Skip to content

Commit b8e406a

Browse files
authored
Merge branch 'main' into appgwpace/cve-docs-and-key-vault-limitation
2 parents e54e348 + 66ba876 commit b8e406a

169 files changed

Lines changed: 5425 additions & 1271 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 0 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -5375,51 +5375,6 @@
53755375
"redirect_url": "/azure/role-based-access-control/resource-provider-operations",
53765376
"redirect_document_id": false
53775377
},
5378-
{
5379-
"source_path_from_root": "/articles/scheduler/get-started-portal.md",
5380-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5381-
"redirect_document_id": false
5382-
},
5383-
{
5384-
"source_path_from_root": "/articles/scheduler/scheduler-advanced-complexity.md",
5385-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5386-
"redirect_document_id": false
5387-
},
5388-
{
5389-
"source_path_from_root": "/articles/scheduler/scheduler-concepts-terms.md",
5390-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5391-
"redirect_document_id": false
5392-
},
5393-
{
5394-
"source_path_from_root": "/articles/scheduler/scheduler-high-availability-reliability.md",
5395-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5396-
"redirect_document_id": false
5397-
},
5398-
{
5399-
"source_path_from_root": "/articles/scheduler/scheduler-intro.md",
5400-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5401-
"redirect_document_id": false
5402-
},
5403-
{
5404-
"source_path_from_root": "/articles/scheduler/scheduler-limits-defaults-errors.md",
5405-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5406-
"redirect_document_id": false
5407-
},
5408-
{
5409-
"source_path_from_root": "/articles/scheduler/scheduler-outbound-authentication.md",
5410-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5411-
"redirect_document_id": false
5412-
},
5413-
{
5414-
"source_path_from_root": "/articles/scheduler/scheduler-plans-billing.md",
5415-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5416-
"redirect_document_id": false
5417-
},
5418-
{
5419-
"source_path_from_root": "/articles/scheduler/scheduler-powershell-reference.md",
5420-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
5421-
"redirect_document_id": false
5422-
},
54235378
{
54245379
"source_path_from_root": "/articles/sdks/index.yml",
54255380
"redirect_url": "https://azure.microsoft.com/downloads/",
Lines changed: 150 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,150 @@
1+
---
2+
title: Industry-wide certificate changes impacting Azure App Service
3+
description: Describes industry-wide TLS certificate changes that affect Azure App Service Managed Certificates and App Service Certificates, including scope, timelines, and required actions.
4+
author: msangapu-msft
5+
ms.author: msangapu
6+
ms.date: 02/03/2026
7+
ms.topic: conceptual
8+
ms.service: azure-app-service
9+
---
10+
11+
# Industry-wide certificate changes impacting Azure App Service
12+
13+
Industry-wide requirements defined by browser programs and the CA/Browser Forum (CA/B Forum) are changing how public TLS certificates are issued and validated. To remain compliant with these requirements, Azure App Service applies the changes to App Service Managed Certificates (ASMC) and App Service Certificates (ASC).
14+
15+
Most customers using certificates within Azure App Service do not need to take action. However, certain scenarios may require customer action to avoid service disruption or may change how certificates are managed over time. This article explains what is changing, when action is required, and what operational impacts to expect.
16+
17+
18+
## Scope
19+
20+
This article applies to:
21+
- App Service Managed Certificates (ASMC)
22+
- App Service Certificates (ASC)
23+
24+
## When action is required
25+
Action is required **only** in the following scenarios to avoid service disruption:
26+
27+
- **Certificate pinning**
28+
Apps that pin certificates or certificate chains must review and remove pinning before the certificate chain migration.
29+
30+
- **Mutual TLS (mTLS)**
31+
Apps that rely on these certificates for client authentication must transition to an alternative authentication mechanism.
32+
33+
If neither of these scenarios applies, no immediate action is required.
34+
35+
## Operational changes to be aware of
36+
37+
Some scenarios do not require immediate action, but may require changes to how you manage certificates over time:
38+
39+
- **Exporting App Service Certificates**
40+
If you export certificates for use outside Azure App Service, you may need to re-export and update them more frequently due to the shortened validity period.
41+
42+
- **Domain ownership validation (ASC only)**
43+
Domain ownership validation may be required more frequently for certificate issuance, renewals, or rekeys.
44+
45+
46+
## Quick reference: What’s changing
47+
48+
| Change area | Affected certificate type | Customer impact |
49+
|------------|--------------------------|-----------------|
50+
| Certificate validity period | ASC only | Shorter validity with overlapping issuance |
51+
| Domain validation reuse | ASC only | More frequent domain validation required |
52+
| Certificate chain | ASMC and ASC | Certificate pinning must be removed |
53+
| Client authentication EKU | ASMC and ASC | mTLS using these certs no longer supported |
54+
55+
## Certificate validity period (ASC only)
56+
57+
### What’s changing
58+
Starting March 2026, App Service Certificates are issued with a shorter validity period of **198 days** to remain compliant with industry requirements defined by the CA/Browser Forum, including the schedule introduced in
59+
[CA/Browser Forum Ballot SC‑081v3](https://cabforum.org/2025/04/11/ballot-sc081v3-introduce-schedule-of-reducing-validity-and-data-reuse-periods/).
60+
61+
### Impact on App Service Managed Certificates (ASMC)
62+
No change. ASMCs already comply with the new industry requirements.
63+
64+
### Impact on App Service Certificates (ASC)
65+
To maintain one year of certificate coverage, Azure App Service automatically issues overlapping certificates at no additional cost.
66+
67+
- If App Service Certificates are used only with Azure App Service, no action is required. The platform automatically syncs and updates certificates.
68+
- If certificates are exported and used outside Azure App Service, the certificates may need to be re-exported more frequently due to the shorter validity period.
69+
70+
71+
## Domain validation reuse (ASC only)
72+
73+
### What’s changing
74+
Starting March 2026, domain ownership validation for App Service Certificates can be reused for up to **198 days** to remain compliant with industry requirements defined by the CA/Browser Forum.
75+
76+
### Impact on App Service Managed Certificates (ASMC)
77+
No change. Domain ownership validation for ASMC is automated and requires no customer action.
78+
79+
### Impact on App Service Certificates (ASC)
80+
- Domain validation completed before March 2026 cannot be reused. Certificate issuance starting March 2026 requires domain ownership validation.
81+
- During March 2026, domain ownership validation might be required again for each renewal and rekey.
82+
- After March 2026, domain ownership must be revalidated only if the domain was not validated within the past 198 days.
83+
- App Service Certificates do not automatically revalidate domains.
84+
85+
If validation is required, certificate orders remain in a pending issuance state until validation is completed.
86+
87+
> [!IMPORTANT]
88+
> Failure to complete domain validation can result in certificate issuance or renewal failure, potentially leading to certificate expiration and service disruption.
89+
90+
## Client authentication EKU (ASMC and ASC)
91+
92+
App Service Managed Certificates and App Service Certificates will stop supporting the client authentication extended key usage (EKU) as part of industry-driven changes to public TLS certificates.
93+
94+
For background on this change across Azure services, see [Changes to the Managed TLS feature](/azure/security/fundamentals/managed-tls-changes).
95+
96+
> [!NOTE]
97+
> Apps that rely on these certificates for mutual TLS (mTLS) must transition to an alternative authentication mechanism before the migration dates.
98+
99+
100+
## Certificate chain changes (ASMC and ASC)
101+
102+
Both App Service Managed Certificates and App Service Certificates will migrate to a new certificate chain as part of industry-driven updates to TLS certificates, which includes changes to certificate authorities and intermediates.
103+
104+
Apps that pin certificates or certificate chains must review and remove pinning before the migration dates to avoid service disruption.
105+
106+
For background on the managed TLS certificate authority changes across Azure services, see [Changes to the Managed TLS feature](/azure/security/fundamentals/managed-tls-changes).
107+
108+
> [!NOTE]
109+
> Certificate pinning is not recommended for App Service Managed Certificates (ASMC), because certificate issuance and rotation are controlled by the service.
110+
> For App Service Certificates (ASC), pinning may also break due to certificate chain changes and should be reviewed carefully before the migration.
111+
112+
## Timeline of key dates
113+
114+
| Date | Change | ASMC | ASC |
115+
|-----|--------|------|-----|
116+
| Feb–Mar 2026 | New certificate chain | Migrates to new chain ||
117+
| Starting March 2026 | Validity period + validation reuse || Shortened validity and validation reuse |
118+
| Mar–Apr 2026 (TBD) | New certificate chain + Client auth EKU || Migrates to new chain; EKU removed |
119+
| Mar–Apr 2026 (TBD) | Client auth EKU | EKU removed ||
120+
121+
122+
## Frequently asked questions
123+
124+
### Will I lose certificate coverage due to the shorter validity period?
125+
No. For App Service Certificates, Azure App Service automatically issues overlapping certificates to maintain continuous coverage for the full term you purchased.
126+
127+
### Are these changes specific to DigiCert or GoDaddy?
128+
No. These are industry-wide changes driven by browser programs and the CA/Browser Forum, and they apply to public TLS certificates issued by all certificate authorities.
129+
130+
### Do these changes affect certificates from other certificate authorities?
131+
Yes. These are industry-wide changes that apply to public TLS certificates regardless of the issuing certificate authority. For certificates not managed by Azure App Service, contact your certificate authority for guidance.
132+
133+
### Do I need to take action now?
134+
If you do not pin certificates and do not use these certificates for mutual TLS (mTLS), no immediate action is required.
135+
136+
### Why does my App Service Managed Certificate show an expiration date in April 2026 even though it was renewed recently?
137+
App Service Managed Certificates are issued with an approximately six-month validity period, which already complies with current industry requirements.
138+
139+
The April 2026 expiration date is not related to certificate validity changes. It reflects a certificate chain transition that is occurring across the industry to maintain browser trust.
140+
141+
Certificates issued from the existing certificate chain can only be issued until April 2026. To address this, Azure App Service is migrating App Service Managed Certificates to a new certificate chain and reissuing certificates from that chain.
142+
143+
For customers using App Service Managed Certificates as intended, this process is fully automated and no service disruption is expected. As a best practice, App Service Managed Certificates should not be pinned, because both the certificate and its issuing chain are managed and rotated by the platform.
144+
145+
146+
## Related documentation
147+
148+
- App Service Managed Certificates
149+
- App Service Certificates
150+
- Configure TLS/SSL bindings in Azure App Service

articles/app-service/toc.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -352,6 +352,9 @@ items:
352352
- name: Configure TLS mutual authentication
353353
href: app-service-web-configure-tls-mutual-auth.md
354354
displayName: TLS
355+
- name: Industry-wide certificate changes
356+
href: industry-wide-certificate-changes.md
357+
displayName: 2026 certificate changes
355358
- name: Database and service connection
356359
items:
357360
- name: Connectivity scenarios overview

articles/application-gateway/ssl-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: mbender-ms
66
ms.service: azure-application-gateway
77
ms.topic: concept-article
8-
ms.date: 10/09/2025
8+
ms.date: 02/16/2026
99
ms.author: mbender
1010

1111
# Customer intent: "As a cloud architect, I want to configure end to end TLS on the application gateway, so that I can ensure secure communication and compliance for sensitive data transmitted between clients and backend servers."

articles/azure-functions/functions-bindings-azure-data-explorer-input.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ramacg
55
ms.topic: reference
66
ms.custom: build-2023, devx-track-extended-java, devx-track-js, devx-track-python
77
ms.date: 05/04/2023
8-
ms.author: shsagir
8+
ms.author: spelluru
99
ms.reviewer: ramacg
1010
zone_pivot_groups: programming-languages-set-functions-data-explorer
1111
---

articles/azure-functions/functions-bindings-azure-data-explorer-output.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ramacg
55
ms.topic: reference
66
ms.custom: build-2023, devx-track-extended-java, devx-track-js, devx-track-python
77
ms.date: 05/04/2023
8-
ms.author: shsagir
8+
ms.author: spelluru
99
ms.reviewer: ramacg
1010
zone_pivot_groups: programming-languages-set-functions-data-explorer
1111
---

articles/azure-functions/functions-bindings-azure-data-explorer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ramacg
55
ms.topic: reference
66
ms.custom: build-2023, devx-track-extended-java, devx-track-js, devx-track-python
77
ms.date: 05/04/2023
8-
ms.author: shsagir
8+
ms.author: spelluru
99
ms.reviewer: ramacg
1010
zone_pivot_groups: programming-languages-set-functions-data-explorer
1111
---

articles/azure-vmware/configure-storage-policy.md

Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -171,6 +171,84 @@ Run the `Update-StoragePolicyOfUnassociatedVsanObjects` cmdlet to modify curre
171171

172172
3. Check **Notifications** to see the progress.
173173

174+
## Delete unassociated vSAN objects using Run Command
175+
176+
Unassociated vSAN objects can remain in a cluster due to interrupted operations, policy mismatches, or failed workflows. These objects consume storage capacity and may block certain cluster operations.
177+
178+
This article explains how to **list** and **delete** unassociated vSAN objects in **Azure VMware Solution (AVS)** using **Run Command**.
179+
180+
### Prerequisites
181+
182+
Before listing or deleting unassociated vSAN objects, ensure that:
183+
184+
- You have access to the Azure portal with permissions equivalent to the **cloudadmin** role for the AVS private cloud.
185+
- The cluster meets the minimum host requirements for its vSAN configuration (OSA or ESA).
186+
- You are using the latest supported version of the **Microsoft.AVS.Management** Run Command package.
187+
- You have validated that the objects to be deleted are **not required** by any workload, management VM, or system component.
188+
189+
### List unassociated vSAN objects
190+
191+
Before deleting any objects, list and review them to confirm that they are truly unassociated.
192+
193+
Use the **Get‑UnassociatedVsanObjectsWithPolicy** Run Command to list unassociated vSAN objects and obtain their UUIDs.
194+
195+
For detailed steps, see:
196+
197+
- [List storage policies for Unassociated objects](configure-storage-policy.md#list-storage-policies-for-unassociated-objects)
198+
199+
The output of this command includes the **UUID** of each unassociated vSAN object, which is required for deletion.
200+
201+
202+
### Delete unassociated vSAN objects
203+
204+
After reviewing the list of unassociated objects, delete them **individually** by specifying their UUID and ClusterName.
205+
206+
> [!IMPORTANT]
207+
> Deleting a vSAN object is irreversible. Ensure that the object is not associated with any VM, management component, or system service before proceeding.
208+
209+
### Run Command parameters: `Remove-AvsUnassociatedObject`
210+
211+
| Field | Description |
212+
|------|-------------|
213+
| **UUID** | UUID of the unassociated vSAN object to delete. Obtain this value from the output of `Get‑UnassociatedVsanObjectsWithPolicy`. |
214+
| **ClusterName** | Name of the vSAN cluster that contains the unassociated object. |
215+
| **Retain up to** | Retention period for the Run Command output. |
216+
| **Specify name for execution** | Alphanumeric name used to identify this Run Command execution. |
217+
| **Timeout** | Time after which the command exits if it does not complete. |
218+
219+
1. Navigate to your AVS private cloud in the Azure portal.
220+
2. Select **Run command** > **Packages** > **Microsoft.AVS.Management**.
221+
3. Select **Remove-AvsUnassociatedObject**.
222+
223+
:::image type="content" source="media/run-command/run-command-overview-remove-unassociated-object.png" alt-text="Screenshot showing the Remove-AvsUnassociatedObject Run Command in the Azure portal." lightbox="media/run-command/run-command-overview-remove-unassociated-object.png":::
224+
225+
4. Provide the **UUID** and **ClusterName** of the unassociated object you want to remove.
226+
227+
:::image type="content" source="media/run-command/run-command-remove-unassociated-object.png" alt-text="Screenshot of the Remove-AvsUnassociatedObject Run Command execution." lightbox="media/run-command/run-command-remove-unassociated-object.png":::
228+
229+
5. Select **Run** and monitor execution progress.
230+
231+
Once the command completes successfully, the specified vSAN object is permanently removed from the cluster.
232+
233+
### Best practices and safety guidance
234+
235+
- Always **list objects first** and review them carefully before deletion.
236+
- Delete objects **one at a time** to minimize risk.
237+
- Avoid deleting objects with names or attributes associated with:
238+
- Management VMs
239+
- vCenter
240+
- NSX
241+
- HCX
242+
- SRM
243+
- Backup or replication components
244+
- If you are unsure about an object, do not delete it and investigate further.
245+
246+
### Next steps
247+
248+
- Review storage policy assignments to prevent future unassociated objects.
249+
- Monitor vSAN health checks regularly.
250+
- Use Run Command outputs and retention settings to maintain auditability.
251+
174252
## Specify a storage policy for a cluster
175253

176254
Run the `Set-ClusterDefaultStoragePolicy` cmdlet to specify a default storage policy for a cluster.
136 KB
Loading
115 KB
Loading

0 commit comments

Comments
 (0)