You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/app-service-plan-manage.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ You can move an app to another App Service plan, as long as the source plan and
56
56
4. If you create a plan, you can select the pricing tier of the new plan. In **Pricing Tier**, select the existing tier to change it.
57
57
58
58
> [!IMPORTANT]
59
-
> If you're moving an app from a higher-tiered plan to a lower-tiered plan, such as from **D1** to **F1**, the app may lose certain capabilities in the target plan. For example, if your app uses SSL certificates, you might see this error message:
59
+
> If you're moving an app from a higher-tiered plan to a lower-tiered plan, such as from **D1** to **F1**, the app may lose certain capabilities in the target plan. For example, if your app uses TLS/SSL certificates, you might see this error message:
60
60
>
61
61
> `Cannot update the site with hostname '<app_name>' because its current SSL configuration 'SNI based SSL enabled' is not allowed in the target compute mode. Allowed SSL configuration is 'Disabled'.`
Copy file name to clipboardExpand all lines: articles/app-service/app-service-web-configure-tls-mutual-auth.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ Exclusion paths can be configured by selecting **Configuration** > **General Set
37
37
38
38
## Access client certificate
39
39
40
-
In App Service, SSL termination of the request happens at the frontend load balancer. When forwarding the request to your app code with [client certificates enabled](#enable-client-certificates), App Service injects an `X-ARR-ClientCert` request header with the client certificate. App Service does not do anything with this client certificate other than forwarding it to your app. Your app code is responsible for validating the client certificate.
40
+
In App Service, TLS termination of the request happens at the frontend load balancer. When forwarding the request to your app code with [client certificates enabled](#enable-client-certificates), App Service injects an `X-ARR-ClientCert` request header with the client certificate. App Service does not do anything with this client certificate other than forwarding it to your app. Your app code is responsible for validating the client certificate.
41
41
42
42
For ASP.NET, the client certificate is available through the **HttpRequest.ClientCertificate** property.
Copy file name to clipboardExpand all lines: articles/app-service/app-service-web-tutorial-custom-domain.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -147,7 +147,7 @@ It might take some time for the new custom domain to be reflected in the app's *
147
147

148
148
149
149
> [!NOTE]
150
-
> A **Not Secure** label for your custom domain means that it's not yet bound to an SSL certificate, and any HTTPS request from a browser to your custom domain will receive and error or warning, depending on the browser. To add an SSL binding, see [Secure a custom DNS name with an SSL binding in Azure App Service](configure-ssl-bindings.md).
150
+
> A **Not Secure** label for your custom domain means that it's not yet bound to a TLS/SSL certificate, and any HTTPS request from a browser to your custom domain will receive and error or warning, depending on the browser. To add a TLS binding, see [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md).
151
151
152
152
If you missed a step or made a typo somewhere earlier, you see a verification error at the bottom of the page.
153
153
@@ -231,7 +231,7 @@ It might take some time for the new custom domain to be reflected in the app's *
231
231

232
232
233
233
> [!NOTE]
234
-
> A **Not Secure** label for your custom domain means that it's not yet bound to an SSL certificate, and any HTTPS request from a browser to your custom domain will receive and error or warning, depending on the browser. To add an SSL binding, see [Secure a custom DNS name with an SSL binding in Azure App Service](configure-ssl-bindings.md).
234
+
> A **Not Secure** label for your custom domain means that it's not yet bound to a TLS/SSL certificate, and any HTTPS request from a browser to your custom domain will receive and error or warning, depending on the browser. To add a TLS binding, see [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md).
235
235
236
236
If you missed a step or made a typo somewhere earlier, you see a verification error at the bottom of the page.
237
237
@@ -286,7 +286,7 @@ Select the **+** icon again to add another custom domain that matches the wildca
286
286

287
287
288
288
> [!NOTE]
289
-
> A **Note Secure** label for your custom domain means that it's not yet bound to an SSL certificate, and any HTTPS request from a browser to your custom domain will receive and error or warning, depending on the browser. To add an SSL binding, see [Secure a custom DNS name with an SSL binding in Azure App Service](configure-ssl-bindings.md).
289
+
> A **Note Secure** label for your custom domain means that it's not yet bound to a TLS/SSL certificate, and any HTTPS request from a browser to your custom domain will receive and error or warning, depending on the browser. To add a TLS binding, see [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md).
290
290
291
291
## Test in browser
292
292
@@ -362,7 +362,7 @@ In this tutorial, you learned how to:
362
362
> * Redirect the default URL to a custom directory
363
363
> * Automate domain mapping with scripts
364
364
365
-
Advance to the next tutorial to learn how to bind a custom SSL certificate to a web app.
365
+
Advance to the next tutorial to learn how to bind a custom TLS/SSL certificate to a web app.
366
366
367
367
> [!div class="nextstepaction"]
368
-
> [Secure a custom DNS name with an SSL binding in Azure App Service](configure-ssl-bindings.md)
368
+
> [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md)
Copy file name to clipboardExpand all lines: articles/app-service/app-service-web-tutorial-php-mysql.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -263,9 +263,9 @@ Save the changes.
263
263
> To secure your MySQL connection information, this file is already excluded from the Git repository (See _.gitignore_ in the repository root). Later, you learn how to configure environment variables in App Service to connect to your database in Azure Database for MySQL. With environment variables, you don't need the *.env* file in App Service.
264
264
>
265
265
266
-
### Configure SSL certificate
266
+
### Configure TLS/SSL certificate
267
267
268
-
By default, Azure Database for MySQL enforces SSL connections from clients. To connect to your MySQL database in Azure, you must use the [_.pem_ certificate supplied by Azure Database for MySQL](../mysql/howto-configure-ssl.md).
268
+
By default, Azure Database for MySQL enforces TLS connections from clients. To connect to your MySQL database in Azure, you must use the [_.pem_ certificate supplied by Azure Database for MySQL](../mysql/howto-configure-ssl.md).
269
269
270
270
Open _config/database.php_ and add the `sslmode` and `options` parameters to `connections.mysql`, as shown in the following code.
Copy file name to clipboardExpand all lines: articles/app-service/configure-common.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -168,7 +168,7 @@ Here, you can configure some common settings for the app. Some settings require
168
168
-**Managed pipeline version**: The IIS [pipeline mode]. Set it to **Classic** if you have a legacy app that requires an older version of IIS.
169
169
-**HTTP version**: Set to **2.0** to enable support for [HTTPS/2](https://wikipedia.org/wiki/HTTP/2) protocol.
170
170
> [!NOTE]
171
-
> Most modern browsers support HTTP/2 protocol over TLS only, while non-encrypted traffic continues to use HTTP/1.1. To ensure that client browsers connect to your app with HTTP/2, [secure your custom DNS namewith an SSL binding in Azure App Service](configure-ssl-bindings.md).
171
+
> Most modern browsers support HTTP/2 protocol over TLS only, while non-encrypted traffic continues to use HTTP/1.1. To ensure that client browsers connect to your app with HTTP/2, secure your custom DNS name. For more information, see [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md).
172
172
-**ARR affinity**: In a multi-instance deployment, ensure that the client is routed to the same instance for the life of the session. You can set this option to **Off** for stateless applications.
173
173
-**Debugging**: Enable remote debugging for [ASP.NET](troubleshoot-dotnet-visual-studio.md#remotedebug), [ASP.NET Core](/visualstudio/debugger/remote-debugging-azure), or [Node.js](containers/configure-language-nodejs.md#debug-remotely) apps. This option turns off automatically after 48 hours.
174
174
-**Incoming client certificates**: require client certificates in [mutual authentication](app-service-web-configure-tls-mutual-auth.md).
@@ -243,7 +243,7 @@ See [Configure a custom Linux container for Azure App Service](containers/config
243
243
244
244
-[Configure a custom domain name in Azure App Service]
245
245
-[Set up staging environments in Azure App Service]
246
-
-[Secure a custom DNS name with an SSL binding in Azure App Service](configure-ssl-bindings.md)
246
+
-[Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md)
Copy file name to clipboardExpand all lines: articles/app-service/configure-ssl-bindings.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Secure a custom DNS with an SSL binding
2
+
title: Secure a custom DNS with a TLS/SSL binding
3
3
description: Secure HTTPS access to your custom domain by creating a TLS/SSL binding with a certificate. Improve your website's security by enforcing HTTPS or TLS 1.2.
4
4
tags: buy-ssl-certificates
5
5
@@ -8,16 +8,16 @@ ms.date: 10/25/2019
8
8
ms.reviewer: yutlin
9
9
ms.custom: seodec18
10
10
---
11
-
# Secure a custom DNS name with an SSL binding in Azure App Service
11
+
# Secure a custom DNS name with a TLS/SSL binding in Azure App Service
12
12
13
13
This article shows you how to secure the [custom domain](app-service-web-tutorial-custom-domain.md) in your [App Service app](https://docs.microsoft.com/azure/app-service/) or [function app](https://docs.microsoft.com/azure/azure-functions/) by creating a certificate binding. When you're finished, you can access your App Service app at the `https://` endpoint for your custom DNS name (for example, `https://www.contoso.com`).
14
14
15
-

15
+

16
16
17
17
Securing a [custom domain](app-service-web-tutorial-custom-domain.md) with a certificate involves two steps:
18
18
19
-
-[Add a private certificate to App Service](configure-ssl-certificate.md) that satisfies all the [requirements for SSL bindings](configure-ssl-certificate.md#private-certificate-requirements).
20
-
- Create an SSL binding to the corresponding custom domain. This second step is covered by this article.
19
+
-[Add a private certificate to App Service](configure-ssl-certificate.md) that satisfies all the [private certificate requirements](configure-ssl-certificate.md#private-certificate-requirements).
20
+
- Create a TLS binding to the corresponding custom domain. This second step is covered by this article.
21
21
22
22
In this tutorial, you learn how to:
23
23
@@ -72,17 +72,17 @@ If your app has no certificate for the selected custom domain, then you have two
72
72
73
73
### Create binding
74
74
75
-
Use the following table to help you configure the SSL binding in the **TLS/SSL Binding** dialog, then click **Add Binding**.
75
+
Use the following table to help you configure the TLS binding in the **TLS/SSL Binding** dialog, then click **Add Binding**.
76
76
77
77
| Setting | Description |
78
78
|-|-|
79
-
| Custom domain | The domain name to add the SSL binding for. |
79
+
| Custom domain | The domain name to add the TLS/SSL binding for. |
80
80
| Private Certificate Thumbprint | The certificate to bind. |
81
-
| TLS/SSL Type | <ul><li>**[SNI SSL](https://en.wikipedia.org/wiki/Server_Name_Indication)** - Multiple SNI SSL bindings may be added. This option allows multiple SSL certificates to secure multiple domains on the same IP address. Most modern browsers (including Internet Explorer, Chrome, Firefox, and Opera) support SNI (for more information, see [Server Name Indication](https://wikipedia.org/wiki/Server_Name_Indication)).</li><li>**IP SSL** - Only one IP SSL binding may be added. This option allows only one SSL certificate to secure a dedicated public IP address. After you configure the binding, follow the steps in [Remap A record for IP SSL](#remap-a-record-for-ip-ssl).<br/>IP SSL is supported only in Production or Isolated tiers. </li></ul> |
81
+
| TLS/SSL Type | <ul><li>**[SNI SSL](https://en.wikipedia.org/wiki/Server_Name_Indication)** - Multiple SNI SSL bindings may be added. This option allows multiple TLS/SSL certificates to secure multiple domains on the same IP address. Most modern browsers (including Internet Explorer, Chrome, Firefox, and Opera) support SNI (for more information, see [Server Name Indication](https://wikipedia.org/wiki/Server_Name_Indication)).</li><li>**IP SSL** - Only one IP SSL binding may be added. This option allows only one TLS/SSL certificate to secure a dedicated public IP address. After you configure the binding, follow the steps in [Remap A record for IP SSL](#remap-a-record-for-ip-ssl).<br/>IP SSL is supported only in Production or Isolated tiers. </li></ul> |
82
82
83
-
Once the operation is complete, the custom domain's SSL state is changed to **Secure**.
83
+
Once the operation is complete, the custom domain's TLS/SSL state is changed to **Secure**.
> A **Secure** state in the **Custom domains** means that it is secured with a certificate, but App Service doesn't check if the certificate is self-signed or expired, for example, which can also cause browsers to show an error or warning.
@@ -142,23 +142,23 @@ In your app page, in the left navigation, select **SSL settings**. Then, in **TL
142
142
143
143
When the operation is complete, your app rejects all connections with lower TLS versions.
144
144
145
-
## Handle SSL termination
145
+
## Handle TLS termination
146
146
147
-
In App Service, [SSL termination](https://wikipedia.org/wiki/TLS_termination_proxy) happens at the network load balancers, so all HTTPS requests reach your app as unencrypted HTTP requests. If your app logic needs to check if the user requests are encrypted or not, inspect the `X-Forwarded-Proto` header.
147
+
In App Service, [TLS termination](https://wikipedia.org/wiki/TLS_termination_proxy) happens at the network load balancers, so all HTTPS requests reach your app as unencrypted HTTP requests. If your app logic needs to check if the user requests are encrypted or not, inspect the `X-Forwarded-Proto` header.
148
148
149
149
Language specific configuration guides, such as the [Linux Node.js configuration](containers/configure-language-nodejs.md#detect-https-session) guide, shows you how to detect an HTTPS session in your application code.
150
150
151
151
## Automate with scripts
152
152
153
153
### Azure CLI
154
154
155
-
[!code-azurecli[main](../../cli_scripts/app-service/configure-ssl-certificate/configure-ssl-certificate.sh?highlight=3-5 "Bind a custom SSL certificate to a web app")]
155
+
[!code-azurecli[main](../../cli_scripts/app-service/configure-ssl-certificate/configure-ssl-certificate.sh?highlight=3-5 "Bind a custom TLS/SSL certificate to a web app")]
156
156
157
157
### PowerShell
158
158
159
-
[!code-powershell[main](../../powershell_scripts/app-service/configure-ssl-certificate/configure-ssl-certificate.ps1?highlight=1-3 "Bind a custom SSL certificate to a web app")]
159
+
[!code-powershell[main](../../powershell_scripts/app-service/configure-ssl-certificate/configure-ssl-certificate.ps1?highlight=1-3 "Bind a custom TLS/SSL certificate to a web app")]
160
160
161
161
## More resources
162
162
163
-
*[Use an SSL certificate in your application code](configure-ssl-certificate-in-code.md)
163
+
*[Use a TLS/SSL certificate in your code in Azure App Service](configure-ssl-certificate-in-code.md)
164
164
*[FAQ : App Service Certificates](https://docs.microsoft.com/azure/app-service/faq-configuration-and-management/)
Copy file name to clipboardExpand all lines: articles/app-service/configure-ssl-certificate-in-code.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Use SSL certificate in code
2
+
title: Use a TLS/SSL certificate in code
3
3
description: Learn how to use client certificates in your code. Authenticate with remote resources with a client certificate, or run cryptographic tasks with them.
4
4
ms.topic: article
5
5
ms.date: 11/04/2019
@@ -8,13 +8,13 @@ ms.custom: seodec18
8
8
9
9
---
10
10
11
-
# Use an SSL certificate in your code in Azure App Service
11
+
# Use a TLS/SSL certificate in your code in Azure App Service
12
12
13
13
In your application code, you can access the [public or private certificates you add to App Service](configure-ssl-certificate.md). Your app code may act as a client and access an external service that requires certificate authentication, or it may need to perform cryptographic tasks. This how-to guide shows how to use public or private certificates in your application code.
14
14
15
-
This approach to using certificates in your code makes use of the SSL functionality in App Service, which requires your app to be in **Basic** tier or above. If your app is in **Free** or **Shared** tier, you can [include the certificate file in your app repository](#load-certificate-from-file).
15
+
This approach to using certificates in your code makes use of the TLS functionality in App Service, which requires your app to be in **Basic** tier or above. If your app is in **Free** or **Shared** tier, you can [include the certificate file in your app repository](#load-certificate-from-file).
16
16
17
-
When you let App Service manage your SSL certificates, you can maintain the certificates and your application code separately and safeguard your sensitive data.
17
+
When you let App Service manage your TLS/SSL certificates, you can maintain the certificates and your application code separately and safeguard your sensitive data.
18
18
19
19
## Prerequisites
20
20
@@ -116,7 +116,7 @@ var cert = new X509Certificate2(bytes);
116
116
// Use the loaded certificate
117
117
```
118
118
119
-
To see how to load an SSL certificate from a file in Node.js, PHP, Python, Java, or Ruby, see the documentation for the respective language or web platform.
119
+
To see how to load a TLS/SSL certificate from a file in Node.js, PHP, Python, Java, or Ruby, see the documentation for the respective language or web platform.
120
120
121
121
## Load certificate from file
122
122
@@ -129,7 +129,7 @@ If you need to load a certificate file that you upload manually, it's better to
129
129
> az webapp config appsettings set --name <app-name> --resource-group <resource-group-name> --settings WEBSITE_LOAD_USER_PROFILE=1
130
130
> ```
131
131
>
132
-
> This approach to using certificates in your code makes use of the SSL functionality in App Service, which requires your app to be in **Basic** tier or above.
132
+
> This approach to using certificates in your code makes use of the TLS functionality in App Service, which requires your app to be in **Basic** tier or above.
133
133
134
134
The following C# example loads a public certificate from a relative path in your app:
135
135
@@ -144,11 +144,11 @@ var cert = new X509Certificate2(bytes);
144
144
// Use the loaded certificate
145
145
```
146
146
147
-
To see how to load an SSL certificate from a file in Node.js, PHP, Python, Java, or Ruby, see the documentation for the respective language or web platform.
147
+
To see how to load a TLS/SSL certificate from a file in Node.js, PHP, Python, Java, or Ruby, see the documentation for the respective language or web platform.
148
148
149
149
## More resources
150
150
151
-
*[Secure a custom DNS name with an SSL binding](configure-ssl-bindings.md)
151
+
*[Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md)
0 commit comments