Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SAAS-19516-Update-Azure-Client-Cert-Enabled #683

Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 6 additions & 6 deletions en/azure/appservice/client-certificates-enabled.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,9 +19,9 @@
1. Log into the Microsoft Azure Management Console.
2. Select the "Search resources, services, and docs" option at the top and search for App Services. </br> <img src="/resources/azure/appservice/client-certificates-enabled/step2.png"/>
3. Select the "App Services" by clicking on the "Name" link to access the configuration changes.</br> <img src="/resources/azure/appservice/client-certificates-enabled/step3.png"/>
4. Scroll down the selected "App Services" navigation panel and in "Settings" click on the "TLS/SSL settings" option.</br <img src="/resources/azure/appservice/client-certificates-enabled/step4.png"/>
5. On the "TLS/SSL settings" page check if "Incoming client certificates" is "ON/OFF". If it's turned "OFF" then it will not block all clients who do not have a valid certificate from accessing the app. </br> <img src="/resources/azure/appservice/client-certificates-enabled/step5.png"/>
6. Repeat steps number 2 - 5 to verify other "Apps" SSL settings in the account.</br>
7. Navigate to the "App Services", select the "App Service" and click on the "Name" as a link to access the configuration, select the "TLS/SSL settings" under "Settings."</br> <img src="/resources/azure/appservice/client-certificates-enabled/step7.png"/>
8. On the "Protocol Settings" page click on the "ON" option next to "Incoming client certificates" which only allows clients with valid certificates to reach the app. </br> <img src="/resources/azure/appservice/client-certificates-enabled/step8.png"/>
9. Repeat above steps to ensures "Client Certificates" are enabled for "App Services", only allowing clients with valid certificates to reach the app. </br>
4. On left navigation panel that opens, click on Configuration tab.</br <img src="/resources/azure/appservice/client-certificates-enabled/step4.png"/>
5. Select General settings tab on the Configuration page that opens. </br> <img src="/resources/azure/appservice/client-certificates-enabled/step5.png"/>
alphadev4 marked this conversation as resolved.
Show resolved Hide resolved
6. Scroll down to check for Incoming client certificates at the bottom and select one of the following "Required", "Allowed", or "Optional", according to requirement.
.</br> <img src="/resources/azure/appservice/client-certificates-enabled/step7.png"/>
7. Repeat above steps to ensures "Client Certificates" are enabled for "App Services", only allowing clients with valid certificates to reach the app. </br>
</br> "NOTE: This plugin shows positive result when HTTP2.0 is enabled"
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/azure/appservice/client-certificates-enabled/step5.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/azure/appservice/client-certificates-enabled/step7.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.