You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/ssl-overview.md
+16-4Lines changed: 16 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: application-gateway
5
5
author: mbender-ms
6
6
ms.service: azure-application-gateway
7
7
ms.topic: concept-article
8
-
ms.date: 10/09/2025
8
+
ms.date: 02/16/2026
9
9
ms.author: mbender
10
10
11
11
# Customer intent: "As a cloud architect, I want to configure end to end TLS on the application gateway, so that I can ensure secure communication and compliance for sensitive data transmitted between clients and backend servers."
@@ -125,10 +125,22 @@ The following tables outline the differences in SNI between the v1 and v2 SKU in
125
125
| --- | --- | --- |
126
126
| If the client specifies SNI header and all the multi-site listeners are enabled with "Require SNI" flag | Returns the appropriate certificate and if the site doesn't exist (according to the server_name), then the connection is reset. | Returns appropriate certificate if available, otherwise, returns the certificate of the first HTTPS listener according to the order specified by the request routing rules associated with the HTTPS listeners|
127
127
| If the client doesn't specify a SNI header and if all the multi-site headers are enabled with "Require SNI" | Resets the connection | Returns the certificate of the first HTTPS listener according to the order specified by the request routing rules associated with the HTTPS listeners
128
-
| If the client doesn't specify SNI header and if there's a basic listener configured with a certificate | Returns the certificate configured in the basic listener to the client (default or fallback certificate) | Returns the certificate configured in the basic listener |
128
+
| If the client doesn't specify SNI header and if there's a basic listener configured with a certificate | Returns the certificate configured in the basic listener to the client (default or fallback certificate) | Returns the certificate of the HTTPS listener with the highest priority routing rule. The basic listener certificate is **not** used as a fallback. |
129
+
130
+
> [!IMPORTANT]
131
+
> **V2 SKU default certificate behavior:** When a client connects without an SNI header (for example, using an IP address), Application Gateway V2 does **not** fall back to a basic listener's certificate. Instead, it always returns the certificate from the HTTPS listener whose associated request routing rule has the **highest priority** (lowest priority number). This behavior differs from the V1 SKU, which returns the basic listener's certificate as a fallback.
132
+
133
+
> [!TIP]
134
+
> **Controlling the default certificate with an SNI hole:** To prevent Application Gateway V2 from exposing a production site certificate when clients connect by IP address without SNI, you can configure an "SNI hole":
135
+
>
136
+
> 1. Create a **multi-site HTTPS listener** with a dummy hostname that doesn't match any real site (for example, `sni-hole.invalid`).
137
+
> 2. Upload a **self-signed certificate** to this listener.
138
+
> 3. Create a **request routing rule** associated with this listener and assign it the **highest priority** (lowest priority number) among all your rules.
139
+
>
140
+
> With this configuration, any connection without a matching SNI header receives the self-signed certificate instead of a valid site certificate. This prevents IP-only connections from obtaining information about your hosted sites.
129
141
130
142
> [!NOTE]
131
-
> When the client does not specify an SNI header, it is recommended that the user add a basic listener and rule to present a default SSL/TLS certificate.
143
+
> For the V1 SKU, when the client doesn't specify an SNI header, it's recommended that the user add a basic listener and rule to present a default SSL/TLS certificate.
132
144
133
145
> [!TIP]
134
146
> The SNI flag can be configured with PowerShell or by using an ARM template. For more information, see [RequireServerNameIndication](/powershell/module/az.network/set-azapplicationgatewayhttplistener#-requireservernameindication) and [Quickstart: Direct web traffic with Azure Application Gateway - ARM template](quick-create-template.md#review-the-template).
@@ -140,7 +152,7 @@ The following tables outline the differences in SNI between the v1 and v2 SKU in
140
152
141
153
|Scenario | v1 | v2 |
142
154
| --- | --- | --- |
143
-
| When an FQDN or SNI is configured | Set as FQDN from the backend pool. As per [RFC 6066](https://tools.ietf.org/html/rfc6066), literal IPv4 and IPv6 addresses aren't permitted in SNI hostname. | The SNI value is set based on the [TLS validation type](configuration-http-settings.md?tabs=backendhttpsettings#backend-https-validation-settings) in the Backend Settings.<br><br> 1. **Complete validation** – The probes uses the SNI in the following order of precedence:<br> a) Custom Health Probe's hostname <br> b) Backend Setting's hostname (as per Overridden value or Pick from backend server) <br><br> 2. **Configurable** <br> Use specific SNI: The probes use this fixed hostname for validation.<br> Skip SNI: No Subject Name validation.
155
+
| When an FQDN or SNI is configured | Set as FQDN from the backend pool. As per [RFC 6066](https://tools.ietf.org/html/rfc6066), literal IPv4 and IPv6 addresses aren't permitted in SNI hostname. | The SNI value is set based on the [TLS validation type](configuration-http-settings.md?tabs=backendhttpsettings#backend-https-validation-settings) in the Backend Settings.<br><br> 1. **Complete validation** – The probe uses the SNI in the following order of precedence:<br> a) Custom Health Probe's hostname <br> b) Backend Setting's hostname (as per Overridden value or Pick from backend server) <br><br> 2. **Configurable** <br> Use specific SNI: The probes use this fixed hostname for validation.<br> Skip SNI: No Subject Name validation.
144
156
| When an FQDN or SNI is NOT configured (only IP address is available) | SNI (server_name) won’t be set. <br> **Note:** In this case, the backend server should be able to return a default/fallback certificate and this should be allow-listed in HTTP settings under authentication certificate. If there’s no default/fallback certificate configured in the backend server and SNI is expected, the server might reset the connection and will lead to probe failures | If the Custom Probe or Backend Settings use an IP address in the hostname field, the SNI is not set, in accordance with [RFC 6066](https://tools.ietf.org/html/rfc6066). This includes cases where the default probe uses 127.0.0.1. |
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-arm-userestapi-createorupdatepolicy.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Create backup policies via REST API in Azure Backup
3
3
description: In this article, you'll learn how to create and manage backup policies (schedule and retention) using REST API.
4
4
ms.topic: how-to
5
-
ms.date: 02/25/2025
5
+
ms.date: 02/16/2026
6
6
ms.assetid: 5ffc4115-0ae5-4b85-a18c-8a942f6d4870
7
7
ms.service: azure-backup
8
8
ms.custom: engagement-fy24
@@ -16,7 +16,7 @@ This article describes how to create policies for the backup of Azure VM, SQL da
16
16
17
17
Learn more about [creating or modifying a backup policy for an Azure Recovery Services vault by using REST API](/rest/api/backup/protection-policies/create-or-update).
18
18
19
-
## Create or update a policy
19
+
## Create or update a policy in Azure Recovery Services vault
20
20
21
21
To create or update an Azure Backup policy, use the following *PUT* operation.
22
22
@@ -26,7 +26,7 @@ PUT https://management.azure.com/Subscriptions/{subscriptionId}/resourceGroups/{
26
26
27
27
The `{policyName}` and `{vaultName}` are provided in the URI. Additional information is provided in the request body.
28
28
29
-
## Create the request body
29
+
## Create the request body for Azure VM backup policy
30
30
31
31
If you want to create a policy for Azure VM backup, the request body needs to have the following components:
32
32
@@ -685,7 +685,7 @@ This policy:
685
685
686
686
---
687
687
688
-
## Responses
688
+
## Responses for backup policy creation or update
689
689
690
690
The backup policy creation/update is a [asynchronous operation](../azure-resource-manager/management/async-operations.md). It means this operation creates another operation that needs to be tracked separately.
Copy file name to clipboardExpand all lines: articles/backup/tutorial-configure-backup-aks.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: "Tutorial: Configure item-level backup for an Azure Kubernetes Service cluster"
3
3
description: Learn how to configure backup for an Azure Kubernetes Service (AKS) cluster, and use Azure Backup to back up specific items from the cluster.
Copy file name to clipboardExpand all lines: articles/frontdoor/front-door-faq.yml
+20-1Lines changed: 20 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -127,6 +127,10 @@ sections:
127
127
Can AFD provide protection from ‘HTTP/2 Rapid Reset’ DDoS attacks?
128
128
answer: |
129
129
Yes. For more information, see [Microsoft response to DDoS attacks against HTTP/2](front-door-ddos.md).
130
+
- question: |
131
+
Can I force traffic from one country/region to use a specific Azure Front Door POP in another country/region?
132
+
answer: |
133
+
No. Azure Front Door can't force client traffic to a specific POP. Requests are routed to the nearest available edge location for performance and reliability. If you need to restrict access by geography, use Azure Web Application Firewall (WAF) custom rules with `GeoMatch` conditions. This approach allows or blocks requests based on client country/region, but it doesn't reroute those clients to a different POP in another country/region. For example, if you block country/region A, requests from clients in country/region A are blocked regardless of which POP would have served them. For more information, see [Geo-filtering in Azure WAF for Azure Front Door](../web-application-firewall/afds/waf-front-door-geo-filtering.md).
130
134
- question: |
131
135
Does Azure Front Door preserve `x-forwarded-for` headers?
132
136
answer: |
@@ -138,6 +142,21 @@ sections:
138
142
answer: |
139
143
To use Azure Front Door Standard, or (classic) tier, you need a public IP or a DNS name that can be resolved publicly. This requirement of a public IP or a DNS name that can be resolved publicly allows Azure Front Door to route traffic to your backend resources. You can use Azure resources like Application Gateways or Azure Load Balancers to route traffic to resources in a virtual network. If you use Front Door Premium tier, you can use Private Link to connect to origins behind an internal load balancer with a private endpoint. For more information, see [Secure origins with Private Link](private-link.md).
140
144
145
+
- question: |
146
+
Can I use Private Link to connect Azure Front Door to Azure Key Vault?
147
+
answer: |
148
+
No. For security, Azure Front Door supports only managed identity-based authentication when accessing certificates in Key Vault. For more information, see [Use managed identities in Azure Front Door](managed-identity.md).
149
+
150
+
- question: |
151
+
Does Azure Front Door support managed identity with Azure Event Hub?
152
+
answer: |
153
+
No. Azure Front Door doesn't currently support managed identity integration with Azure Event Hub.
154
+
155
+
- question: |
156
+
Does Azure Front Door support custom error pages?
157
+
answer: |
158
+
No. Azure Front Door doesn't currently support custom error pages.
159
+
141
160
- name: Deploying Front Door with other services
142
161
questions:
143
162
- question: |
@@ -244,7 +263,7 @@ sections:
244
263
- question: |
245
264
Azure Front Door Privatelink integration is not supported in the region where my origin is located. What do I do?
246
265
answer: |
247
-
Azure Front Door Private Link feature is region agnostic and will work even if you choose a region that is different from the region where your origin is located. In such cases, to ensure lower latency, you should always pick an Azure region closest to your origin when choosing to enable Azure Front Door Private Link endpoint. We are in the process of enabling support for more regions. Once a new region is supported, you can follow these [instructions](blue-green-deployment.md) to gradually shift traffic to the new region.
266
+
The Azure Front Door Private Link feature is region agnostic but for the best latency, you should always pick an Azure region closest to your origin when choosing to enable Azure Front Door Private Link endpoint. If your origin's region isn't supported in the list of regions Front Door Private Link supports, pick the next nearest region. Traffic flows from the client to the Azure Front Door Private Link endpoint in the supported region, then traverses the Microsoft backbone network to your origin, maintaining private connectivity. Be aware that this configuration introduces additional latency due to the extra network hop between regions. You can use [Azure network round-trip latency statistics](../networking/azure-network-latency.md) to determine the additional latency due to choosing the next nearest region. Once a new region is supported, you can follow these [instructions](blue-green-deployment.md) to gradually shift traffic to the new region.
Copy file name to clipboardExpand all lines: articles/frontdoor/private-link.md
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,7 +72,12 @@ Azure Front Door private link is available in the following regions:
72
72
| US Sec East |||||
73
73
| US Sec West |||||
74
74
75
-
The Azure Front Door Private Link feature is region agnostic but for the best latency, you should always pick an Azure region closest to your origin when choosing to enable Azure Front Door Private Link endpoint. If your origin's region isn't supported in the list of regions Front Door Private Link supports, pick the next nearest region. You can use [Azure network round-trip latency statistics](../networking/azure-network-latency.md) to determine the next nearest region in terms of latency. We are in the process of enabling support for more regions. Once a new region is supported, you can follow these [instructions](blue-green-deployment.md) to gradually shift traffic to the new region.
75
+
> [!NOTE]
76
+
> Azure Front Door Private Link is only available in regions with Availability Zone support. This is to ensure zonal resiliency for region based feature like Private link.
77
+
78
+
The Azure Front Door Private Link feature is region agnostic but for the best latency, you should always pick an Azure region closest to your origin when choosing to enable Azure Front Door Private Link endpoint. If your origin's region isn't supported in the list of regions Front Door Private Link supports, pick the next nearest region. Traffic flows from the client to the Azure Front Door Private Link endpoint in the supported region, then traverses the Microsoft backbone network to your origin, maintaining private connectivity. Be aware that this configuration introduces additional latency due to the extra network hop between regions.
79
+
80
+
You can use [Azure network round-trip latency statistics](../networking/azure-network-latency.md) to determine the additional latency due to choosing the next nearest region. Once a new region is supported, you can follow these [instructions](blue-green-deployment.md) to gradually shift traffic to the new region.
76
81
77
82
## Association of a private endpoint with an Azure Front Door profile
Copy file name to clipboardExpand all lines: articles/hdinsight/hdinsight-with-entra-authentication/manage-entra-id-enabled-azure-hdinsight-clusters-with-arm-templates.md
+21Lines changed: 21 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -264,6 +264,27 @@ To create a Microsoft.HDInsight/clusters resource, add the following JSON to you
264
264
}
265
265
}
266
266
```
267
+
## Troubleshooting
268
+
269
+
### Issue
270
+
The problem occurs with the restAuthEntraUsers value in the gateway configuration. Azure Resource Manager (ARM) treats any string that starts with [ as an ARM expression. As a result, when ARM encounters the JSON array value, it attempts to interpret it as an ARM function, which causes the deployment to fail.
271
+
272
+
### Resolution
273
+
To prevent ARM from interpreting the value as an expression, escape the opening bracket by using [[ instead of [. This forces ARM to treat the value as a literal string and pass it through correctly to HDInsight.
Copy file name to clipboardExpand all lines: articles/migrate/best-practices-least-privileged-account.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,6 +19,9 @@ The Azure Migrate appliance is a lightweight tool that discovers on-premises ser
19
19
20
20
To use these features, you add server and guest credentials in the appliance configuration manager. Following the principle of least privilege helps keep the setup secure and efficient.
21
21
22
+
>[!IMPORTANT]
23
+
> In addition to configuring least‑privileged credentials for the Azure Migrate appliance, ensure that users are assigned the appropriate Azure Migrate built‑in roles in Azure. These roles provide the minimum required permissions for discovery, assessment, and migration activities. [Learn more](prepare-azure-accounts.md).
24
+
22
25
## Discovery of the VMware estate
23
26
24
27
To discover the basic settings of servers running in the VMware estate, you need the following permissions.
Copy file name to clipboardExpand all lines: articles/migrate/create-project.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,8 +27,10 @@ Ensure you have the correct permissions to create a project using the following
27
27
28
28
1. In the Azure portal, open the relevant subscription, and select **Access control (IAM)**.
29
29
2. In **Check access**, find the relevant account, and select it and view permissions. You should have *Azure Migrate Owner* or a role with higher permissions. [Learn more](prepare-azure-accounts.md).
30
-
> [!Note]
31
-
> Starting November 2025, only users assigned the **Azure Migrate Owner** or a higher privileged role will be able to create Azure Migrate projects. Users without these role assignments will no longer have the required permissions to create new projects.
30
+
31
+
> [!NOTE]
32
+
> - Starting November 2025, only users assigned the **Azure Migrate Owner** or a higher privileged role will be able to create Azure Migrate projects. Users without these role assignments will no longer have the required permissions to create new projects.
33
+
> - For the required Azure Migrate built‑in roles and permission details to create a project and run discovery, assessments, and migrations, see [Prepare Azure accounts for Azure Migrate](prepare-azure-accounts.md).
Copy file name to clipboardExpand all lines: articles/migrate/discovered-metadata.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -298,6 +298,8 @@ Published date | `apt-get -s dist-upgrade, yum -q check-update, zypper list-upda
298
298
299
299
> [!NOTE]
300
300
> If your Red Hat Enterprise Linux (RHEL) servers use `yum` and aren't patched regularly, pending updates data can consume storage in the cache under `var\tmp\yum\-<username>`. To manage disk space, it is recommended to clear the cache regularly.
301
+
>
302
+
> To disable discovery of pending updates, visit 'HKLM:\SOFTWARE\Microsoft\AzureAppliance' and set the registry of type 'REG_DWORD EnablePendingUpdatesDiscovery' to 0. You must restart the appliance after setting the registry to ensure changes are reflected. To re-enable discovery of pending updates, set the registry 'EnablePendingUpdatesDiscovery' to 1.
0 commit comments