Skip to content

Commit e7dd12f

Browse files
committed
acrolinx
1 parent 21f31d4 commit e7dd12f

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

articles/app-service/configure-ssl-bindings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ In the <a href="https://portal.azure.com" target="_blank">Azure portal</a>:
4343
1. In **TLS/SSL type**, choose between **SNI SSL** and **IP based SSL**.
4444

4545
- **[SNI SSL](https://en.wikipedia.org/wiki/Server_Name_Indication)**: Multiple SNI SSL bindings may be added. This option allows multiple TLS/SSL certificates to secure multiple domains on the same IP address. Most modern browsers (including Internet Explorer, Chrome, Firefox, and Opera) support SNI (for more information, see [Server Name Indication](https://wikipedia.org/wiki/Server_Name_Indication)).
46-
- - **IP based SSL**: Only one IP SSL binding may be added. This option allows only one TLS/SSL certificate to secure a dedicated public IP address. After you configure the binding, follow the steps in [2. Remap records for IP based SSL](#2-remap-records-for-ip-based-ssl).<br/>IP SSL is supported only in **Standard** tier or above.
46+
- - **IP based SSL**: Only one IP SSL binding may be added. This option allows only one TLS/SSL certificate to secure a dedicated public IP address. After you configure the binding, follow the steps in [2. Remap records for IP based SSL](#2-remap-records-for-ip-based-ssl).<br/>IP SSL is supported only in **Standard** tier or higher.
4747

4848
1. When adding a new certificate, validate the new certificate by selecting **Validate**.
4949

articles/app-service/configure-ssl-certificate.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ The following table lists the options for you to add certificates in App Service
2121
| Purchase an App Service certificate | A private certificate that's managed by Azure. It combines the simplicity of automated certificate management and the flexibility of renewal and export options. |
2222
| Import a certificate from Key Vault | Useful if you use [Azure Key Vault](../key-vault/index.yml) to manage your [PKCS12 certificates](https://wikipedia.org/wiki/PKCS_12). See [Private certificate requirements](#private-certificate-requirements). |
2323
| Upload a private certificate | If you already have a private certificate from a third-party provider, you can upload it. See [Private certificate requirements](#private-certificate-requirements). |
24-
| Upload a public certificate | Public certificates are not used to secure custom domains, but you can load them into your code if you need them to access remote resources. |
24+
| Upload a public certificate | Public certificates aren't used to secure custom domains, but you can load them into your code if you need them to access remote resources. |
2525

2626
> [!NOTE]
2727
> After you upload a certificate to an app, the certificate is stored in a deployment unit that's bound to the App Service plan's resource group, region, and operating system combination, internally called a *webspace*. That way, the certificate is accessible to other apps in the same resource group and region combination.
@@ -78,7 +78,7 @@ The free certificate comes with the following limitations:
7878

7979
### [Apex domain](#tab/apex)
8080
- Must have an A record pointing to your web app's IP address.
81-
- Isn't supported on apps that are not publicly accessible.
81+
- Isn't supported on apps that aren't publicly accessible.
8282
- Isn't supported with root domains that are integrated with Traffic Manager.
8383
- Must meet all the above for successful certificate issuances and renewals.
8484

@@ -146,7 +146,7 @@ If you already have a working App Service certificate, you can complete the foll
146146

147147
### Store certificate in Azure Key Vault
148148

149-
[Key Vault](../key-vault/general/overview.md) is an Azure service that helps safeguard cryptographic keys and secrets used by cloud applications and services. For App Service certificates, the storage of choice is Key Vault. After you finish the certificate purchase process, you have to complete a few more steps before you start using this certificate.
149+
[Key Vault](../key-vault/general/overview.md) is an Azure service that helps safeguard cryptographic keys and secrets used by cloud applications and services. For App Service certificates, the storage of choice is Key Vault. After you finish the certificate purchase process, you must complete a few more steps before you start using this certificate.
150150

151151
1. On the [App Service Certificates page](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.CertificateRegistration%2FcertificateOrders), select the certificate. On the certificate menu, select **Certificate Configuration** > **Step 1: Store**.
152152

@@ -211,7 +211,7 @@ If you use Azure Key Vault to manage your certificates, you can import a PKCS12
211211

212212
### Authorize App Service to read from the vault
213213

214-
By default, the App Service resource provider doesn't have access to your key vault. To use a key vault for a certificate deployment, you have to [authorize read access for the resource provider to the key vault](../key-vault/general/assign-access-policy-cli.md).
214+
By default, the App Service resource provider doesn't have access to your key vault. To use a key vault for a certificate deployment, you must [authorize read access for the resource provider to the key vault](../key-vault/general/assign-access-policy-cli.md).
215215

216216
> [!NOTE]
217217
> Currently, a Key Vault certificate supports only the Key Vault access policy, not RBAC model.
@@ -252,7 +252,7 @@ After you get a certificate from your certificate provider, make the certificate
252252

253253
### Merge intermediate certificates
254254

255-
If your certificate authority gives you multiple certificates in the certificate chain, you have to merge the certificates following the same order.
255+
If your certificate authority gives you multiple certificates in the certificate chain, you must merge the certificates following the same order.
256256

257257
1. In a text editor, open each received certificate.
258258

@@ -293,7 +293,7 @@ Now, export your merged TLS/SSL certificate with the private key that was used t
293293
openssl pkcs12 -export -out myserver.pfx -inkey <private-key-file> -in <merged-certificate-file>
294294
```
295295

296-
1. When you're prompted, specify a password for the export operation. When you upload your TLS/SSL certificate to App Service later, you'll have to provide this password.
296+
1. When you're prompted, specify a password for the export operation. When you upload your TLS/SSL certificate to App Service later, you must provide this password.
297297

298298
1. If you used IIS or _Certreq.exe_ to generate your certificate request, install the certificate to your local computer, and then [export the certificate to a PFX file](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754329(v=ws.11)).
299299

@@ -463,7 +463,7 @@ The downloaded PFX file is a raw PKCS12 file that contains both the public and p
463463

464464
If you delete an App Service certificate, the delete operation is irreversible and final. The result is a revoked certificate, and any binding in App Service that uses this certificate becomes invalid.
465465

466-
To prevent accidental deletion, Azure puts a lock on the App Service certificate. So, to delete the certificate, you have to first remove the delete lock on the certificate.
466+
To prevent accidental deletion, Azure puts a lock on the App Service certificate. So, to delete the certificate, you must first remove the delete lock on the certificate.
467467

468468
1. On the [App Service Certificates page](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.CertificateRegistration%2FcertificateOrders), select the certificate.
469469

0 commit comments

Comments
 (0)