You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/key-vault-certs.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: SSL termination with Azure Key Vault certificates
2
+
title: TLS termination with Azure Key Vault certificates
3
3
description: Learn how you can integrate Azure Application Gateway with Key Vault for server certificates that are attached to HTTPS-enabled listeners.
4
4
services: application-gateway
5
5
author: vhorne
@@ -9,25 +9,25 @@ ms.date: 4/25/2019
9
9
ms.author: victorh
10
10
---
11
11
12
-
# SSL termination with Key Vault certificates
12
+
# TLS termination with Key Vault certificates
13
13
14
-
[Azure Key Vault](../key-vault/key-vault-overview.md) is a platform-managed secret store that you can use to safeguard secrets, keys, and SSL certificates. Azure Application Gateway supports integration with Key Vault for server certificates that are attached to HTTPS-enabled listeners. This support is limited to the v2 SKU of Application Gateway.
14
+
[Azure Key Vault](../key-vault/key-vault-overview.md) is a platform-managed secret store that you can use to safeguard secrets, keys, and TLS/SSL certificates. Azure Application Gateway supports integration with Key Vault for server certificates that are attached to HTTPS-enabled listeners. This support is limited to the v2 SKU of Application Gateway.
15
15
16
-
Key Vault integration offers two models for SSL termination:
16
+
Key Vault integration offers two models for TLS termination:
17
17
18
-
- You can explicitly provide SSL certificates attached to the listener. This model is the traditional way to pass SSL certificates to Application Gateway for SSL termination.
18
+
- You can explicitly provide TLS/SSL certificates attached to the listener. This model is the traditional way to pass TLS/SSL certificates to Application Gateway for TLS termination.
19
19
- You can optionally provide a reference to an existing Key Vault certificate or secret when you create an HTTPS-enabled listener.
20
20
21
21
Application Gateway integration with Key Vault offers many benefits, including:
22
22
23
-
- Stronger security, because SSL certificates aren't directly handled by the application development team. Integration allows a separate security team to:
23
+
- Stronger security, because TLS/SSL certificates aren't directly handled by the application development team. Integration allows a separate security team to:
24
24
* Set up application gateways.
25
25
* Control application gateway lifecycles.
26
26
* Grant permissions to selected application gateways to access certificates that are stored in your key vault.
27
27
- Support for importing existing certificates into your key vault. Or use Key Vault APIs to create and manage new certificates with any of the trusted Key Vault partners.
28
28
- Support for automatic renewal of certificates that are stored in your key vault.
29
29
30
-
Application Gateway currently supports software-validated certificates only. Hardware security module (HSM)-validated certificates are not supported. After Application Gateway is configured to use Key Vault certificates, its instances retrieve the certificate from Key Vault and install them locally for SSL termination. The instances also poll Key Vault at 24-hour intervals to retrieve a renewed version of the certificate, if it exists. If an updated certificate is found, the SSL certificate currently associated with the HTTPS listener is automatically rotated.
30
+
Application Gateway currently supports software-validated certificates only. Hardware security module (HSM)-validated certificates are not supported. After Application Gateway is configured to use Key Vault certificates, its instances retrieve the certificate from Key Vault and install them locally for TLS termination. The instances also poll Key Vault at 24-hour intervals to retrieve a renewed version of the certificate, if it exists. If an updated certificate is found, the TLS/SSL certificate currently associated with the HTTPS listener is automatically rotated.
31
31
32
32
> [!NOTE]
33
33
> The Azure portal only supports KeyVault Certificates, not secrets. Application Gateway still supports referencing secrets from KeyVault, but only through non-Portal resources like PowerShell, CLI, API, ARM templates, etc.
@@ -46,10 +46,10 @@ Application Gateway integration with Key Vault requires a three-step configurati
46
46
47
47
1.**Configure the application gateway**
48
48
49
-
After you complete the two preceding steps, you can set up or modify an existing application gateway to use the user-assigned managed identity. You can also configure the HTTP listener’s SSL certificate to point to the complete URI of the Key Vault certificate or secret ID.
49
+
After you complete the two preceding steps, you can set up or modify an existing application gateway to use the user-assigned managed identity. You can also configure the HTTP listener’s TLS/SSL certificate to point to the complete URI of the Key Vault certificate or secret ID.
Copy file name to clipboardExpand all lines: articles/application-gateway/migrate-v1-v2.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ An Azure PowerShell script is available that does the following:
31
31
32
32
* The new v2 gateway has new public and private IP addresses. It isn't possible to move the IP addresses associated with the existing v1 gateway seamlessly to v2. However, you can allocate an existing (unallocated) public or private IP address to the new v2 gateway.
33
33
* You must provide an IP address space for another subnet within your virtual network where your v1 gateway is located. The script can't create the v2 gateway in any existing subnets that already have a v1 gateway. However, if the existing subnet already has a v2 gateway, that may still work provided there's enough IP address space.
34
-
* To migrate an SSL configuration, you must specify all the SSL certs used in your v1 gateway.
34
+
* To migrate a TLS/SSL configuration, you must specify all the TLS/SSL certs used in your v1 gateway.
35
35
* If you have FIPS mode enabled for your V1 gateway, it won't be migrated to your new v2 gateway. FIPS mode isn't supported in v2.
36
36
* v2 doesn't support IPv6, so IPv6 enabled v1 gateways aren't migrated. If you run the script, it may not complete.
37
37
* If the v1 gateway has only a private IP address, the script creates a public IP address and a private IP address for the new v2 gateway. v2 gateways currently don't support only private IP addresses.
@@ -96,7 +96,7 @@ To run the script:
96
96
97
97
* **subnetAddressRange: [String]: Required** - This is the IP address space that you've allocated (or want to allocate) for a new subnet that contains your new v2 gateway. This must be specified in the CIDR notation. For example: 10.0.0.0/24. You don't need to create this subnet in advance. The script creates it for you if it doesn't exist.
98
98
* **appgwName: [String]: Optional**. This is a string you specify to use as the name for the new Standard_v2 or WAF_v2 gateway. If this parameter isn't supplied, the name of your existing v1 gateway will be used with the suffix *_v2* appended.
99
-
* **sslCertificates: [PSApplicationGatewaySslCertificate]: Optional**. A comma-separated list of PSApplicationGatewaySslCertificate objects that you create to represent the SSL certs from your v1 gateway must be uploaded to the new v2 gateway. For each of your SSL certs configured for your Standard v1 or WAF v1 gateway, you can create a new PSApplicationGatewaySslCertificate object via the `New-AzApplicationGatewaySslCertificate` command shown here. You need the path to your SSL Cert file and the password.
99
+
* **sslCertificates: [PSApplicationGatewaySslCertificate]: Optional**. A comma-separated list of PSApplicationGatewaySslCertificate objects that you create to represent the TLS/SSL certs from your v1 gateway must be uploaded to the new v2 gateway. For each of your TLS/SSL certs configured for your Standard v1 or WAF v1 gateway, you can create a new PSApplicationGatewaySslCertificate object via the `New-AzApplicationGatewaySslCertificate` command shown here. You need the path to your TLS/SSL Cert file and the password.
100
100
101
101
This parameter is only optional if you don't have HTTPS listeners configured for your v1 gateway or WAF. If you have at least one HTTPS listener setup, you must specify this parameter.
Copy file name to clipboardExpand all lines: articles/application-gateway/redirect-http-to-https-cli.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: HTTP to HTTPS redirection using CLI
3
3
titleSuffix: Azure Application Gateway
4
-
description: Learn how to create an application gateway and add a certificate for SSL termination using the Azure CLI.
4
+
description: Learn how to create an application gateway and add a certificate for TLS termination using the Azure CLI.
5
5
services: application-gateway
6
6
author: vhorne
7
7
ms.service: application-gateway
@@ -12,7 +12,7 @@ ms.author: victorh
12
12
13
13
# Create an application gateway with HTTP to HTTPS redirection using the Azure CLI
14
14
15
-
You can use the Azure CLI to create an [application gateway](overview.md) with a certificate for SSL termination. A routing rule is used to redirect HTTP traffic to the HTTPS port in your application gateway. In this example, you also create a [virtual machine scale set](../virtual-machine-scale-sets/virtual-machine-scale-sets-overview.md) for the backend pool of the application gateway that contains two virtual machine instances.
15
+
You can use the Azure CLI to create an [application gateway](overview.md) with a certificate for TLS/SSL termination. A routing rule is used to redirect HTTP traffic to the HTTPS port in your application gateway. In this example, you also create a [virtual machine scale set](../virtual-machine-scale-sets/virtual-machine-scale-sets-overview.md) for the backend pool of the application gateway that contains two virtual machine instances.
Copy file name to clipboardExpand all lines: articles/application-gateway/redirect-http-to-https-portal.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.author: victorh
11
11
---
12
12
# Create an application gateway with HTTP to HTTPS redirection using the Azure portal
13
13
14
-
You can use the Azure portal to create an [application gateway](overview.md) with a certificate for SSL termination. A routing rule is used to redirect HTTP traffic to the HTTPS port in your application gateway. In this example, you also create a [virtual machine scale set](../virtual-machine-scale-sets/virtual-machine-scale-sets-overview.md) for the backend pool of the application gateway that contains two virtual machine instances.
14
+
You can use the Azure portal to create an [application gateway](overview.md) with a certificate for TLS termination. A routing rule is used to redirect HTTP traffic to the HTTPS port in your application gateway. In this example, you also create a [virtual machine scale set](../virtual-machine-scale-sets/virtual-machine-scale-sets-overview.md) for the backend pool of the application gateway that contains two virtual machine instances.
Copy file name to clipboardExpand all lines: articles/application-gateway/redirect-http-to-https-powershell.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.author: victorh
11
11
12
12
# Create an application gateway with HTTP to HTTPS redirection using Azure PowerShell
13
13
14
-
You can use the Azure PowerShell to create an [application gateway](overview.md) with a certificate for SSL termination. A routing rule is used to redirect HTTP traffic to the HTTPS port in your application gateway. In this example, you also create a [virtual machine scale set](../virtual-machine-scale-sets/virtual-machine-scale-sets-overview.md) for the backend pool of the application gateway that contains two virtual machine instances.
14
+
You can use the Azure PowerShell to create an [application gateway](overview.md) with a certificate for TLS/SSL termination. A routing rule is used to redirect HTTP traffic to the HTTPS port in your application gateway. In this example, you also create a [virtual machine scale set](../virtual-machine-scale-sets/virtual-machine-scale-sets-overview.md) for the backend pool of the application gateway that contains two virtual machine instances.
Copy file name to clipboardExpand all lines: articles/application-gateway/self-signed-certificates.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,9 @@ ms.author: victorh
12
12
13
13
# Generate an Azure Application Gateway self-signed certificate with a custom root CA
14
14
15
-
The Application Gateway v2 SKU introduces the use of Trusted Root Certificates to allow backend servers. This removes authentication certificates that were required in the v1 SKU. The *root certificate* is a Base-64 encoded X.509(.CER) format root certificate from the backend certificate server. It identifies the root certificate authority (CA) that issued the server certificate and the server certificate is then used for the SSL communication.
15
+
The Application Gateway v2 SKU introduces the use of Trusted Root Certificates to allow backend servers. This removes authentication certificates that were required in the v1 SKU. The *root certificate* is a Base-64 encoded X.509(.CER) format root certificate from the backend certificate server. It identifies the root certificate authority (CA) that issued the server certificate and the server certificate is then used for the TLS/SSL communication.
16
16
17
-
Application Gateway trusts your website's certificate by default if it's signed by a well-known CA (for example, GoDaddy or DigiCert). You don't need to explicitly upload the root certificate in that case. For more information, see [Overview of SSL termination and end to end SSL with Application Gateway](ssl-overview.md). However, if you have a dev/test environment and don't want to purchase a verified CA signed certificate, you can create your own custom CA and create a self-signed certificate with it.
17
+
Application Gateway trusts your website's certificate by default if it's signed by a well-known CA (for example, GoDaddy or DigiCert). You don't need to explicitly upload the root certificate in that case. For more information, see [Overview of TLS termination and end to end TLS with Application Gateway](ssl-overview.md). However, if you have a dev/test environment and don't want to purchase a verified CA signed certificate, you can create your own custom CA and create a self-signed certificate with it.
18
18
19
19
> [!NOTE]
20
20
> Self-signed certificates are not trusted by default and they can be difficult to maintain. Also, they may use outdated hash and cipher suites that may not be strong. For better security, purchase a certificate signed by a well-known certificate authority.
@@ -120,15 +120,15 @@ The CSR is a public key that is given to a CA when requesting a certificate. The
120
120
- fabrikam.crt
121
121
- fabrikam.key
122
122
123
-
## Configure the certificate in your web server's SSL settings
123
+
## Configure the certificate in your web server's TLS settings
124
124
125
-
In your web server, configure SSL using the fabrikam.crt and fabrikam.key files. If your web server can't take two files, you can combine them to a single .pem or .pfx file using OpenSSL commands.
125
+
In your web server, configure TLS using the fabrikam.crt and fabrikam.key files. If your web server can't take two files, you can combine them to a single .pem or .pfx file using OpenSSL commands.
126
126
127
127
### IIS
128
128
129
129
For instructions on how to import certificate and upload them as server certificate on IIS, see [HOW TO: Install Imported Certificates on a Web Server in Windows Server 2003](https://support.microsoft.com/help/816794/how-to-install-imported-certificates-on-a-web-server-in-windows-server).
130
130
131
-
For SSL binding instructions, see [How to Set Up SSL on IIS 7](https://docs.microsoft.com/iis/manage/configuring-security/how-to-set-up-ssl-on-iis#create-an-ssl-binding-1).
131
+
For TLS binding instructions, see [How to Set Up SSL on IIS 7](https://docs.microsoft.com/iis/manage/configuring-security/how-to-set-up-ssl-on-iis#create-an-ssl-binding-1).
132
132
133
133
### Apache
134
134
@@ -146,9 +146,9 @@ The following configuration is an example [virtual host configured for SSL](http
146
146
147
147
### NGINX
148
148
149
-
The following configuration is an example [NGINX server block](https://nginx.org/docs/http/configuring_https_servers.html) with SSL configuration:
149
+
The following configuration is an example [NGINX server block](https://nginx.org/docs/http/configuring_https_servers.html) with TLS configuration:
150
150
151
-

151
+

Copy file name to clipboardExpand all lines: articles/application-gateway/tutorial-ssl-cli.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: SSL termination using CLI - Azure Application Gateway
3
-
description: Learn how to create an application gateway and add a certificate for SSL termination using the Azure CLI.
2
+
title: TLS termination using CLI - Azure Application Gateway
3
+
description: Learn how to create an application gateway and add a certificate for TLS termination using the Azure CLI.
4
4
services: application-gateway
5
5
author: vhorne
6
6
ms.service: application-gateway
@@ -10,9 +10,9 @@ ms.author: victorh
10
10
ms.custom: mvc
11
11
---
12
12
13
-
# Create an application gateway with SSL termination using the Azure CLI
13
+
# Create an application gateway with TLS termination using the Azure CLI
14
14
15
-
You can use the Azure CLI to create an [application gateway](overview.md) with a certificate for [SSL termination](ssl-overview.md). For backend servers, you can use a [virtual machine scale set](../virtual-machine-scale-sets/virtual-machine-scale-sets-overview.md) . In this example, the scale set contains two virtual machine instances that are added to the default backend pool of the application gateway.
15
+
You can use the Azure CLI to create an [application gateway](overview.md) with a certificate for [TLS termination](ssl-overview.md). For backend servers, you can use a [virtual machine scale set](../virtual-machine-scale-sets/virtual-machine-scale-sets-overview.md) . In this example, the scale set contains two virtual machine instances that are added to the default backend pool of the application gateway.
0 commit comments