You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-apps/client-certificate-authorization.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,19 +12,18 @@ ms.author: cshoe
12
12
# Configure client certificate authentication in Azure Container Apps
13
13
14
14
Azure Container Apps supports client certificate authentication (also known as mutual TLS or mTLS) that allows access to your container app through two-way authentication. This article shows you how to configure client certificate authorization in Azure Container Apps.
15
-
15
+
16
16
When client certificates are used, the TLS certificates are exchanged between the client and your container app to authenticate identity and encrypt traffic. Client certificates are often used in "zero trust" security models to authorize client access within an organization.
17
17
18
18
For example, you may want to require a client certificate for a container app that manages sensitive data.
19
19
20
20
Container Apps accepts client certificates in the PKCS12 format are that issued by a trusted certificate authority (CA), or are self-signed.
21
21
22
-
>[!NOTE]
23
-
> Client certificate authorization is only supported in Container Apps environments that use a [custom VNET](vnet-custom.md).
24
-
25
22
## Configure client certificate authorization
26
23
27
-
The client certificate mode property available as you enable [ingress](./ingress-how-to.md) on your container app. The property can be set to one of the following values:
24
+
Set the `clientCertificateMode` property in your container app template to configure support of client certificates.
25
+
26
+
The property can be set to one of the following values:
28
27
29
28
-`require`: The client certificate is required for all requests to the container app.
30
29
-`accept`: The client certificate is optional. If the client certificate isn't provided, the request is still accepted.
Copy file name to clipboardExpand all lines: articles/container-apps/ingress-overview.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,10 +23,10 @@ Ingress supports:
23
23
-[Traffic splitting between revisions](#traffic-splitting)
24
24
-[Session affinity](#session-affinity)
25
25
26
-
<!--
27
-
> [!NOTE]
28
-
> Add diagram here, Talked with Anthony about this. He thought that we should consult Ahmed. I think that we should have a diagram that shows the ingress options and how they work together.
29
-
-->
26
+
Example ingress configuration showing ingress split between two revisions:
27
+
28
+
:::image type="content" source="media/ingress/ingress-diagram.png" alt-text="Diagram showing an ingress configuration splitting traffic between two revisions.":::
29
+
30
30
For configuration details, see [Configure ingress](ingress-how-to.md).
31
31
32
32
## External and internal ingress
@@ -85,6 +85,8 @@ You can access your app in the following ways:
85
85
- A custom domain name: You can configure a custom DNS domain for your Container Apps environment. For more information, see [Custom domain names and certificates](./custom-domains-certificates.md).
86
86
- The app name: You can use the app name for communication between apps in the same environment.
87
87
88
+
To get the FQDN for your app, see [Location](connect-apps.md#location).
89
+
88
90
## IP restrictions
89
91
90
92
Container Apps supports IP restrictions for ingress. You can create rules to either configure IP addresses that are allowed or denied access to your container app. For more information, see [Configure IP restrictions](ip-restrictions.md).
Copy file name to clipboardExpand all lines: articles/container-apps/ip-restrictions.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,9 +19,9 @@ There are two types of restrictions:
19
19
**Allow*: Allow inbound traffic only from address ranges you specify in allow rules.
20
20
**Deny*: Deny all inbound traffic only from address ranges you specify in deny rules.
21
21
22
-
If no IP restriction rules are defined, all inbound traffic is allowed.
22
+
when no IP restriction rules are defined, all inbound traffic is allowed.
23
23
24
-
IP restrictions are defined by one or more rules with the following properties:
24
+
IP restrictions rules contain the following properties:
25
25
26
26
| Property | Value | Description |
27
27
|----------|-------|-------------|
@@ -30,7 +30,7 @@ IP restrictions are defined by one or more rules with the following properties:
30
30
| ipAddressRange | IP address range in CIDR format | The IP address range in CIDR notation. |
31
31
| action | Allow or Deny | The action to take for the rule. |
32
32
33
-
The ipAddressRange parameter accepts IPv4 addresses. Define each IPv4 address block in [Classless Inter-Domain Routing (CIDR)](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) notation.
33
+
The `ipAddressRange` parameter accepts IPv4 addresses. Define each IPv4 address block in [Classless Inter-Domain Routing (CIDR)](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) notation.
34
34
35
35
> [!NOTE]
36
36
> All rules must be the same type. You cannot combine allow rules and deny rules.
@@ -108,7 +108,7 @@ Add more rules by repeating the command with a different `--rule-name` and -`--i
108
108
109
109
#### Create allow rules
110
110
111
-
The following example `az containerapp access-restriction set` command creates a rule to restrict inbound access to a IP address range. Note that you must delete any existing deny rules before you can add allow rules.
111
+
The following example `az containerapp access-restriction set` command creates a rule to restrict inbound access to an IP address range. You must delete any existing deny rules before you can add any allow rules.
112
112
113
113
Replace the values in the following example with your own values.
114
114
@@ -126,7 +126,7 @@ You can add to the allow rules by repeating the command with a different `--ip-a
126
126
127
127
#### Create deny rules
128
128
129
-
The following example of the `az containerapp access-restriction set` command creates an access rule to deny inbound traffic from a specified IP range. Note that you must delete any existing allow rules before you can add deny rules.
129
+
The following example of the `az containerapp access-restriction set` command creates an access rule to deny inbound traffic from a specified IP range. You must delete any existing allow rules before you can add deny rules.
130
130
131
131
Replace the placeholders in the following example with your own values.
132
132
@@ -146,7 +146,7 @@ You can add to the deny rules by repeating the command with a different `--ip-ad
146
146
147
147
You can update a rule using the `az containerapp ingress access-restriction set` command. You can change the IP address range and the rule description, but not the rule name or action.
148
148
149
-
The `--action` parameter is required, but you cannot change the action from Allow to Deny or vice versa.
149
+
The `--action` parameter is required, but you can't change the action from Allow to Deny or vice versa.
150
150
If you omit the `---description` parameter, the description is deleted.
151
151
152
152
The following example updates the ip address range.
Copy file name to clipboardExpand all lines: articles/container-apps/sticky-sessions.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ Session affinity, also known as sticky sessions, is a feature that allows you to
18
18
19
19
Session stickiness is enforced using HTTP cookies. This feature is available in single revision mode when HTTP ingress is enabled. A client may be routed to a new replica if the previous replica is no longer available.
20
20
21
-
If your app doesn't require session affinity, we recommend that you don't enable it. This allows the ingress to distribute requests more evenly across replicas, which improves the performance of your app.
21
+
If your app doesn't require session affinity, we recommend that you don't enable it. With session affinity disabled, ingress distributes requests more evenly across replicas improving the performance of your app.
22
22
23
23
Note session affinity is only supported when your app is in [single revision mode](revisions.md#single-revision-mode) and the ingress type is HTTP.
0 commit comments