Skip to content

Commit ec6ad0e

Browse files
authored
Merge pull request #110184 from TimShererWithAquent/us1679050de
Change SSL to TLS per 1679050 (1 of 2)
2 parents 6ae5670 + c644bb0 commit ec6ad0e

10 files changed

+47
-47
lines changed

articles/app-service/app-service-plan-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ You can move an app to another App Service plan, as long as the source plan and
5656
4. If you create a plan, you can select the pricing tier of the new plan. In **Pricing Tier**, select the existing tier to change it.
5757

5858
> [!IMPORTANT]
59-
> If you're moving an app from a higher-tiered plan to a lower-tiered plan, such as from **D1** to **F1**, the app may lose certain capabilities in the target plan. For example, if your app uses SSL certificates, you might see this error message:
59+
> If you're moving an app from a higher-tiered plan to a lower-tiered plan, such as from **D1** to **F1**, the app may lose certain capabilities in the target plan. For example, if your app uses TLS/SSL certificates, you might see this error message:
6060
>
6161
> `Cannot update the site with hostname '<app_name>' because its current SSL configuration 'SNI based SSL enabled' is not allowed in the target compute mode. Allowed SSL configuration is 'Disabled'.`
6262

articles/app-service/app-service-web-configure-tls-mutual-auth.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Exclusion paths can be configured by selecting **Configuration** > **General Set
3737

3838
## Access client certificate
3939

40-
In App Service, SSL termination of the request happens at the frontend load balancer. When forwarding the request to your app code with [client certificates enabled](#enable-client-certificates), App Service injects an `X-ARR-ClientCert` request header with the client certificate. App Service does not do anything with this client certificate other than forwarding it to your app. Your app code is responsible for validating the client certificate.
40+
In App Service, TLS termination of the request happens at the frontend load balancer. When forwarding the request to your app code with [client certificates enabled](#enable-client-certificates), App Service injects an `X-ARR-ClientCert` request header with the client certificate. App Service does not do anything with this client certificate other than forwarding it to your app. Your app code is responsible for validating the client certificate.
4141

4242
For ASP.NET, the client certificate is available through the **HttpRequest.ClientCertificate** property.
4343

articles/app-service/app-service-web-tutorial-custom-domain.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ It might take some time for the new custom domain to be reflected in the app's *
147147
![CNAME record added](./media/app-service-web-tutorial-custom-domain/cname-record-added.png)
148148

149149
> [!NOTE]
150-
> A **Not Secure** label for your custom domain means that it's not yet bound to an SSL certificate, and any HTTPS request from a browser to your custom domain will receive and error or warning, depending on the browser. To add an SSL binding, see [Secure a custom DNS name with an SSL binding in Azure App Service](configure-ssl-bindings.md).
150+
> A **Not Secure** label for your custom domain means that it's not yet bound to a TLS/SSL certificate, and any HTTPS request from a browser to your custom domain will receive and error or warning, depending on the browser. To add a TLS binding, see [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md).
151151
152152
If you missed a step or made a typo somewhere earlier, you see a verification error at the bottom of the page.
153153

@@ -231,7 +231,7 @@ It might take some time for the new custom domain to be reflected in the app's *
231231
![A record added](./media/app-service-web-tutorial-custom-domain/a-record-added.png)
232232

233233
> [!NOTE]
234-
> A **Not Secure** label for your custom domain means that it's not yet bound to an SSL certificate, and any HTTPS request from a browser to your custom domain will receive and error or warning, depending on the browser. To add an SSL binding, see [Secure a custom DNS name with an SSL binding in Azure App Service](configure-ssl-bindings.md).
234+
> A **Not Secure** label for your custom domain means that it's not yet bound to a TLS/SSL certificate, and any HTTPS request from a browser to your custom domain will receive and error or warning, depending on the browser. To add a TLS binding, see [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md).
235235
236236
If you missed a step or made a typo somewhere earlier, you see a verification error at the bottom of the page.
237237

@@ -286,7 +286,7 @@ Select the **+** icon again to add another custom domain that matches the wildca
286286
![CNAME record added](./media/app-service-web-tutorial-custom-domain/cname-record-added-wildcard2.png)
287287

288288
> [!NOTE]
289-
> A **Note Secure** label for your custom domain means that it's not yet bound to an SSL certificate, and any HTTPS request from a browser to your custom domain will receive and error or warning, depending on the browser. To add an SSL binding, see [Secure a custom DNS name with an SSL binding in Azure App Service](configure-ssl-bindings.md).
289+
> A **Note Secure** label for your custom domain means that it's not yet bound to a TLS/SSL certificate, and any HTTPS request from a browser to your custom domain will receive and error or warning, depending on the browser. To add a TLS binding, see [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md).
290290
291291
## Test in browser
292292

@@ -362,7 +362,7 @@ In this tutorial, you learned how to:
362362
> * Redirect the default URL to a custom directory
363363
> * Automate domain mapping with scripts
364364
365-
Advance to the next tutorial to learn how to bind a custom SSL certificate to a web app.
365+
Advance to the next tutorial to learn how to bind a custom TLS/SSL certificate to a web app.
366366

367367
> [!div class="nextstepaction"]
368-
> [Secure a custom DNS name with an SSL binding in Azure App Service](configure-ssl-bindings.md)
368+
> [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md)

articles/app-service/app-service-web-tutorial-nodejs-mongodb-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ module.exports = {
194194
};
195195
```
196196

197-
The `ssl=true` option is required because [Cosmos DB requires SSL](../cosmos-db/connect-mongodb-account.md#connection-string-requirements).
197+
The `ssl=true` option is required due to [connection string requirements](../cosmos-db/connect-mongodb-account.md#connection-string-requirements).
198198

199199
Save your changes.
200200

articles/app-service/app-service-web-tutorial-php-mysql.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -263,9 +263,9 @@ Save the changes.
263263
> To secure your MySQL connection information, this file is already excluded from the Git repository (See _.gitignore_ in the repository root). Later, you learn how to configure environment variables in App Service to connect to your database in Azure Database for MySQL. With environment variables, you don't need the *.env* file in App Service.
264264
>
265265
266-
### Configure SSL certificate
266+
### Configure TLS/SSL certificate
267267

268-
By default, Azure Database for MySQL enforces SSL connections from clients. To connect to your MySQL database in Azure, you must use the [_.pem_ certificate supplied by Azure Database for MySQL](../mysql/howto-configure-ssl.md).
268+
By default, Azure Database for MySQL enforces TLS connections from clients. To connect to your MySQL database in Azure, you must use the [_.pem_ certificate supplied by Azure Database for MySQL](../mysql/howto-configure-ssl.md).
269269

270270
Open _config/database.php_ and add the `sslmode` and `options` parameters to `connections.mysql`, as shown in the following code.
271271

articles/app-service/configure-common.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ Here, you can configure some common settings for the app. Some settings require
168168
- **Managed pipeline version**: The IIS [pipeline mode]. Set it to **Classic** if you have a legacy app that requires an older version of IIS.
169169
- **HTTP version**: Set to **2.0** to enable support for [HTTPS/2](https://wikipedia.org/wiki/HTTP/2) protocol.
170170
> [!NOTE]
171-
> Most modern browsers support HTTP/2 protocol over TLS only, while non-encrypted traffic continues to use HTTP/1.1. To ensure that client browsers connect to your app with HTTP/2, [secure your custom DNS name with an SSL binding in Azure App Service](configure-ssl-bindings.md).
171+
> Most modern browsers support HTTP/2 protocol over TLS only, while non-encrypted traffic continues to use HTTP/1.1. To ensure that client browsers connect to your app with HTTP/2, secure your custom DNS name. For more information, see [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md).
172172
- **ARR affinity**: In a multi-instance deployment, ensure that the client is routed to the same instance for the life of the session. You can set this option to **Off** for stateless applications.
173173
- **Debugging**: Enable remote debugging for [ASP.NET](troubleshoot-dotnet-visual-studio.md#remotedebug), [ASP.NET Core](/visualstudio/debugger/remote-debugging-azure), or [Node.js](containers/configure-language-nodejs.md#debug-remotely) apps. This option turns off automatically after 48 hours.
174174
- **Incoming client certificates**: require client certificates in [mutual authentication](app-service-web-configure-tls-mutual-auth.md).
@@ -243,7 +243,7 @@ See [Configure a custom Linux container for Azure App Service](containers/config
243243

244244
- [Configure a custom domain name in Azure App Service]
245245
- [Set up staging environments in Azure App Service]
246-
- [Secure a custom DNS name with an SSL binding in Azure App Service](configure-ssl-bindings.md)
246+
- [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md)
247247
- [Enable diagnostic logs](troubleshoot-diagnostic-logs.md)
248248
- [Scale an app in Azure App Service]
249249
- [Monitoring basics in Azure App Service]

articles/app-service/configure-ssl-bindings.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Secure a custom DNS with an SSL binding
2+
title: Secure a custom DNS with a TLS/SSL binding
33
description: Secure HTTPS access to your custom domain by creating a TLS/SSL binding with a certificate. Improve your website's security by enforcing HTTPS or TLS 1.2.
44
tags: buy-ssl-certificates
55

@@ -8,16 +8,16 @@ ms.date: 10/25/2019
88
ms.reviewer: yutlin
99
ms.custom: seodec18
1010
---
11-
# Secure a custom DNS name with an SSL binding in Azure App Service
11+
# Secure a custom DNS name with a TLS/SSL binding in Azure App Service
1212

1313
This article shows you how to secure the [custom domain](app-service-web-tutorial-custom-domain.md) in your [App Service app](https://docs.microsoft.com/azure/app-service/) or [function app](https://docs.microsoft.com/azure/azure-functions/) by creating a certificate binding. When you're finished, you can access your App Service app at the `https://` endpoint for your custom DNS name (for example, `https://www.contoso.com`).
1414

15-
![Web app with custom SSL certificate](./media/configure-ssl-bindings/app-with-custom-ssl.png)
15+
![Web app with custom TLS/SSL certificate](./media/configure-ssl-bindings/app-with-custom-ssl.png)
1616

1717
Securing a [custom domain](app-service-web-tutorial-custom-domain.md) with a certificate involves two steps:
1818

19-
- [Add a private certificate to App Service](configure-ssl-certificate.md) that satisfies all the [requirements for SSL bindings](configure-ssl-certificate.md#private-certificate-requirements).
20-
- Create an SSL binding to the corresponding custom domain. This second step is covered by this article.
19+
- [Add a private certificate to App Service](configure-ssl-certificate.md) that satisfies all the [private certificate requirements](configure-ssl-certificate.md#private-certificate-requirements).
20+
- Create a TLS binding to the corresponding custom domain. This second step is covered by this article.
2121

2222
In this tutorial, you learn how to:
2323

@@ -72,17 +72,17 @@ If your app has no certificate for the selected custom domain, then you have two
7272
7373
### Create binding
7474

75-
Use the following table to help you configure the SSL binding in the **TLS/SSL Binding** dialog, then click **Add Binding**.
75+
Use the following table to help you configure the TLS binding in the **TLS/SSL Binding** dialog, then click **Add Binding**.
7676

7777
| Setting | Description |
7878
|-|-|
79-
| Custom domain | The domain name to add the SSL binding for. |
79+
| Custom domain | The domain name to add the TLS/SSL binding for. |
8080
| Private Certificate Thumbprint | The certificate to bind. |
81-
| TLS/SSL Type | <ul><li>**[SNI SSL](https://en.wikipedia.org/wiki/Server_Name_Indication)** - Multiple SNI SSL bindings may be added. This option allows multiple SSL certificates to secure multiple domains on the same IP address. Most modern browsers (including Internet Explorer, Chrome, Firefox, and Opera) support SNI (for more information, see [Server Name Indication](https://wikipedia.org/wiki/Server_Name_Indication)).</li><li>**IP SSL** - Only one IP SSL binding may be added. This option allows only one SSL certificate to secure a dedicated public IP address. After you configure the binding, follow the steps in [Remap A record for IP SSL](#remap-a-record-for-ip-ssl).<br/>IP SSL is supported only in Production or Isolated tiers. </li></ul> |
81+
| TLS/SSL Type | <ul><li>**[SNI SSL](https://en.wikipedia.org/wiki/Server_Name_Indication)** - Multiple SNI SSL bindings may be added. This option allows multiple TLS/SSL certificates to secure multiple domains on the same IP address. Most modern browsers (including Internet Explorer, Chrome, Firefox, and Opera) support SNI (for more information, see [Server Name Indication](https://wikipedia.org/wiki/Server_Name_Indication)).</li><li>**IP SSL** - Only one IP SSL binding may be added. This option allows only one TLS/SSL certificate to secure a dedicated public IP address. After you configure the binding, follow the steps in [Remap A record for IP SSL](#remap-a-record-for-ip-ssl).<br/>IP SSL is supported only in Production or Isolated tiers. </li></ul> |
8282

83-
Once the operation is complete, the custom domain's SSL state is changed to **Secure**.
83+
Once the operation is complete, the custom domain's TLS/SSL state is changed to **Secure**.
8484

85-
![SSL binding successful](./media/configure-ssl-bindings/secure-domain-finished.png)
85+
![TLS/SSL binding successful](./media/configure-ssl-bindings/secure-domain-finished.png)
8686

8787
> [!NOTE]
8888
> A **Secure** state in the **Custom domains** means that it is secured with a certificate, but App Service doesn't check if the certificate is self-signed or expired, for example, which can also cause browsers to show an error or warning.
@@ -142,23 +142,23 @@ In your app page, in the left navigation, select **SSL settings**. Then, in **TL
142142

143143
When the operation is complete, your app rejects all connections with lower TLS versions.
144144

145-
## Handle SSL termination
145+
## Handle TLS termination
146146

147-
In App Service, [SSL termination](https://wikipedia.org/wiki/TLS_termination_proxy) happens at the network load balancers, so all HTTPS requests reach your app as unencrypted HTTP requests. If your app logic needs to check if the user requests are encrypted or not, inspect the `X-Forwarded-Proto` header.
147+
In App Service, [TLS termination](https://wikipedia.org/wiki/TLS_termination_proxy) happens at the network load balancers, so all HTTPS requests reach your app as unencrypted HTTP requests. If your app logic needs to check if the user requests are encrypted or not, inspect the `X-Forwarded-Proto` header.
148148

149149
Language specific configuration guides, such as the [Linux Node.js configuration](containers/configure-language-nodejs.md#detect-https-session) guide, shows you how to detect an HTTPS session in your application code.
150150

151151
## Automate with scripts
152152

153153
### Azure CLI
154154

155-
[!code-azurecli[main](../../cli_scripts/app-service/configure-ssl-certificate/configure-ssl-certificate.sh?highlight=3-5 "Bind a custom SSL certificate to a web app")]
155+
[!code-azurecli[main](../../cli_scripts/app-service/configure-ssl-certificate/configure-ssl-certificate.sh?highlight=3-5 "Bind a custom TLS/SSL certificate to a web app")]
156156

157157
### PowerShell
158158

159-
[!code-powershell[main](../../powershell_scripts/app-service/configure-ssl-certificate/configure-ssl-certificate.ps1?highlight=1-3 "Bind a custom SSL certificate to a web app")]
159+
[!code-powershell[main](../../powershell_scripts/app-service/configure-ssl-certificate/configure-ssl-certificate.ps1?highlight=1-3 "Bind a custom TLS/SSL certificate to a web app")]
160160

161161
## More resources
162162

163-
* [Use an SSL certificate in your application code](configure-ssl-certificate-in-code.md)
163+
* [Use a TLS/SSL certificate in your code in Azure App Service](configure-ssl-certificate-in-code.md)
164164
* [FAQ : App Service Certificates](https://docs.microsoft.com/azure/app-service/faq-configuration-and-management/)

articles/app-service/configure-ssl-certificate-in-code.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Use SSL certificate in code
2+
title: Use a TLS/SSL certificate in code
33
description: Learn how to use client certificates in your code. Authenticate with remote resources with a client certificate, or run cryptographic tasks with them.
44
ms.topic: article
55
ms.date: 11/04/2019
@@ -8,13 +8,13 @@ ms.custom: seodec18
88

99
---
1010

11-
# Use an SSL certificate in your code in Azure App Service
11+
# Use a TLS/SSL certificate in your code in Azure App Service
1212

1313
In your application code, you can access the [public or private certificates you add to App Service](configure-ssl-certificate.md). Your app code may act as a client and access an external service that requires certificate authentication, or it may need to perform cryptographic tasks. This how-to guide shows how to use public or private certificates in your application code.
1414

15-
This approach to using certificates in your code makes use of the SSL functionality in App Service, which requires your app to be in **Basic** tier or above. If your app is in **Free** or **Shared** tier, you can [include the certificate file in your app repository](#load-certificate-from-file).
15+
This approach to using certificates in your code makes use of the TLS functionality in App Service, which requires your app to be in **Basic** tier or above. If your app is in **Free** or **Shared** tier, you can [include the certificate file in your app repository](#load-certificate-from-file).
1616

17-
When you let App Service manage your SSL certificates, you can maintain the certificates and your application code separately and safeguard your sensitive data.
17+
When you let App Service manage your TLS/SSL certificates, you can maintain the certificates and your application code separately and safeguard your sensitive data.
1818

1919
## Prerequisites
2020

@@ -116,7 +116,7 @@ var cert = new X509Certificate2(bytes);
116116
// Use the loaded certificate
117117
```
118118

119-
To see how to load an SSL certificate from a file in Node.js, PHP, Python, Java, or Ruby, see the documentation for the respective language or web platform.
119+
To see how to load a TLS/SSL certificate from a file in Node.js, PHP, Python, Java, or Ruby, see the documentation for the respective language or web platform.
120120

121121
## Load certificate from file
122122

@@ -129,7 +129,7 @@ If you need to load a certificate file that you upload manually, it's better to
129129
> az webapp config appsettings set --name <app-name> --resource-group <resource-group-name> --settings WEBSITE_LOAD_USER_PROFILE=1
130130
> ```
131131
>
132-
> This approach to using certificates in your code makes use of the SSL functionality in App Service, which requires your app to be in **Basic** tier or above.
132+
> This approach to using certificates in your code makes use of the TLS functionality in App Service, which requires your app to be in **Basic** tier or above.
133133
134134
The following C# example loads a public certificate from a relative path in your app:
135135
@@ -144,11 +144,11 @@ var cert = new X509Certificate2(bytes);
144144
// Use the loaded certificate
145145
```
146146
147-
To see how to load an SSL certificate from a file in Node.js, PHP, Python, Java, or Ruby, see the documentation for the respective language or web platform.
147+
To see how to load a TLS/SSL certificate from a file in Node.js, PHP, Python, Java, or Ruby, see the documentation for the respective language or web platform.
148148

149149
## More resources
150150

151-
* [Secure a custom DNS name with an SSL binding](configure-ssl-bindings.md)
151+
* [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md)
152152
* [Enforce HTTPS](configure-ssl-bindings.md#enforce-https)
153153
* [Enforce TLS 1.1/1.2](configure-ssl-bindings.md#enforce-tls-versions)
154154
* [FAQ : App Service Certificates](https://docs.microsoft.com/azure/app-service/faq-configuration-and-management/)

0 commit comments

Comments
 (0)