Skip to content

Commit f4d12f4

Browse files
committed
staged review
1 parent 63bf369 commit f4d12f4

File tree

2 files changed

+7
-6
lines changed

2 files changed

+7
-6
lines changed

articles/app-service/configure-ssl-bindings.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -42,15 +42,16 @@ In the <a href="https://portal.azure.com" target="_blank">Azure portal</a>:
4242

4343
1. In **TLS/SSL type**, choose between **SNI SSL** and **IP based SSL**.
4444

45-
[!INCLUDE [Certificate binding types](../../includes/app-service-ssl-binding-types.md)]
45+
- **[SNI SSL](https://en.wikipedia.org/wiki/Server_Name_Indication)**: Multiple SNI SSL bindings may be added. This option allows multiple TLS/SSL certificates to secure multiple domains on the same IP address. Most modern browsers (including Internet Explorer, Chrome, Firefox, and Opera) support SNI (for more information, see [Server Name Indication](https://wikipedia.org/wiki/Server_Name_Indication)).
46+
- - **IP based SSL**: Only one IP SSL binding may be added. This option allows only one TLS/SSL certificate to secure a dedicated public IP address. After you configure the binding, follow the steps in [2. Remap records for IP based SSL](#2-remap-records-for-ip-based-ssl).<br/>IP SSL is supported only in **Standard** tier or above.
4647

4748
1. When adding a new certificate, validate the new certificate by selecting **Validate**.
4849

4950
1. Select **Add**.
5051

5152
Once the operation is complete, the custom domain's TLS/SSL state is changed to **Secure**.
5253

53-
![TLS/SSL binding successful](./media/configure-ssl-bindings/secure-domain-finished.png)
54+
:::image type="content" source="media/configure-ssl-bindings/secure-domain-finished.png" alt-text="A screenshot showing the custom domain secured by a certificate binding.":::
5455

5556
> [!NOTE]
5657
> A **Secure** state in the **Custom domains** means that it is secured with a certificate, but App Service doesn't check if the certificate is self-signed or expired, for example, which can also cause browsers to show an error or warning.
@@ -87,7 +88,7 @@ Your application code can inspect the protocol via the "x-appservice-proto" head
8788
- [How can I change the minimum TLS versions for the app?](#how-can-i-change-the-minimum-tls-versions-for-the-app)
8889
- [How do I handle TLS termination in App Service?](#how-do-i-handle-tls-termination-in-app-service)
8990

90-
<a name="prevent-ip-changes" />
91+
<a name="prevent-ip-changes"></a>
9192

9293
#### How do I make sure that the app's IP address doesn't change when I make changes to the certificate binding?
9394

@@ -97,19 +98,19 @@ Your inbound IP address can change when you delete a binding, even if that bindi
9798
2. Bind the new certificate to the custom domain you want without deleting the old one. This action replaces the binding instead of removing the old one.
9899
3. Delete the old certificate.
99100

100-
<a name="enforce-https" />
101+
<a name="enforce-https"></a>
101102

102103
#### Can I disable the forced redirect from HTTP to HTTPS?
103104

104105
By default, App Service forces a redirect from HTTP requests to HTTPS. To disable this behavior, see [Configure general settings](configure-common.md#configure-general-settings).
105106

106-
<a name="enforce-tls-versions">
107+
<a name="enforce-tls-versions"></a>
107108

108109
#### How can I change the minimum TLS versions for the app?
109110

110111
Your app allows [TLS](https://wikipedia.org/wiki/Transport_Layer_Security) 1.2 by default, which is the recommended TLS level by industry standards, such as [PCI DSS](https://wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard). To enforce different TLS versions, see [Configure general settings](configure-common.md#configure-general-settings).
111112

112-
<a name="handle-tls-termination">
113+
<a name="handle-tls-termination"></a>
113114

114115
#### How do I handle TLS termination in App Service?
115116

-541 Bytes
Loading

0 commit comments

Comments
 (0)