Skip to content

Commit e4a76d3

Browse files
authored
Merge pull request #112315 from vhorne/ag-ssl-portal
Remove cert password note.
2 parents 87215c0 + 2610acf commit e4a76d3

File tree

1 file changed

+9
-10
lines changed

1 file changed

+9
-10
lines changed

articles/application-gateway/create-ssl-portal.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,11 @@ services: application-gateway
55
author: vhorne
66
ms.service: application-gateway
77
ms.topic: tutorial
8-
ms.date: 11/13/2019
8+
ms.date: 04/22/2019
99
ms.author: victorh
1010
#Customer intent: As an IT administrator, I want to use the Azure portal to configure Application Gateway with TLS termination so I can secure my application traffic.
1111
---
12+
1213
# Tutorial: Configure an application gateway with TLS termination using the Azure portal
1314

1415
You can use the Azure portal to configure an [application gateway](overview.md) with a certificate for TLS termination that uses virtual machines for backend servers.
@@ -51,13 +52,11 @@ Thumbprint Subject
5152
E1E81C23B3AD33F9B4D1717B20AB65DBB91AC630 CN=www.contoso.com
5253
```
5354

54-
Use [Export-PfxCertificate](https://docs.microsoft.com/powershell/module/pkiclient/export-pfxcertificate) with the Thumbprint that was returned to export a pfx file from the certificate:
55+
Use [Export-PfxCertificate](https://docs.microsoft.com/powershell/module/pkiclient/export-pfxcertificate) with the Thumbprint that was returned to export a pfx file from the certificate. Make sure your password is 4 - 12 characters long:
5556

56-
> [!NOTE]
57-
> Do not use any special characters in your .pfx file password. Only alphanumeric characters are supported.
5857

5958
```powershell
60-
$pwd = ConvertTo-SecureString -String "Azure123456" -Force -AsPlainText
59+
$pwd = ConvertTo-SecureString -String <your password> -Force -AsPlainText
6160
Export-PfxCertificate `
6261
-cert cert:\localMachine\my\E1E81C23B3AD33F9B4D1717B20AB65DBB91AC630 `
6362
-FilePath c:\appgwcert.pfx `
@@ -145,7 +144,7 @@ On the **Configuration** tab, you'll connect the frontend and backend pool you c
145144

146145
- **PFX certificate file** - Browse to and select the c:\appgwcert.pfx file that you create earlier.
147146
- **Certificate name** - Type *mycert1* for the name of the certificate.
148-
- **Password** - Type *Azure123456* for the password.
147+
- **Password** - Type your password.
149148

150149
Accept the default values for the other settings on the **Listener** tab, then select the **Backend targets** tab to configure the rest of the routing rule.
151150

@@ -189,10 +188,10 @@ To do this, you'll:
189188
- **Resource group**: Select **myResourceGroupAG** for the resource group name.
190189
- **Virtual machine name**: Enter *myVM* for the name of the virtual machine.
191190
- **Username**: Enter *azureuser* for the administrator user name.
192-
- **Password**: Enter *Azure123456* for the administrator password.
193-
4. Accept the other defaults and then select **Next: Disks**.
194-
5. Accept the **Disks** tab defaults and then select **Next: Networking**.
195-
6. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Accept the other defaults and then select **Next: Management**.
191+
- **Password**: Enter a password for the administrator account.
192+
1. Accept the other defaults and then select **Next: Disks**.
193+
2. Accept the **Disks** tab defaults and then select **Next: Networking**.
194+
3. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Accept the other defaults and then select **Next: Management**.
196195

197196
Application Gateway can communicate with instances outside of the virtual network that it is in, but you need to ensure there's IP connectivity.
198197
1. On the **Management** tab, set **Boot diagnostics** to **Off**. Accept the other defaults and then select **Review + create**.

0 commit comments

Comments
 (0)