Skip to content

Commit dc08e34

Browse files
authored
Fixed warnings and added more info
1 parent 30ea095 commit dc08e34

File tree

1 file changed

+35
-36
lines changed

1 file changed

+35
-36
lines changed

articles/app-service/app-service-managed-certificate-changes-july-2025.md

Lines changed: 35 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.date: 07/28/2025
1414

1515
Starting July 28, 2025, Azure App Service Managed Certificates (ASMC) are subject to new issuance and renewal requirements due to DigiCert’s migration to a new validation platform. This change is driven by industry-wide compliance with Multi-Perspective Issuance Corroboration (MPIC).
1616

17-
For a detailed explanation of the underlying changes at DigiCert, refer to [changes to the managed TLS feature](https://learn.microsoft.com/azure/security/fundamentals/managed-tls-changes).
17+
For a detailed explanation of the underlying changes at DigiCert, refer to [changes to the managed TLS feature](../security/fundamentals/managed-tls-changes.md).
1818

1919
## What’s changing
2020

@@ -27,7 +27,7 @@ For a detailed explanation of the underlying changes at DigiCert, refer to [chan
2727
- No customer action is needed to place or manage the token.
2828

2929
> [!IMPORTANT]
30-
> While App Service continues to handle token placement automatically during renewals, DigiCert must still reach the validation endpoint on your app. Public access is still required at the time of renewal. If your app is not publicly accessible, renewal will fail even if the token is correctly placed.
30+
> While App Service continues to handle token placement automatically during renewals, DigiCert must still reach the validation endpoint on your app. Public access is still required at the time of renewal. If your app is not publicly accessible, renewal fails even if the token is correctly placed.
3131
3232
## Impacted scenarios
3333

@@ -37,7 +37,7 @@ You will not be able to create or renew ASMCs if:
3737
- You use Azure Traffic Manager with nested or external endpoints.
3838
- You rely on `*.trafficmanager.net` domains.
3939

40-
Existing certificates will remain valid until expiration (up to 6 months), but will not renew automatically if your configuration is unsupported.
40+
Existing certificates remain valid until expiration (up to 6 months), but will not renew automatically if your configuration is unsupported.
4141

4242
## Mitigation guidance
4343

@@ -55,17 +55,16 @@ We recognize that making applications publicly accessible may conflict with cust
5555
2. **Add the certificate to the site**
5656
After acquiring a certificate for your custom domain, you need to upload it to your App Service app and configure it for use. After acquiring a certificate for your custom domain, you need to upload it to your App Service app and configure it for use.
5757
> [!TIP]
58-
> Ensure that you have [authorized App Service to read the certificates from Key vault](https://learn.microsoft.com/azure/app-service/configure-ssl-certificate?tabs=apex%2Crbac%2Cazure-cli#authorize-app-service-to-read-from-the-vault). Use the specific identity listed in the documentation and not the Managed Identity of the site.
59-
60-
- [REST API: Import KV certificate to site](https://learn.microsoft.com/rest/api/appservice/certificates/create-or-update?view=rest-appservice-2024-11-01&tabs=HTTP)
61-
- [CLI: Import KV certificate to site](https://learn.microsoft.com/cli/azure/webapp/config/ssl?view=azure-cli-latest#az-webapp-config-ssl-import)
58+
> Ensure that you have [authorized App Service to read the certificates from Key vault](configure-ssl-certificate.md#authorize-app-service-to-read-from-the-vault). Use the specific identity listed in the documentation and not the Managed Identity of the site.
59+
- [REST API: Import KV certificate to site](/rest/api/appservice/certificates/create-or-update)
60+
- [CLI: Import KV certificate to site](/cli/azure/webapp/config/ssl#az-webapp-config-ssl-import)
6261

6362
4. **Update the custom domain binding**
6463
> [!IMPORTANT]
6564
> **To avoid any service downtime, do not delete the TLS/SSL binding**. You can update the binding with the new certificate thumbprint or name that was added to the web app without deleting the current binding.
6665
67-
- [REST API: Update hostname binding](https://learn.microsoft.com/rest/api/appservice/web-apps/create-or-update-host-name-binding?view=rest-appservice-2024-11-01)
68-
- [CLI: Update hostname binding](https://learn.microsoft.com/cli/azure/webatest#az-webapp-config-ssl-bind)
66+
- [REST API: Update hostname binding](/rest/api/appservice/web-apps/create-or-update-host-name-binding)
67+
- [CLI: Update hostname binding](/cli/azure/webapp/config/ssl#az-webapp-config-ssl-bind)
6968

7069
5. **Remove other dependencies on ASMC**
7170

@@ -79,18 +78,20 @@ We recognize that making applications publicly accessible may conflict with cust
7978
After confirming that your environment or services no longer depend on ASMC, delete the ASMCs associated with your site.
8079
Deleting ASMCs helps prevent accidental reuse, which could result in service downtime when the certificate fails to renew.
8180

82-
- [REST API: Delete Certificate](https://learn.microsoft.com/rest/api/appservice/certificates/delete?view=rest-appservice-2024-11-01)
83-
- [CLI: Delete certificate](https://learn.microsoft.com/cli/azure/webapp/config/ssl?view=azure-cli-latest#az-webapp-config-ssl-delete)
84-
85-
7. **Temporary mitigation: DigiCert IP allowlisting**
86-
Some customers may choose to allowlist DigiCert’s domain validation IPs to temporarily bypass public access restrictions. This can help avoid downtime, but:
81+
- [REST API: Delete Certificate](/rest/api/appservice/certificates/delete)
82+
- [CLI: Delete certificate](/cli/azure/webapp/config/ssl#az-webapp-config-ssl-delete)
8783

88-
- Microsoft does not control DigiCert’s IPs.
89-
- DigiCert may change IPs without notice.
90-
- This workaround is not officially supported or documented by Microsoft.
91-
- Use at your own risk.
84+
**Temporary mitigation: DigiCert IP allowlisting**
85+
Some customers may choose to allowlist [DigiCert’s domain validation IPs](https://knowledge.digicert.com/alerts/ip-address-domain-validation) as a short-term workaround. This can help buy time to move away from using ASMC for websites that aren’t publicly accessible, especially given the short notice of the change.
86+
> [!NOTE]
87+
> This isn’t an official or supported long-term solution. Microsoft’s stance remains that **public access is required** to avoid potential service disruptions. Consider the following:
88+
>
89+
> - DigiCert manages its own IPs and may change them without notice.
90+
> - Microsoft doesn’t control DigiCert’s infrastructure and can’t guarantee the documentation will stay up to date.
91+
> - Microsoft doesn’t provide alerts if DigiCert updates its IPs.
92+
> - Use this approach at your own risk.
9293
93-
For guidance on configuring access restrictions, refer to [set up Azure App Service access restrictions](https://learn.microsoft.com/azure/app-service/app-service-ip-restrictions?tabs=bicep).
94+
For guidance on configuring access restrictions, refer to [set up Azure App Service access restrictions](app-service-ip-restrictions.md).
9495

9596
---
9697

@@ -101,21 +102,21 @@ Only “Azure Endpoints” are supported. “Nested” and “External” endpoi
101102
**Recommended mitigation:**
102103

103104
- Switch to Azure Endpoints or use a custom domain secured with a custom certificate.
104-
- For guidance on using App Service as an Azure Traffic Manager endpoint, refer to [App Service and Traffic Manager Profiles](https://learn.microsoft.com/azure/app-service/web-sites-traffic-manager#app-service-and-traffic-manager-profiles).
105+
- For guidance on using App Service as an Azure Traffic Manager endpoint, refer to [App Service and Traffic Manager Profiles](web-sites-traffic-manager#app-service-and-traffic-manager-profiles).
105106

106107
---
107108

108109
### Scenario 3: Use of trafficmanager.net domains
109110

110-
Certificates for `*.trafficmanager.net` domains are not supported. If your app relies on this domain and uses ASMC, you will need to remove that dependency and secure your app using a custom domain and certificate.
111+
Certificates for `*.trafficmanager.net` domains are not supported. If your app relies on this domain and uses ASMC, you need to remove that dependency and secure your app using a custom domain and certificate.
111112

112113
**Recommended steps:**
113114

114115
1. **Add a custom domain to the site**
115116
You can configure a custom domain that points to your `trafficmanager.net` endpoint and secure it with your own certificate.
116117

117-
- If the custom domain is not yet live or does not currently serve traffic, refer to [set up custom domain name for your app](https://learn.microsoft.com/azure/app-service/app-service-web-tutorial-custom-domain?tabs=root%2Cpowershell).
118-
- If the domain is already active and serving traffic, refer to [migrate an active domain](https://learn.microsoft.com/azure/app-service/manage-custom-dns-migrate-domain).
118+
- If the custom domain is not yet live or does not currently serve traffic, refer to [set up custom domain name for your app](app-service-web-tutorial-custom-domain).
119+
- If the domain is already active and serving traffic, refer to [migrate an active domain](manage-custom-dns-migrate-domain).
119120

120121
> [!IMPORTANT]
121122
> If the site restricts public access, do not use ASMC to secure the custom domain. This scenario is impacted by the validation change and will result in certificate issuance or renewal failure.
@@ -125,14 +126,14 @@ Certificates for `*.trafficmanager.net` domains are not supported. If your app r
125126

126127
4. **Add the certificate to the site**
127128
> [!TIP]
128-
> Ensure that you have [authorized App Service to read the certificates from Key vault](https://learn.microsoft.com/azure/app-service/configure-ssl-certificate?tabs=apex%2Crbac%2Cazure-cli#authorize-app-service-to-read-from-the-vault). Use the specific identity listed in the documentation—not the Managed Identity of the site.
129-
130-
- [REST API: Import Key Vault certificate to site](https://learn.microsoft.com/rest/api/appservice/certificates/create-ors://learn.microsoft.com/cli/azure/webapp/config/ssl?view=azure-cli-latest#az-webapp-config-ssl-import)
129+
> Ensure that you have [authorized App Service to read the certificates from Key vault](configure-ssl-certificate#authorize-app-service-to-read-from-the-vault). Use the specific identity listed in the documentation—not the Managed Identity of the site.
130+
- [REST API: Import KV certificate to site](/rest/api/appservice/certificates/create-or-update)
131+
- [CLI: Import KV certificate to site](/cli/azure/webapp/config/ssl#az-webapp-config-ssl-import)
131132

132133
5. **Create a custom domain binding**
133134

134-
- [REST API: Create hostname binding](https://learn.microsoft.com/rest/api/appservice/web-apps/create-or-update-host-name-binding?view=rest-appservice-2024-11-01)
135-
- [CLI: Create hostname binding](https://learn.microsoft.com/cli/azure/webatest#az-webapp-config-ssl-bind)
135+
- [REST API: Create hostname binding](/rest/api/appservice/web-apps/create-or-update-host-name-binding)
136+
- [CLI: Update Create hostname binding](/cli/azure/webapp/config/ssl#az-webapp-config-ssl-bind)
136137

137138
6. **Remove other dependencies on ASMC**
138139

@@ -146,29 +147,27 @@ Certificates for `*.trafficmanager.net` domains are not supported. If your app r
146147
After confirming that your environment or services no longer depend on ASMC, delete the ASMCs associated with your site.
147148
Deleting ASMCs helps prevent accidental reuse, which could result in service downtime when the certificate fails to renew.
148149

149-
- [REST API: Delete Certificate](https://learn.microsoft.com/rest/api/appservice/certificates/delete?view=rest-appservice-2024-11-01)
150-
- [CLI: Delete certificate](https://learn.microsoft.com/cli/azure/webapp/config/ssl?view=azure-cli-latest#az-webapp-config-ssl-delete)
150+
- [REST API: Delete Certificate](/rest/api/appservice/certificates/delete)
151+
- [CLI: Delete certificate](/cli/azure/webapp/config/ssl#az-webapp-config-ssl-delete)
151152

152153
---
153154

154155
## Frequently asked questions (FAQ)
155156

156157
**Why is public access now required?**
157-
Due to MPIC compliance, DigiCert must verify domain ownership by reaching a specific endpoint on your app. This is only possible if the app is publicly accessible. Previously, CNAME validation sufficed, but HTTP Token validation now requires direct access.
158+
Due to MPIC compliance, App Service is migrating to Http Token validation for all ASMC creation and renewal requests. DigiCert must verify domain ownership by reaching a specific endpoint on your app. This is only possible if the app is publicly accessible.
158159

159160
**Can I still use CNAME records?**
160-
Yes, you can still use CNAME records for DNS routing. However, validation now uses HTTP Token, so public access is still required even if CNAME is present.
161+
Yes, you can still use CNAME records for DNS routing and for verifying domain ownership.
161162

162163
**What if I allowlist DigiCert IPs?**
163164
This may work temporarily, but Microsoft cannot guarantee stability or updates. DigiCert may change IPs without notice, and Microsoft will not maintain documentation for these IPs. Customers are responsible for monitoring and maintaining this configuration.
164165

165166
**Are certificates for \*.azurewebsites.net impacted?**
166-
No. These changes only apply to App Service Managed Certificates which are issued to customer’s custom domain.
167+
No. These changes only apply to App Service Managed Certificates that are issued to customer’s custom domain.
167168

168169
---
169170

170-
## Additional resources
171+
## Other resources
171172

172173
- [Important Changes to App Service Managed Certificates – Tech Community Blog](https://techcommunity.microsoft.com/blog/appsonazureblog/important-changes-to-app-service-managed-certificates-is-your-certificate-affect/4435193)
173-
- https://learn.microsoft.com/azure/security/fundamentals/managed-tls-changes
174-
- https://learn.microsoft.com/azure/app-service/app-service-ip-restrictions?tabs=bicep

0 commit comments

Comments
 (0)