You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/create-ssl-portal.md
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,10 +5,11 @@ services: application-gateway
5
5
author: vhorne
6
6
ms.service: application-gateway
7
7
ms.topic: tutorial
8
-
ms.date: 11/13/2019
8
+
ms.date: 04/22/2019
9
9
ms.author: victorh
10
10
#Customer intent: As an IT administrator, I want to use the Azure portal to configure Application Gateway with TLS termination so I can secure my application traffic.
11
11
---
12
+
12
13
# Tutorial: Configure an application gateway with TLS termination using the Azure portal
13
14
14
15
You can use the Azure portal to configure an [application gateway](overview.md) with a certificate for TLS termination that uses virtual machines for backend servers.
Use [Export-PfxCertificate](https://docs.microsoft.com/powershell/module/pkiclient/export-pfxcertificate) with the Thumbprint that was returned to export a pfx file from the certificate:
55
+
Use [Export-PfxCertificate](https://docs.microsoft.com/powershell/module/pkiclient/export-pfxcertificate) with the Thumbprint that was returned to export a pfx file from the certificate. Make sure your password is 4 - 12 characters long:
55
56
56
-
> [!NOTE]
57
-
> Do not use any special characters in your .pfx file password. Only alphanumeric characters are supported.
@@ -145,7 +144,7 @@ On the **Configuration** tab, you'll connect the frontend and backend pool you c
145
144
146
145
-**PFX certificate file** - Browse to and select the c:\appgwcert.pfx file that you create earlier.
147
146
-**Certificate name** - Type *mycert1* for the name of the certificate.
148
-
-**Password** - Type *Azure123456* for the password.
147
+
-**Password** - Type your password.
149
148
150
149
Accept the default values for the other settings on the **Listener** tab, then select the **Backend targets** tab to configure the rest of the routing rule.
151
150
@@ -189,10 +188,10 @@ To do this, you'll:
189
188
-**Resource group**: Select **myResourceGroupAG** for the resource group name.
190
189
-**Virtual machine name**: Enter *myVM* for the name of the virtual machine.
191
190
-**Username**: Enter *azureuser* for the administrator user name.
192
-
-**Password**: Enter *Azure123456*for the administrator password.
193
-
4. Accept the other defaults and then select **Next: Disks**.
194
-
5. Accept the **Disks** tab defaults and then select **Next: Networking**.
195
-
6. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Accept the other defaults and then select **Next: Management**.
191
+
-**Password**: Enter a password for the administrator account.
192
+
1. Accept the other defaults and then select **Next: Disks**.
193
+
2. Accept the **Disks** tab defaults and then select **Next: Networking**.
194
+
3. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Accept the other defaults and then select **Next: Management**.
196
195
197
196
Application Gateway can communicate with instances outside of the virtual network that it is in, but you need to ensure there's IP connectivity.
198
197
1. On the **Management** tab, set **Boot diagnostics** to **Off**. Accept the other defaults and then select **Review + create**.
0 commit comments