Skip to content

Commit 15d1b9b

Browse files
authored
Merge branch 'main' into appgwpace/cni-overlay-limitations
2 parents 3998b31 + 0b9d6eb commit 15d1b9b

202 files changed

Lines changed: 5759 additions & 1514 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 0 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -5375,51 +5375,6 @@
53755375
"redirect_url": "/azure/role-based-access-control/resource-provider-operations",
53765376
"redirect_document_id": false
53775377
},
5378-
{
5379-
"source_path_from_root": "/articles/scheduler/get-started-portal.md",
5380-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5381-
"redirect_document_id": false
5382-
},
5383-
{
5384-
"source_path_from_root": "/articles/scheduler/scheduler-advanced-complexity.md",
5385-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5386-
"redirect_document_id": false
5387-
},
5388-
{
5389-
"source_path_from_root": "/articles/scheduler/scheduler-concepts-terms.md",
5390-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5391-
"redirect_document_id": false
5392-
},
5393-
{
5394-
"source_path_from_root": "/articles/scheduler/scheduler-high-availability-reliability.md",
5395-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5396-
"redirect_document_id": false
5397-
},
5398-
{
5399-
"source_path_from_root": "/articles/scheduler/scheduler-intro.md",
5400-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5401-
"redirect_document_id": false
5402-
},
5403-
{
5404-
"source_path_from_root": "/articles/scheduler/scheduler-limits-defaults-errors.md",
5405-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5406-
"redirect_document_id": false
5407-
},
5408-
{
5409-
"source_path_from_root": "/articles/scheduler/scheduler-outbound-authentication.md",
5410-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5411-
"redirect_document_id": false
5412-
},
5413-
{
5414-
"source_path_from_root": "/articles/scheduler/scheduler-plans-billing.md",
5415-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5416-
"redirect_document_id": false
5417-
},
5418-
{
5419-
"source_path_from_root": "/articles/scheduler/scheduler-powershell-reference.md",
5420-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5421-
"redirect_document_id": false
5422-
},
54235378
{
54245379
"source_path_from_root": "/articles/sdks/index.yml",
54255380
"redirect_url": "https://azure.microsoft.com/downloads/",
Lines changed: 150 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,150 @@
1+
---
2+
title: Industry-wide certificate changes impacting Azure App Service
3+
description: Describes industry-wide TLS certificate changes that affect Azure App Service Managed Certificates and App Service Certificates, including scope, timelines, and required actions.
4+
author: msangapu-msft
5+
ms.author: msangapu
6+
ms.date: 02/03/2026
7+
ms.topic: conceptual
8+
ms.service: azure-app-service
9+
---
10+
11+
# Industry-wide certificate changes impacting Azure App Service
12+
13+
Industry-wide requirements defined by browser programs and the CA/Browser Forum (CA/B Forum) are changing how public TLS certificates are issued and validated. To remain compliant with these requirements, Azure App Service applies the changes to App Service Managed Certificates (ASMC) and App Service Certificates (ASC).
14+
15+
Most customers using certificates within Azure App Service do not need to take action. However, certain scenarios may require customer action to avoid service disruption or may change how certificates are managed over time. This article explains what is changing, when action is required, and what operational impacts to expect.
16+
17+
18+
## Scope
19+
20+
This article applies to:
21+
- App Service Managed Certificates (ASMC)
22+
- App Service Certificates (ASC)
23+
24+
## When action is required
25+
Action is required **only** in the following scenarios to avoid service disruption:
26+
27+
- **Certificate pinning**
28+
Apps that pin certificates or certificate chains must review and remove pinning before the certificate chain migration.
29+
30+
- **Mutual TLS (mTLS)**
31+
Apps that rely on these certificates for client authentication must transition to an alternative authentication mechanism.
32+
33+
If neither of these scenarios applies, no immediate action is required.
34+
35+
## Operational changes to be aware of
36+
37+
Some scenarios do not require immediate action, but may require changes to how you manage certificates over time:
38+
39+
- **Exporting App Service Certificates**
40+
If you export certificates for use outside Azure App Service, you may need to re-export and update them more frequently due to the shortened validity period.
41+
42+
- **Domain ownership validation (ASC only)**
43+
Domain ownership validation may be required more frequently for certificate issuance, renewals, or rekeys.
44+
45+
46+
## Quick reference: What’s changing
47+
48+
| Change area | Affected certificate type | Customer impact |
49+
|------------|--------------------------|-----------------|
50+
| Certificate validity period | ASC only | Shorter validity with overlapping issuance |
51+
| Domain validation reuse | ASC only | More frequent domain validation required |
52+
| Certificate chain | ASMC and ASC | Certificate pinning must be removed |
53+
| Client authentication EKU | ASMC and ASC | mTLS using these certs no longer supported |
54+
55+
## Certificate validity period (ASC only)
56+
57+
### What’s changing
58+
Starting March 2026, App Service Certificates are issued with a shorter validity period of **198 days** to remain compliant with industry requirements defined by the CA/Browser Forum, including the schedule introduced in
59+
[CA/Browser Forum Ballot SC‑081v3](https://cabforum.org/2025/04/11/ballot-sc081v3-introduce-schedule-of-reducing-validity-and-data-reuse-periods/).
60+
61+
### Impact on App Service Managed Certificates (ASMC)
62+
No change. ASMCs already comply with the new industry requirements.
63+
64+
### Impact on App Service Certificates (ASC)
65+
To maintain one year of certificate coverage, Azure App Service automatically issues overlapping certificates at no additional cost.
66+
67+
- If App Service Certificates are used only with Azure App Service, no action is required. The platform automatically syncs and updates certificates.
68+
- If certificates are exported and used outside Azure App Service, the certificates may need to be re-exported more frequently due to the shorter validity period.
69+
70+
71+
## Domain validation reuse (ASC only)
72+
73+
### What’s changing
74+
Starting March 2026, domain ownership validation for App Service Certificates can be reused for up to **198 days** to remain compliant with industry requirements defined by the CA/Browser Forum.
75+
76+
### Impact on App Service Managed Certificates (ASMC)
77+
No change. Domain ownership validation for ASMC is automated and requires no customer action.
78+
79+
### Impact on App Service Certificates (ASC)
80+
- Domain validation completed before March 2026 cannot be reused. Certificate issuance starting March 2026 requires domain ownership validation.
81+
- During March 2026, domain ownership validation might be required again for each renewal and rekey.
82+
- After March 2026, domain ownership must be revalidated only if the domain was not validated within the past 198 days.
83+
- App Service Certificates do not automatically revalidate domains.
84+
85+
If validation is required, certificate orders remain in a pending issuance state until validation is completed.
86+
87+
> [!IMPORTANT]
88+
> Failure to complete domain validation can result in certificate issuance or renewal failure, potentially leading to certificate expiration and service disruption.
89+
90+
## Client authentication EKU (ASMC and ASC)
91+
92+
App Service Managed Certificates and App Service Certificates will stop supporting the client authentication extended key usage (EKU) as part of industry-driven changes to public TLS certificates.
93+
94+
For background on this change across Azure services, see [Changes to the Managed TLS feature](/azure/security/fundamentals/managed-tls-changes).
95+
96+
> [!NOTE]
97+
> Apps that rely on these certificates for mutual TLS (mTLS) must transition to an alternative authentication mechanism before the migration dates.
98+
99+
100+
## Certificate chain changes (ASMC and ASC)
101+
102+
Both App Service Managed Certificates and App Service Certificates will migrate to a new certificate chain as part of industry-driven updates to TLS certificates, which includes changes to certificate authorities and intermediates.
103+
104+
Apps that pin certificates or certificate chains must review and remove pinning before the migration dates to avoid service disruption.
105+
106+
For background on the managed TLS certificate authority changes across Azure services, see [Changes to the Managed TLS feature](/azure/security/fundamentals/managed-tls-changes).
107+
108+
> [!NOTE]
109+
> Certificate pinning is not recommended for App Service Managed Certificates (ASMC), because certificate issuance and rotation are controlled by the service.
110+
> For App Service Certificates (ASC), pinning may also break due to certificate chain changes and should be reviewed carefully before the migration.
111+
112+
## Timeline of key dates
113+
114+
| Date | Change | ASMC | ASC |
115+
|-----|--------|------|-----|
116+
| Feb–Mar 2026 | New certificate chain | Migrates to new chain ||
117+
| Starting March 2026 | Validity period + validation reuse || Shortened validity and validation reuse |
118+
| Mar–Apr 2026 (TBD) | New certificate chain + Client auth EKU || Migrates to new chain; EKU removed |
119+
| Mar–Apr 2026 (TBD) | Client auth EKU | EKU removed ||
120+
121+
122+
## Frequently asked questions
123+
124+
### Will I lose certificate coverage due to the shorter validity period?
125+
No. For App Service Certificates, Azure App Service automatically issues overlapping certificates to maintain continuous coverage for the full term you purchased.
126+
127+
### Are these changes specific to DigiCert or GoDaddy?
128+
No. These are industry-wide changes driven by browser programs and the CA/Browser Forum, and they apply to public TLS certificates issued by all certificate authorities.
129+
130+
### Do these changes affect certificates from other certificate authorities?
131+
Yes. These are industry-wide changes that apply to public TLS certificates regardless of the issuing certificate authority. For certificates not managed by Azure App Service, contact your certificate authority for guidance.
132+
133+
### Do I need to take action now?
134+
If you do not pin certificates and do not use these certificates for mutual TLS (mTLS), no immediate action is required.
135+
136+
### Why does my App Service Managed Certificate show an expiration date in April 2026 even though it was renewed recently?
137+
App Service Managed Certificates are issued with an approximately six-month validity period, which already complies with current industry requirements.
138+
139+
The April 2026 expiration date is not related to certificate validity changes. It reflects a certificate chain transition that is occurring across the industry to maintain browser trust.
140+
141+
Certificates issued from the existing certificate chain can only be issued until April 2026. To address this, Azure App Service is migrating App Service Managed Certificates to a new certificate chain and reissuing certificates from that chain.
142+
143+
For customers using App Service Managed Certificates as intended, this process is fully automated and no service disruption is expected. As a best practice, App Service Managed Certificates should not be pinned, because both the certificate and its issuing chain are managed and rotated by the platform.
144+
145+
146+
## Related documentation
147+
148+
- App Service Managed Certificates
149+
- App Service Certificates
150+
- Configure TLS/SSL bindings in Azure App Service

articles/app-service/toc.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -352,6 +352,9 @@ items:
352352
- name: Configure TLS mutual authentication
353353
href: app-service-web-configure-tls-mutual-auth.md
354354
displayName: TLS
355+
- name: Industry-wide certificate changes
356+
href: industry-wide-certificate-changes.md
357+
displayName: 2026 certificate changes
355358
- name: Database and service connection
356359
items:
357360
- name: Connectivity scenarios overview

articles/application-gateway/for-containers/how-to-ssl-offloading-gateway-api.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,9 @@ Application Gateway for Containers enables SSL [offloading](/azure/architecture/
2525

2626
## Prerequisites
2727

28+
> [!NOTE]
29+
> Certificates for Application Gateway for Containers must be stored as Kubernetes secrets. Azure Key Vault integration via the [Secrets Store CSI driver](/azure/aks/csi-secrets-store-driver) is not supported because Application Gateway for Containers requires certificates to be local to the cluster and cannot mount them from external volumes. For automated certificate management, consider using [cert-manager with Let's Encrypt](how-to-cert-manager-lets-encrypt-gateway-api.md).
30+
2831
1. If following the BYO deployment strategy, ensure that you set up your Application Gateway for Containers resources and ALB Controller ([Add-on](quickstart-deploy-application-gateway-for-containers-alb-controller-addon.md) or [Helm](quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md))
2932
2. If following the ALB managed deployment strategy, ensure that you provision your ALB Controller ([Add-on](quickstart-deploy-application-gateway-for-containers-alb-controller-addon.md) or [Helm](quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md)) and the Application Gateway for Containers resources via the [ApplicationLoadBalancer custom resource](quickstart-create-application-gateway-for-containers-managed-by-alb-controller.md).
3033
3. Deploy sample HTTPS application

articles/application-gateway/for-containers/how-to-ssl-offloading-ingress-api.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,9 @@ Application Gateway for Containers enables SSL [offloading](/azure/architecture/
2222

2323
## Prerequisites
2424

25+
> [!NOTE]
26+
> Certificates for Application Gateway for Containers must be stored as Kubernetes secrets. Azure Key Vault integration via the [Secrets Store CSI driver](/azure/aks/csi-secrets-store-driver) is not supported because Application Gateway for Containers requires certificates to be local to the cluster and cannot mount them from external volumes. For automated certificate management, consider using [cert-manager with Let's Encrypt](how-to-cert-manager-lets-encrypt-ingress-api.md).
27+
2528
1. If you follow the BYO deployment strategy, ensure that you set up your Application Gateway for Containers resources and ALB Controller ([Add-on](quickstart-deploy-application-gateway-for-containers-alb-controller-addon.md) or [Helm](quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md))
2629
2. If you follow the ALB managed deployment strategy, ensure that you provision your ALB Controller ([Add-on](quickstart-deploy-application-gateway-for-containers-alb-controller-addon.md) or [Helm](quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md)) and the Application Gateway for Containers resources via the [ApplicationLoadBalancer custom resource](quickstart-create-application-gateway-for-containers-managed-by-alb-controller.md).
2730
3. Deploy a sample HTTPS application:

articles/application-gateway/for-containers/migrate-from-agic-to-agc.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -227,6 +227,11 @@ Direct certificate upload and reference to a certificate in Azure Key Vault isn'
227227
228228
Secrets should be stored in [AKS Secret Store](/azure/aks/concepts-security#kubernetes-secrets) and referenced by name.
229229
230+
> [!IMPORTANT]
231+
> Application Gateway for Containers requires certificates to be local to the AKS cluster and cannot mount them from external volumes. As a result, using [Azure Key Vault with the Secrets Store CSI driver](/azure/aks/csi-secrets-store-driver) is not supported for Application Gateway for Containers certificates.
232+
>
233+
> To use certificates from Azure Key Vault, you must first sync them to Kubernetes secrets. Consider using [cert-manager](how-to-cert-manager-lets-encrypt-gateway-api.md) with Let's Encrypt for automated certificate management, or manually import certificates from Key Vault into Kubernetes secrets.
234+
230235
### Establishing backend certificate chain trust
231236
232237
AGIC annotation
@@ -361,7 +366,7 @@ AGIC annotation
361366

362367
Application Gateway for Containers implementation
363368

364-
Request timeouts are nonconfigurable in Application Gateway for Containers. A list of [default timeout values](application-gateway-for-containers-components.md#request-timeouts) are documented.
369+
Request timeouts are nonconfigurable in Application Gateway for Containers. A list of default timeout values are documented in [default timeout values](application-gateway-for-containers-components.md#request-timeouts).
365370

366371
### Frontend port override
367372

articles/application-gateway/for-containers/tls-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Application Gateway for Containers offers two predefined security policies. You
2929
The following table shows the list of cipher suites and minimum protocol version support for each predefined policy. The ordering of the cipher suites determines the priority order during TLS negotiation. To know the exact ordering of the cipher suites for these predefined policies.
3030

3131
| Predefined policy names | 2023-06 | 2023-06-S |
32-
| ---------- | ---------- | ---------- |
32+
| --- | --- | --- |
3333
| **Minimum protocol version** | TLS 1.2 | TLS 1.2 |
3434
| **Enabled protocol versions** | TLS 1.2, TLS 1.3 | TLS 1.2, TLS 1.3 |
3535
| TLS_AES_256_GCM_SHA384 | ✓ | ✓ |

0 commit comments

Comments
 (0)