Skip to content

Commit e9f4b4b

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into SFI
2 parents 79d292b + e280b2d commit e9f4b4b

File tree

613 files changed

+2181
-8001
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

613 files changed

+2181
-8001
lines changed

.openpublishing.redirection.json

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4749,6 +4749,21 @@
47494749
"source_path_from_root": "/articles/modeling-simulation-workbench/how-to-guide-manage-storage.md",
47504750
"redirect_url": "/azure/modeling-simulation-workbench/concept-storage",
47514751
"redirect_document_id": false
4752-
}
4752+
},
4753+
{
4754+
"source_path_from_root": "/articles/load-balancer/upgrade-basic-standard.md",
4755+
"redirect_url": "/azure/load-balancer/upgrade-basic-standard-with-powershell",
4756+
"redirect_document_id": false
4757+
},
4758+
{
4759+
"source_path_from_root": "/articles/load-balancer/upgrade-basicinternal-standard.md",
4760+
"redirect_url": "/azure/load-balancer/upgrade-basic-standard-with-powershell",
4761+
"redirect_document_id": false
4762+
},
4763+
{
4764+
"source_path_from_root": "/articles/load-balancer/load-balancer-ipv6-overview.md",
4765+
"redirect_url": "/azure/virtual-network/ip-services/ipv6-overview",
4766+
"redirect_document_id": false
4767+
},
47534768
]
47544769
}

articles/app-service/app-service-web-tutorial-custom-domain.md

Lines changed: 37 additions & 37 deletions
Large diffs are not rendered by default.

articles/app-service/configure-domain-traffic-manager.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ Once you have finished adding or modifying DNS records at your domain provider,
7373

7474
Since Traffic Manager only supports custom domain mapping with CNAME records, and because DNS standards don't support CNAME records for mapping root domains (for example, **contoso.com**), Traffic Manager doesn't support mapping to root domains. To work around this issue, use a URL redirect from at the app level. In ASP.NET Core, for example, you can use [URL Rewriting](/aspnet/core/fundamentals/url-rewriting). Then, use Traffic Manager to load balance the subdomain (**www.contoso.com**). Another approach is you can [create an alias record for your domain name apex to reference an Azure Traffic Manager profile](../dns/tutorial-alias-tm.md). An example is contoso.com. Instead of using a redirecting service, you can configure Azure DNS to reference a Traffic Manager profile directly from your zone.
7575

76-
For high availability scenarios, you can implement a load-balancing DNS setup without Traffic Manager by creating multiple *A records* that point from the root domain to each app copy's IP address. Then, [map the same root domain to all the app copies](app-service-web-tutorial-custom-domain.md#2-create-the-dns-records). Since the same domain name cannot be mapped to two different apps in the same region, this setup only works when your app copies are in different regions.
76+
For high availability scenarios, you can implement a load-balancing DNS setup without Traffic Manager by creating multiple *A records* that point from the root domain to each app copy's IP address. Then, [map the same root domain to all the app copies](app-service-web-tutorial-custom-domain.md#create-the-dns-records). Since the same domain name cannot be mapped to two different apps in the same region, this setup only works when your app copies are in different regions.
7777

7878
## Enable custom domain
7979
After the records for your domain name have propagated, use the browser to verify that your custom domain name resolves to your App Service app.

articles/app-service/configure-language-python.md

Lines changed: 53 additions & 55 deletions
Large diffs are not rendered by default.

articles/app-service/configure-ssl-app-service-certificate.md

Lines changed: 44 additions & 46 deletions
Large diffs are not rendered by default.

articles/app-service/configure-ssl-bindings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,9 +66,9 @@ There are two changes you need to make, potentially:
6666

6767
- By default, your app uses a shared public IP address. When you bind a certificate with IP SSL, App Service creates a new, dedicated IP address for your app. If you mapped an A record to your app, update your domain registry with this new, dedicated IP address.
6868

69-
Your app's **Custom domain** page is updated with the new, dedicated IP address. Copy this IP address, then [remap the A record](app-service-web-tutorial-custom-domain.md#2-create-the-dns-records) to this new IP address.
69+
Your app's **Custom domain** page is updated with the new, dedicated IP address. Copy this IP address, then [remap the A record](app-service-web-tutorial-custom-domain.md#create-the-dns-records) to this new IP address.
7070

71-
- If you have an SNI SSL binding to `<app-name>.azurewebsites.net`, [remap any CNAME mapping](app-service-web-tutorial-custom-domain.md#2-create-the-dns-records) to point to `sni.<app-name>.azurewebsites.net` instead (add the `sni` prefix).
71+
- If you have an SNI SSL binding to `<app-name>.azurewebsites.net`, [remap any CNAME mapping](app-service-web-tutorial-custom-domain.md#create-the-dns-records) to point to `sni.<app-name>.azurewebsites.net` instead (add the `sni` prefix).
7272

7373
## 3. Test HTTPS
7474

articles/app-service/configure-ssl-certificate.md

Lines changed: 24 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -134,15 +134,33 @@ If you use Azure Key Vault to manage your certificates, you can import a PKCS12
134134

135135
### Authorize App Service to read from the vault
136136

137-
By default, the App Service resource provider doesn't have access to your key vault. To use a key vault for a certificate deployment, you must [authorize read access for the resource provider to the key vault](/azure/key-vault/general/assign-access-policy-cli).
137+
By default, the App Service resource provider doesn't have access to your key vault. To use a key vault for a certificate deployment, you must authorize read access for the resource provider (App Service) to the key vault. You can grant access either with access policy or RBAC.
138138

139139
> [!NOTE]
140-
> Currently, the Azure portal does not allow you to configure an App Service certificate in Key Vault to use the RBAC model. You can, however, use Azure CLI, Azure PowerShell, or an ARM template deployment to perform this configuration. For more information, see [Provide access to Key Vault keys, certificates, and secrets with an Azure role-based access control](/azure/key-vault/general/rbac-guide?tabs=azure-cli).
140+
> Currently, the Azure portal does not allow you to configure an App Service certificate in Key Vault to use the RBAC model. You can, however, use Azure CLI, Azure PowerShell, or an ARM template deployment to perform this configuration.
141141
142-
| Resource provider | Service principal AppId | Key vault secret permissions | Key vault certificate permissions | Key vault RBAC permissions |
143-
|--|--|--|--|--|
144-
| **Microsoft Azure App Service** or **Microsoft.Azure.WebSites** | - `abfa0a7c-a6b6-4736-8310-5855508787cd`, which is the same for all Azure subscriptions <br><br>- For Azure Government cloud environment, use `6a02c803-dafd-4136-b4c3-5a6f318b4714`. | Get | Get | Certificate User |
145-
| **Microsoft.Azure.CertificateRegistration** | | Get<br/>List<br/>Set<br/>Delete | Get<br/>List | |
142+
### [RBAC permissions](#tab/RBAC)
143+
| Resource provider | Service principal app ID / assignee | Key vault RBAC role |
144+
|--|--|--|
145+
| **Microsoft Azure App Service** or **Microsoft.Azure.WebSites** | - `abfa0a7c-a6b6-4736-8310-5855508787cd` for public Azure cloud environment <br><br>- `6a02c803-dafd-4136-b4c3-5a6f318b4714` for Azure Government cloud environment | Certificate User |
146+
147+
The service principal app ID or assignee value is the ID for App Service resource provider. To learn how to authorize key vault permissions for App Service resource provider using access policy refer to the [provide access to Key Vault keys, certificates, and secrets with an Azure role-based access control documentation](/azure/key-vault/general/rbac-guide?tabs=azure-portal#key-vault-scope-role-assignment).
148+
149+
> [!NOTE]
150+
> Do not delete these RBAC permissions from key vault, otherwise App Service will not be able to sync your web app with the latest key vault certificate version.
151+
152+
### [Access policy permissions](#tab/accesspolicy)
153+
154+
| Resource provider | Service principal app ID | Key vault secret permissions | Key vault certificate permissions |
155+
|--|--|--|--|
156+
| **Microsoft Azure App Service** or **Microsoft.Azure.WebSites** | - `abfa0a7c-a6b6-4736-8310-5855508787cd` for public Azure cloud environment <br><br>- `6a02c803-dafd-4136-b4c3-5a6f318b4714` for Azure Government cloud environment | Get | Get |
157+
158+
The service principal app ID or assignee value is the ID for App Service resource provider. To learn how to authorize key vault permissions for App Service resource provider using access policy refer to the [assign a Key Vault access policy documentation](/azure/key-vault/general/assign-access-policy?tabs=azure-portal).
159+
160+
> [!NOTE]
161+
> Do not delete these access policy permissions from key vault, otherwise App Service will not be able to sync your web app with the latest key vault certificate version.
162+
163+
---
146164

147165
### Import a certificate from your vault to your app
148166

0 commit comments

Comments
 (0)