name to clipboardExpand all lines: articles/container-apps/network-proxy.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,10 +33,9 @@ Requests that come in to ports `80` and `443` are internally routed to the appro
33
33
## Security
34
34
35
35
- HTTP requests are automatically redirected to HTTPs
36
-
- Envoy terminates TLS after crossing its boundary
37
-
- Envoy sends requests to apps over HTTP in plain text
38
-
- mTLS is only available when using Dapr
39
-
- When you use Dapr service invocation APIs, mTLS is enabled. However, because Envoy terminates mTLS, inbound calls from Envoy to Dapr-enabled container apps isn't encrypted.
36
+
- You can disable this by setting `allowInsecure` to `true` in the ingress configuration
37
+
- TLS terminates at the ingress
38
+
- You can enable [Environment level network encryption](networking.md#mtls) for full end-to-end encryption for requests between the ingress and an app and between different apps
40
39
41
40
HTTPs, GRPC, and HTTP/2 all follow the same architectural model.
Azure Container Apps supports environment level network encryption using mutual transport layer security (mTLS). When end-to-end encryption is required, mTLS will encrypt data transmitted between applications within an environment. Applications within a Container Apps environment are automatically authenticated. However, Container Apps currently does not support authorization for access control between applications using the built-in mTLS.
210
+
211
+
When your apps are communicating with a client outside of the environment, two-way authentication with mTLS is supported, to learn more see [configure client certificates](client-certificate-authorization.md).
212
+
213
+
> [!NOTE]
214
+
> Enabling mTLS for your applications may increase response latency and reduce maximum throughput in high-load scenarios.
215
+
216
+
# [Azure CLI](#tab/azure-cli)
217
+
218
+
You can enable mTLS using the following commands.
219
+
220
+
On create:
221
+
```azurecli
222
+
az containerapp env create \
223
+
--name <environment-name> \
224
+
--resource-group <resource-group> \
225
+
--location <location> \
226
+
--enable-mtls
227
+
```
228
+
229
+
For an existing container app:
230
+
```azurecli
231
+
az containerapp env update \
232
+
--name <environment-name> \
233
+
--resource-group <resource-group> \
234
+
--enable-mtls
235
+
```
236
+
237
+
# [ARM template](#tab/arm-template)
238
+
239
+
You can enable mTLS in the ARM template for Container Apps environments using the following configuration.
240
+
241
+
```json
242
+
{
243
+
...
244
+
"properties": {
245
+
"peerAuthentication":{
246
+
"mtls": {
247
+
"enabled": "true|false"
248
+
}
249
+
}
250
+
...
251
+
}
252
+
```
253
+
---
254
+
207
255
## DNS
208
256
209
257
- **Custom DNS**: If your VNet uses a custom DNS server instead of the default Azure-provided DNS server, configure your DNS server to forward unresolved DNS queries to `168.63.129.16`. [Azure recursive resolvers](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) uses this IP address to resolve requests. When configuring your NSG or Firewall, don't block the `168.63.129.16` address, otherwise, your Container Apps environment won't function.
0 commit comments