You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-websocket.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ It's used in apps that benefit from fast, real-time communication, such as chat,
22
22
23
23
To establish a WebSocket connection, a specific HTTP-based handshake is exchanged between the client and the server. If successful, the application-layer protocol is "upgraded" from HTTP to WebSockets, using the previously established TCP connection. Once this occurs, HTTP is completely out of the picture; data can be sent or received using the WebSocket protocol by both endpoints, until the WebSocket connection is closed.
@@ -62,7 +62,7 @@ An existing HTTP listener can be used to support WebSocket traffic. The followin
62
62
63
63
## BackendAddressPool, BackendHttpSetting, and Routing rule configuration
64
64
65
-
A BackendAddressPool is used to define a backend pool with WebSocket enabled servers. The backendHttpSetting is defined with a backend port 80 and 443. The properties for cookie-based affinity and requestTimeouts are not relevant to WebSocket traffic. There is no change required in the routing rule, 'Basic' is used to tie the appropriate listener to the corresponding backend address pool.
65
+
A BackendAddressPool is used to define a backend pool with WebSocket enabled servers. The backendHttpSetting is defined with a backend port 80 and 443. The request timeout value in HTTP Settings also applies to the WebSocket session. There is no change required in the routing rule, which is used to tie the appropriate listener to the corresponding backend address pool.
Copy file name to clipboardExpand all lines: articles/application-gateway/end-to-end-ssl-portal.md
+29-17Lines changed: 29 additions & 17 deletions
Original file line number
Diff line number
Diff line change
@@ -14,13 +14,13 @@ ms.custom: mvc
14
14
This article shows you how to use the Azure portal to configure end-to-end SSL encryption with an application gateway v1 SKU.
15
15
16
16
> [!NOTE]
17
-
> Application Gateway v2 SKU requires trusted root certificates for enabling end-to-end configuration. Portal support for adding trusted root certificates is not available yet. Therefore, in case of v2 SKU see [configure end-to-end SSL using PowerShell](https://docs.microsoft.com/azure/application-gateway/application-gateway-end-to-end-ssl-powershell).
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
20
20
21
21
## Before you begin
22
22
23
-
To configure end-to-end SSL with an application gateway, a certificate is required for the gateway and certificates are required for the back-end servers. The gateway certificate is used to derive a symmetric key as per SSL protocol specification. The symmetric key is then used to encrypt and decrypt the traffic sent to the gateway. For end-to-end SSL encryption, the back end must be whitelisted with the application gateway. To do this, upload the public certificate of the back-end servers, also known as authentication certificates, to the application gateway. Adding the certificate ensures that the application gateway only communicates with known back-end instances. This further secures the end-to-end communication.
23
+
To configure end-to-end SSL with an Application Gateway, a certificate is required for the gateway and certificates are required for the back-end servers. The gateway certificate is used to derive a symmetric key as per SSL protocol specification. The symmetric key is then used to encrypt and decrypt the traffic sent to the gateway. For end-to-end SSL encryption, the right back-end servers must be allowed in the application gateway. To do this, upload the public certificate of the back-end servers, also known as Authentication Certificates (v1) or Trusted Root Certificates (v2), to the Application Gateway. Adding the certificate ensures that the Application Gateway only communicates with known back-end instances. This further secures the end-to-end communication.
24
24
25
25
To learn more, see [SSL termination and end-to-end SSL](https://docs.microsoft.com/azure/application-gateway/ssl-overview).
26
26
@@ -32,32 +32,39 @@ To create a new application gateway with end-to-end SSL encryption, you'll need
32
32
33
33
Refer to this article to understand how to [enable SSL termination while creating a new application gateway](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal).
34
34
35
-
### Whitelist certificates for backend servers
35
+
### Add authentication/root certificate of back-end servers
36
36
37
37
1. Select **All resources**, and then select **myAppGateway**.
38
38
39
39
2. Select **HTTP settings** from the left menu. Azure automatically created a default HTTP setting, **appGatewayBackendHttpSettings**, when you created the application gateway.
40
40
41
41
3. Select **appGatewayBackendHttpSettings**.
42
42
43
-
4. Under **Protocol**, select **HTTPS**. A pane for **Backend authentication certificates** will appear.
43
+
4. Under **Protocol**, select **HTTPS**. A pane for **Backend authentication certificates or Trusted root certificates** will appear.
7.Upload the certificate using the **Upload CER certificate** box.
49
+
7.Select the certificate file using the **Upload CER certificate** box.
50
50
51
-
> [!NOTE]
52
-
> The certificate provided in this step should be the public key of the .pfx certificate present on the back end. Export the certificate (not the root certificate) installed on the back-end server in Claim, Evidence, and Reasoning (CER) format and use it in this step. This step whitelists the back end with the application gateway.
51
+
For Standard and WAF (v1) Application Gateways, you should upload the public key of your backend server certificate in .cer format.
For Standard_v2 and WAF_v2 Application Gateways, you should upload the **root certificate** of the backend server certificate in .cer format. If the backend certificate is issued by a well-known CA, you can check the "Use Well Known CA certificate" box and there is no need to upload a certificate.
## Enable end-to-end SSL for existing application gateway
57
64
58
65
To configure an existing application gateway with end-to-end SSL encryption, you'll need to first enable SSL termination in the listener. This will enable SSL encryption for the communication between the client and application gateway. Then, you'll need to whitelist certificates for backend servers in the HTTP settings to enable SSL encryption for the communication between the application gateway and backend servers, accomplishing end-to-end SSL encryption.
59
66
60
-
You'll need to use a listener with HTTPS protocol and certificate for enabling SSL termination. You can't change the protocol of an existing listener. So, you can either choose to use an existing listener with HTTPS protocol and certificate, or create a new listener. In case you choose the former, you can ignore the below mentioned steps to **Enable SSL termination in existing application gateway** and directly move to **Whitelist certificates for backend servers** section. If you choose the latter, use these steps.
67
+
You'll need to use a listener with HTTPS protocol and certificate for enabling SSL termination. So, you can either choose to use an existing listener with HTTPS protocol and certificate, or create a new listener. In case you choose the former, you can ignore the below mentioned steps to **Enable SSL termination in existing application gateway** and directly move to **Add authentication/trusted root certificates for back-end servers** section. If you choose the latter, use these steps.
61
68
62
69
### Enable SSL termination in existing application gateway
63
70
@@ -72,30 +79,35 @@ You'll need to use a listener with HTTPS protocol and certificate for enabling S
72
79
5. Upload the PFX certificate that you intend to use for SSL termination between the client and application gateway.
73
80
74
81
> [!NOTE]
75
-
> For testing purposes, you can use a self-signed certificate. You should not use self-signed certificate for production workloads. Learn how to [create a self-signed certificate](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal#create-a-self-signed-certificate).
82
+
> For testing purposes, you can use a self-signed certificate. but not advised for production workloads as they are harder to manage and not completely secure. Learn how to [create a self-signed certificate](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal#create-a-self-signed-certificate).
76
83
77
84
6. Add other required settings for the **Listener** as per your requirement.
78
85
79
86
7. Select **OK** to save.
80
87
81
-
### Whitelist certificates for backend servers
88
+
### Add authentication/trusted root certificates of back-end servers
82
89
83
90
1. Select **All resources**, and then select **myAppGateway**.
84
91
85
92
2. Select **HTTP settings** from the left menu. You can either whitelist certificates in an existing backend HTTP setting or create a new HTTP setting. In the below step, we will whitelist certificate for the default HTTP setting, **appGatewayBackendHttpSettings**.
86
93
87
94
3. Select **appGatewayBackendHttpSettings**.
88
95
89
-
4. Under **Protocol**, select **HTTPS**. A pane for **Backend authentication certificates** will appear.
96
+
4. Under **Protocol**, select **HTTPS**. A pane for **Backend authentication certificates or Trusted root certificates** will appear.
7.Upload the certificate using the **Upload CER certificate** box.
102
+
7.Select the certificate file using the **Upload CER certificate** box.
96
103
97
-
> [!NOTE]
98
-
> The certificate provided in this step should be the public key of the .pfx certificate present on the back end. Export the certificate (not the root certificate) installed on the back-end server in Claim, Evidence, and Reasoning (CER) format and use it in this step. This step whitelists the back end with the application gateway.
104
+
For Standard and WAF (v1) Application Gateways, you should upload the public key of your backend server certificate in .cer format.
For Standard_v2 and WAF_v2 Application Gateways, you should upload the **root certificate** of the backend server certificate in .cer format. If the backend certificate is issued by a well-known CA, you can check the "Use Well Known CA certificate" box and there is no need to upload a certificate.
0 commit comments