Skip to content

Commit f6a0a74

Browse files
committed
afd custom domain whois note
1 parent 4bac91e commit f6a0a74

File tree

1 file changed

+8
-9
lines changed

1 file changed

+8
-9
lines changed

articles/frontdoor/front-door-custom-domain-https.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,10 @@ author: halkazwini
55
ms.author: halkazwini
66
ms.service: azure-frontdoor
77
ms.topic: how-to
8-
ms.date: 05/15/2025
8+
ms.date: 08/07/2025
9+
ms.custom: build-2025
910

1011
#Customer intent: As a website owner, I want to enable HTTPS on the custom domain in my Front Door (classic) so that my users can use my custom domain to access their content securely.
11-
ms.custom:
12-
- build-2025
1312
---
1413

1514
# Configure HTTPS on an Azure Front Door (classic) custom domain
@@ -76,12 +75,12 @@ To enable HTTPS on a Front Door (classic) custom domain, you need a TLS/SSL cert
7675
### Option 1 (default): Use a certificate managed by Front Door
7776

7877
Using a certificate managed by Azure Front Door Classic allows you to enable HTTPS with a few settings changes. Azure Front Door Classic handles all certificate management tasks, including procurement and renewal. This is supported for custom domains with direct CNAME to Azure Front Door Classic endpoint.
79-
> [!IMPORTANT]
8078

81-
> - As of May 8, 2025, DigiCert no longer supports the WHOIS-based domain validation method. Hence, if your domains with indirect CNAME to Azure Front Door Classic endpoint, you must use the Bring your own certificate feature.
82-
> - Due to the WHOIS-based domain validation, managed certificate issued using WHOIS-based domain validation can't be auto renewed until you have direct CNAME pointed to Azure Front Door Classic.
83-
> - Managed certificates are not available for root or apex domains. If your Azure Front Door Classic custom domain is a root or apex domain, you must use the Bring your own certificate feature.
84-
> - Managed certificate autorenewal requires that your custom domain be directly mapped to your Azure Front Door Classic endpoint by a CNAME record.
79+
> [!IMPORTANT]
80+
> - As of May 8, 2025, DigiCert no longer supports the WHOIS-based domain validation method. If your domain uses an indirect CNAME mapping to Azure Front Door Classic endpoint, you must use the **Bring Your Own Certificate (BYOC)** feature.
81+
> - Due to changes in WHOIS-based domain validation, managed certificates issued using WHOIS-based domain validation can't be autorenewed until you have a direct CNAME pointing to Azure Front Door Classic.
82+
> - Managed certificates aren't available for root or apex domains (for example, `contoso.com`). If your Azure Front Door Classic custom domain is a root or apex domain, you must use the **Bring Your Own Certificate (BYOC)** feature.
83+
> - Managed certificate autorenewal requires that your custom domain be directly mapped to your Azure Front Door Classic endpoint using a CNAME record.
8584
8685
To enable HTTPS on a custom domain:
8786

@@ -96,7 +95,7 @@ To enable HTTPS on a custom domain:
9695
1. Proceed to [Validate the domain](#validate-the-domain).
9796

9897
> [!NOTE]
99-
> - DigiCert’s 64 character limit is enforced for Azure Front Door-managed certificates. Validation will fail if this limit is exceeded.
98+
> - DigiCert’s 64 character limit is enforced for Azure Front Door-managed certificates. Validation fails if this limit is exceeded.
10099
> - Enabling HTTPS via Front Door managed certificate isn't supported for apex/root domains (for example, contoso.com). Use your own certificate for this scenario (see Option 2).
101100
102101
### Option 2: Use your own certificate

0 commit comments

Comments
 (0)