Skip to content

Commit 7fcb4d7

Browse files
Update troubleshoot-azure-app-service-certificates.md
1 parent ba00834 commit 7fcb4d7

1 file changed

Lines changed: 8 additions & 8 deletions

File tree

support/azure/app-service/troubleshoot-azure-app-service-certificates.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.custom: sap:auto-renewal
1212
---
1313
# Troubleshoot Azure App Service certificates
1414

15-
Azure App Service certificates provide a convenient way to purchase, provision, and manage SSL/TLS certificates for Azure App Services. This article helps developers and administrators systematically diagnose and fix issues that affect App Service certificates. See the following sections:
15+
Azure App Service certificates provide a convenient way to purchase, provision, and manage SSL/TLS certificates for Azure App Services. This article helps developers and admins systematically diagnose and fix issues that affect App Service certificates. See the following sections:
1616

1717
- [Step-by-step troubleshooting flow](#step-by-step-troubleshooting-flow): A sequence of checks and actions to resolve certificate problems, including portal and command-line steps.
1818

@@ -106,7 +106,7 @@ Domain **ownership verification** is important because Azure doesn't issue or re
106106
standard certificates. It doesn't work if **HTTPS Only** is enabled on
107107
your site.
108108

109-
- **Domain Verification:** This method creates a .txt file if you host
109+
- **Domain Verification:** This method creates a DNS .txt file if you host
110110
your domain by using an App Service domain.
111111

112112
2. After you initiate verification, select **Refresh** until you see
@@ -201,7 +201,7 @@ job.
201201

202202
> [!NOTE]
203203
> **Rekey** is used to change the certificate's key. **Sync**
204-
updates bindings with the current certificate.
204+
updates bindings by adding the current certificate.
205205

206206
**For Azure CLI**
207207

@@ -335,8 +335,8 @@ error:
335335
default Azure certificate might appear if you use the
336336
*\*.azurewebsites.net* domain that has a custom domain requirement.
337337

338-
- Because DNS caching can direct you to an old IP, clear the DNS cache if you recently changed a record (in Windows, located at
339-
*ipconfig/flushdns*).
338+
- Because DNS caching can direct you to an old IP, clear the DNS cache if you recently changed a record (in Windows, run
339+
`ipconfig/flushdns`).
340340

341341
- If a wrong certificate appears in the custom domain, it might
342342
indicate the mixed SNI and IP bindings scenario that was previously discussed.
@@ -475,7 +475,7 @@ an Azure notification or email message that states that a certificate is expirin
475475
verification. The renewal stayed in a *Pending issuance* state, and the old certificate eventually expired.
476476

477477
- **Key Vault permission issue:** Azure tried to renew but couldn't
478-
update the Key Vault secret because the required access was missing.
478+
update the Key Vault secret because the required access permissions were missing.
479479

480480
- **Payment or subscription issue (for purchase renewals):** Renewal can fail if both the following conditions are true:
481481
- The certificate is a paid App Service certificate.
@@ -666,15 +666,15 @@ After you complete the setup, you find that your web app can't use the certifica
666666
policies or delete and re-create the vault without reinitializing the
667667
certificate.
668668

669-
- **User access versus system access:** If your Azure AD tenant has
669+
- **User access versus system access:** If your Microsoft Entra ID tenant has
670670
policies (such as Conditional Access) that interfere with the back-end
671671
service principals' ability to access the Key Vault, this issue might block
672672
the sync. Typically, the service principles operate outside of those
673673
constraints. Make sure that Key Vault isn't using only private endpoints or a
674674
firewall that can block Azure services. (Azure Key Vault should allow
675675
trusted Azure services, if you're using that feature.)
676676

677-
- **App configuration (local permissions):** If your code tries to load the certificate from the store, and you see an *Access denied* message or something similar, you might have to adjust the app's identity or permissions to match how you export the certificate. This situation is rare. By default, the certificate that's bound to your web app is made available to the worker process. A managed identity isn't necessary if you want only to use an App Service certificate in the web app. This is true because this task is usually handled by the platform. However, if you explicitly upload a certificate that has a password, you might have to add an app setting to grant access (**WEBSITE_LOAD_CERTIFICATES** setting).
677+
- **App configuration (local permissions):** If your code tries to load the certificate from the local computer certificate store, and you see an *Access denied* message or something similar, you might have to adjust the app's identity or permissions to match how you export the certificate. This situation is rare. By default, the certificate that's bound to your web app is made available to the worker process. A managed identity isn't necessary if you want only to use an App Service certificate in the web app. This is true because this task is usually handled by the platform. However, if you explicitly upload a certificate that has a password, you might have to add an app setting to grant access (**WEBSITE_LOAD_CERTIFICATES** setting).
678678

679679
**Solutions**
680680

0 commit comments

Comments
 (0)