You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/app-service-managed-certificate-changes-july-2025.md
+35-36Lines changed: 35 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.date: 07/28/2025
14
14
15
15
Starting July 28, 2025, Azure App Service Managed Certificates (ASMC) are subject to new issuance and renewal requirements due to DigiCert’s migration to a new validation platform. This change is driven by industry-wide compliance with Multi-Perspective Issuance Corroboration (MPIC).
16
16
17
-
For a detailed explanation of the underlying changes at DigiCert, refer to [changes to the managed TLS feature](https://learn.microsoft.com/azure/security/fundamentals/managed-tls-changes).
17
+
For a detailed explanation of the underlying changes at DigiCert, refer to [changes to the managed TLS feature](../security/fundamentals/managed-tls-changes.md).
18
18
19
19
## What’s changing
20
20
@@ -27,7 +27,7 @@ For a detailed explanation of the underlying changes at DigiCert, refer to [chan
27
27
- No customer action is needed to place or manage the token.
28
28
29
29
> [!IMPORTANT]
30
-
> While App Service continues to handle token placement automatically during renewals, DigiCert must still reach the validation endpoint on your app. Public access is still required at the time of renewal. If your app is not publicly accessible, renewal will fail even if the token is correctly placed.
30
+
> While App Service continues to handle token placement automatically during renewals, DigiCert must still reach the validation endpoint on your app. Public access is still required at the time of renewal. If your app is not publicly accessible, renewal fails even if the token is correctly placed.
31
31
32
32
## Impacted scenarios
33
33
@@ -37,7 +37,7 @@ You will not be able to create or renew ASMCs if:
37
37
- You use Azure Traffic Manager with nested or external endpoints.
38
38
- You rely on `*.trafficmanager.net` domains.
39
39
40
-
Existing certificates will remain valid until expiration (up to 6 months), but will not renew automatically if your configuration is unsupported.
40
+
Existing certificates remain valid until expiration (up to 6 months), but will not renew automatically if your configuration is unsupported.
41
41
42
42
## Mitigation guidance
43
43
@@ -55,17 +55,16 @@ We recognize that making applications publicly accessible may conflict with cust
55
55
2.**Add the certificate to the site**
56
56
After acquiring a certificate for your custom domain, you need to upload it to your App Service app and configure it for use. After acquiring a certificate for your custom domain, you need to upload it to your App Service app and configure it for use.
57
57
> [!TIP]
58
-
> Ensure that you have [authorized App Service to read the certificates from Key vault](https://learn.microsoft.com/azure/app-service/configure-ssl-certificate?tabs=apex%2Crbac%2Cazure-cli#authorize-app-service-to-read-from-the-vault). Use the specific identity listed in the documentation and not the Managed Identity of the site.
59
-
60
-
-[REST API: Import KV certificate to site](https://learn.microsoft.com/rest/api/appservice/certificates/create-or-update?view=rest-appservice-2024-11-01&tabs=HTTP)
61
-
-[CLI: Import KV certificate to site](https://learn.microsoft.com/cli/azure/webapp/config/ssl?view=azure-cli-latest#az-webapp-config-ssl-import)
58
+
> Ensure that you have [authorized App Service to read the certificates from Key vault](configure-ssl-certificate.md#authorize-app-service-to-read-from-the-vault). Use the specific identity listed in the documentation and not the Managed Identity of the site.
59
+
-[REST API: Import KV certificate to site](/rest/api/appservice/certificates/create-or-update)
60
+
-[CLI: Import KV certificate to site](/cli/azure/webapp/config/ssl#az-webapp-config-ssl-import)
62
61
63
62
4.**Update the custom domain binding**
64
63
> [!IMPORTANT]
65
64
> **To avoid any service downtime, do not delete the TLS/SSL binding**. You can update the binding with the new certificate thumbprint or name that was added to the web app without deleting the current binding.
7.**Temporary mitigation: DigiCert IP allowlisting**
86
-
Some customers may choose to allowlist DigiCert’s domain validation IPs to temporarily bypass public access restrictions. This can help avoid downtime, but:
- This workaround is not officially supported or documented by Microsoft.
91
-
- Use at your own risk.
84
+
**Temporary mitigation: DigiCert IP allowlisting**
85
+
Some customers may choose to allowlist [DigiCert’s domain validation IPs](https://knowledge.digicert.com/alerts/ip-address-domain-validation) as a short-term workaround. This can help buy time to move away from using ASMC for websites that aren’t publicly accessible, especially given the short notice of the change.
86
+
> [!NOTE]
87
+
> This isn’t an official or supported long-term solution. Microsoft’s stance remains that **public access is required** to avoid potential service disruptions. Consider the following:
88
+
>
89
+
> - DigiCert manages its own IPs and may change them without notice.
90
+
> - Microsoft doesn’t control DigiCert’s infrastructure and can’t guarantee the documentation will stay up to date.
91
+
> - Microsoft doesn’t provide alerts if DigiCert updates its IPs.
92
+
> - Use this approach at your own risk.
92
93
93
-
For guidance on configuring access restrictions, refer to [set up Azure App Service access restrictions](https://learn.microsoft.com/azure/app-service/app-service-ip-restrictions?tabs=bicep).
94
+
For guidance on configuring access restrictions, refer to [set up Azure App Service access restrictions](app-service-ip-restrictions.md).
94
95
95
96
---
96
97
@@ -101,21 +102,21 @@ Only “Azure Endpoints” are supported. “Nested” and “External” endpoi
101
102
**Recommended mitigation:**
102
103
103
104
- Switch to Azure Endpoints or use a custom domain secured with a custom certificate.
104
-
- For guidance on using App Service as an Azure Traffic Manager endpoint, refer to [App Service and Traffic Manager Profiles](https://learn.microsoft.com/azure/app-service/web-sites-traffic-manager#app-service-and-traffic-manager-profiles).
105
+
- For guidance on using App Service as an Azure Traffic Manager endpoint, refer to [App Service and Traffic Manager Profiles](web-sites-traffic-manager#app-service-and-traffic-manager-profiles).
105
106
106
107
---
107
108
108
109
### Scenario 3: Use of trafficmanager.net domains
109
110
110
-
Certificates for `*.trafficmanager.net` domains are not supported. If your app relies on this domain and uses ASMC, you will need to remove that dependency and secure your app using a custom domain and certificate.
111
+
Certificates for `*.trafficmanager.net` domains are not supported. If your app relies on this domain and uses ASMC, you need to remove that dependency and secure your app using a custom domain and certificate.
111
112
112
113
**Recommended steps:**
113
114
114
115
1.**Add a custom domain to the site**
115
116
You can configure a custom domain that points to your `trafficmanager.net` endpoint and secure it with your own certificate.
116
117
117
-
- If the custom domain is not yet live or does not currently serve traffic, refer to [set up custom domain name for your app](https://learn.microsoft.com/azure/app-service/app-service-web-tutorial-custom-domain?tabs=root%2Cpowershell).
118
-
- If the domain is already active and serving traffic, refer to [migrate an active domain](https://learn.microsoft.com/azure/app-service/manage-custom-dns-migrate-domain).
118
+
- If the custom domain is not yet live or does not currently serve traffic, refer to [set up custom domain name for your app](app-service-web-tutorial-custom-domain).
119
+
- If the domain is already active and serving traffic, refer to [migrate an active domain](manage-custom-dns-migrate-domain).
119
120
120
121
> [!IMPORTANT]
121
122
> If the site restricts public access, do not use ASMC to secure the custom domain. This scenario is impacted by the validation change and will result in certificate issuance or renewal failure.
@@ -125,14 +126,14 @@ Certificates for `*.trafficmanager.net` domains are not supported. If your app r
125
126
126
127
4.**Add the certificate to the site**
127
128
> [!TIP]
128
-
> Ensure that you have [authorized App Service to read the certificates from Key vault](https://learn.microsoft.com/azure/app-service/configure-ssl-certificate?tabs=apex%2Crbac%2Cazure-cli#authorize-app-service-to-read-from-the-vault). Use the specific identity listed in the documentation—not the Managed Identity of the site.
129
-
130
-
-[REST API: Import Key Vault certificate to site](https://learn.microsoft.com/rest/api/appservice/certificates/create-ors://learn.microsoft.com/cli/azure/webapp/config/ssl?view=azure-cli-latest#az-webapp-config-ssl-import)
129
+
> Ensure that you have [authorized App Service to read the certificates from Key vault](configure-ssl-certificate#authorize-app-service-to-read-from-the-vault). Use the specific identity listed in the documentation—not the Managed Identity of the site.
130
+
-[REST API: Import KV certificate to site](/rest/api/appservice/certificates/create-or-update)
131
+
-[CLI: Import KV certificate to site](/cli/azure/webapp/config/ssl#az-webapp-config-ssl-import)
Due to MPIC compliance, DigiCert must verify domain ownership by reaching a specific endpoint on your app. This is only possible if the app is publicly accessible. Previously, CNAME validation sufficed, but HTTP Token validation now requires direct access.
158
+
Due to MPIC compliance, App Service is migrating to Http Token validation for all ASMC creation and renewal requests. DigiCert must verify domain ownership by reaching a specific endpoint on your app. This is only possible if the app is publicly accessible.
158
159
159
160
**Can I still use CNAME records?**
160
-
Yes, you can still use CNAME records for DNS routing. However, validation now uses HTTP Token, so public access is still required even if CNAME is present.
161
+
Yes, you can still use CNAME records for DNS routing and for verifying domain ownership.
161
162
162
163
**What if I allowlist DigiCert IPs?**
163
164
This may work temporarily, but Microsoft cannot guarantee stability or updates. DigiCert may change IPs without notice, and Microsoft will not maintain documentation for these IPs. Customers are responsible for monitoring and maintaining this configuration.
164
165
165
166
**Are certificates for \*.azurewebsites.net impacted?**
166
-
No. These changes only apply to App Service Managed Certificates which are issued to customer’s custom domain.
167
+
No. These changes only apply to App Service Managed Certificates that are issued to customer’s custom domain.
167
168
168
169
---
169
170
170
-
## Additional resources
171
+
## Other resources
171
172
172
173
-[Important Changes to App Service Managed Certificates – Tech Community Blog](https://techcommunity.microsoft.com/blog/appsonazureblog/important-changes-to-app-service-managed-certificates-is-your-certificate-affect/4435193)
0 commit comments