You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#customer intent: As an Azure App Service administrator, I want to understand upcoming changes to managed certificates so that I can ensure my applications remain secure and compliant.
10
10
---
11
11
12
-
# App Service Managed Certificate (ASMC) changes – July 28, 2025
12
+
# App Service Managed Certificate Changes – July 2025 and November 2025 Updates
13
+
This article summarizes updates to App Service Managed Certificates (ASMC) introduced in July 2025 and November 2025. With the November 2025 update, ASMC now remains supported even if the site is not publicly accessible, provided all other requirements are met. Details on requirements, exceptions, and validation steps are included below.
13
14
15
+
## November 2025 update
16
+
Starting November 2025, App Service now allows DigiCert's requests to the `https://<hostname>/.well-known/pki-validation/fileauth.txt` endpoint, even if the site blocks public access. When DigiCert tries to reach the validation endpoint, [App Service front ends](/archive/msdn-magazine/2017/february/azure-inside-the-azure-app-service-architecture#front-end) present the token, and the request terminates at the front end layer. DigiCert's request does not reach the [workers](/archive/msdn-magazine/2017/february/azure-inside-the-azure-app-service-architecture#web-workers) running the application.
17
+
18
+
This behavior is now the default for ASMC issuance for initial certificate creation and renewals. Customers do not need to specifically allow DigiCert's IP addresses.
19
+
20
+
### Exceptions and Unsupported Scenarios
21
+
This update addresses most scenarios that restrict public access, including App Service Authentication, disabling public access, IP restrictions, private endpoints, and client certificates. However, a public DNS record is still required. For example, sites using a private endpoint with a custom domain on a private DNS cannot validate domain ownership and obtain a certificate.
22
+
23
+
Even with all validations now relying on HTTP token validation and DigiCert requests being allowed through, certain configurations are still not supported for ASMC:
24
+
- Sites configured as "Nested" or "External" endpoints behind Traffic Manager. Only "Azure" endpoints are supported.
25
+
- Certificates requested for domains ending in *.trafficmanager.net are not supported.
26
+
27
+
### Testing
28
+
Customers can easily test whether their site’s configuration or set-up supports ASMC by attempting to create one for their site. If the initial request succeeds, renewals should also work, provided all requirements are met and the site is not listed in an unsupported scenario.
29
+
30
+
## July 2025 update
14
31
Starting July 28, 2025, Azure App Service Managed Certificates (ASMC) are subject to new issuance and renewal requirements due to DigiCert’s migration to a new validation platform. This change is driven by industry-wide compliance with Multi-Perspective Issuance Corroboration (MPIC).
15
32
16
33
For a detailed explanation of the underlying changes at DigiCert, refer to [changes to the managed Transport Layer Security (TLS) feature](../security/fundamentals/managed-tls-changes.md).
17
34
18
-
## What’s changing
19
-
20
-
**Validation method update**: ASMC now uses HTTP Token validation for both apex and subdomains. Previously, subdomains were validated using CNAME records, which did not require public access. With HTTP Token, DigiCert must reach a specific endpoint on your app to verify domain ownership.
35
+
**Validation method update**: ASMC now uses HTTP Token validation for both apex and subdomains. Previously, subdomains were validated using CNAME records, which did not require public access. With HTTP Token, DigiCert must reach `https://<hostname>/.well-known/pki-validation/fileauth.txt` endpoint on your app to verify domain ownership.
21
36
22
37
App Service automatically places the required token at the correct path for validation. This process applies to both initial certificate issuance and renewals, meaning:
23
38
@@ -28,71 +43,24 @@ App Service automatically places the required token at the correct path for vali
28
43
> [!IMPORTANT]
29
44
> While App Service continues to handle token placement automatically during renewals, DigiCert must still reach the validation endpoint on your app. Public access is still required at the time of renewal. If your app is not publicly accessible, renewal fails even if the token is correctly placed.
30
45
31
-
## Impacted scenarios
46
+
## Impacted scenarios as of November 2025
32
47
33
48
You can't create or renew ASMCs if your:
34
-
- Site is not publicly accessible:
35
-
- Public accessibility to your app is required. If your app is only accessible through private configurations, such as requiring a client certificate, disabling public network access, using private endpoints, or applying IP restrictions, you can't create or renew a managed certificate.
36
-
- Other configurations that restrict public access, such as firewalls, authentication gateways, or custom access policies, may also affect eligibility for managed certificate issuance or renewal.
37
-
38
49
- Site is an Azure Traffic Manager "nested" or "external" endpoint:
39
50
- Only "Azure Endpoints" on Traffic Manager is supported for certificate creation and renewal.
40
51
- "Nested endpoints" and "External endpoints" is not supported.
- Certificates for _*.trafficmanager.net_ domains is not supported for creation or renewal.
43
54
44
55
Existing certificates remain valid until expiration (up to six months), but will not renew automatically if your configuration is unsupported.
45
56
46
57
> [!NOTE]
47
58
> In addition to the new changes, all existing ASMC requirements still apply. Refer to [App Service Managed Certificate documentation](configure-ssl-certificate.md#create-a-free-managed-certificate) for more information.
48
59
49
-
## Identify impacted resources
60
+
## Identify impacted resources as of November 2025
50
61
You can use [Azure Resource Graph (ARG)](https://portal.azure.com/?feature.customPortal=false#view/HubsExtension/ArgQueryBlade) queries to help identify resources that may be affected under each scenario. These queries are provided as a starting point and may not capture every configuration. Review your environment for any unique setups or custom configurations.
51
62
52
-
### Scenario 1: Site is not publicly accessible
53
-
This ARG query retrieves a list of sites that either have the public network access property disabled or are configured to use client certificates. It then filters for sites that are using App Service Managed Certificates (ASMC) for their custom hostname SSL bindings. These certificates are the ones that could be affected by the upcoming changes. However, this query does not provide complete coverage, as there may be other configurations impacting public access to your app that are not included here. Ultimately, this query serves as a helpful guide for users, but a thorough review of your environment is recommended. You can copy this query, paste it into [ARG Explorer](https://portal.azure.com/?feature.customPortal=false#view/HubsExtension/ArgQueryBlade), and then click "Run query" to view the results for your environment.
54
-
55
-
> [!NOTE]
56
-
> ARG can only retrive site property values (ie. client certificate and public network access), however it cannot retrieve any site config values (ie. IP restrictions). If you would like to retrive both site properties and site config values as well, you can refer to this [PowerShell script from GitHub](https://github.com/nimccoll/AppServiceManagedCertificates).
57
-
>
58
-
59
-
```kql
60
-
// ARG Query: Identify App Service sites that commonly restrict public access and use ASMC for custom hostname SSL bindings
61
-
resources
62
-
| where type == "microsoft.web/sites"
63
-
// Extract relevant properties for public access and client certificate settings
### Scenario 2: Site is an Azure Traffic Manager "nested" or "external" endpoint
63
+
### Scenario 1: Site is an Azure Traffic Manager "nested" or "external" endpoint
96
64
If your App Service uses custom domains routed through **Azure Traffic Manager**, you may be impacted if your profile includes **external** or **nested endpoints**. These endpoint types are not supported for certificate issuance or renewal under the new validation.
97
65
98
66
To help identify affected Traffic Manager profiles across your subscriptions, we recommend using [this PowerShell script](https://github.com/nimccoll/NonAzureTrafficManagerEndpoints) developed by the Microsoft team. It scans for profiles with non-Azure endpoints and outputs a list of potentially impacted resources.
@@ -109,7 +77,7 @@ To run the script:
109
77
.\TrafficManagerNonAzureEndpoints.ps1
110
78
```
111
79
112
-
### Scenario 3: Site relies on_*.trafficmanager.net_ domains
This ARG query helps you identify App Service Managed Certificates (ASMC) that were issued to _*.trafficmanager.net domains_. In addition, it also checks whether any web apps are currently using those certificates for custom domain SSL bindings. You can copy this query, paste it into [ARG Explorer](https://portal.azure.com/?feature.customPortal=false#view/HubsExtension/ArgQueryBlade), and then click "Run query" to view the results for your environment.
Apps that are not accessible from the public internet cannot create or renew ASMCs. These configurations may include restrictions enforced through private endpoints, firewalls, IP filtering, client certificates, authentication gateways, or custom access policies.
151
-
152
-
We recognize that making applications publicly accessible may conflict with customer security policies or introduce risk. The recommended mitigation is to replace ASMC with a custom certificate and update the TLS/SSL binding for your custom domain.
153
-
154
-
**Recommended steps:**
155
-
156
-
1.**Acquire a certificate for your custom domain**
157
-
You may use any certificate provider that meets your security and operational requirements. The certificate should be compatible with Azure App Service and ideally stored in Azure Key Vault for easier management.
158
-
159
-
2.**Add the certificate to the site**
160
-
After acquiring a certificate for your custom domain, you need to upload it to your App Service app and configure it for use. After acquiring a certificate for your custom domain, you need to upload it to your App Service app and configure it for use.
161
-
> [!TIP]
162
-
> Make sure to [authorized App Service to read the certificates from Key vault](configure-ssl-certificate.md#authorize-app-service-to-read-from-the-vault). Use the specific identity listed in the documentation and not the Managed Identity of the site.
163
-
-[REST API: Import KV certificate to site](/rest/api/appservice/certificates/create-or-update)
164
-
-[CLI: Import KV certificate to site](/cli/azure/webapp/config/ssl#az-webapp-config-ssl-import)
165
-
166
-
4.**Update the custom domain binding**
167
-
> [!IMPORTANT]
168
-
> **To avoid any service downtime, do not delete the TLS/SSL binding**. You can update the binding with the new certificate thumbprint or name that was added to the web app without deleting the current binding.
Determine whether ASMCs are actively used for TLS/SSL bindings in your web app's custom domain configuration. If so, follow the steps above to replace the certificate and update the binding.
177
-
178
-
-**Certificate used in application code**
179
-
Certificates may be used in application code for tasks such as authentication. If your app uses the `WEBSITE_LOAD_CERTIFICATES` setting to load ASMCs, update your code to use the new certificate instead.
180
-
181
-
6.**Delete ASMC resources**
182
-
After confirming that your environment or services no longer depend on ASMC, delete the ASMCs associated with your site.
183
-
Deleting ASMCs helps prevent accidental reuse, which could result in service downtime when the certificate fails to renew.
**Temporary mitigation: DigiCert IP allowlisting**
189
-
Some customers may choose to allowlist [DigiCert’s domain validation IPs](https://knowledge.digicert.com/alerts/ip-address-domain-validation) as a short-term workaround. This may help maintain certificate issuance while transitioning away from using ASMC for websites that aren’t publicly accessible.
190
-
> [!NOTE]
191
-
> Allowlisting DigiCert's IP isn’t an official or supported long-term solution. Microsoft’s stance remains that **public access is required** to avoid potential service disruptions. Keep in mind:
192
-
>
193
-
> - DigiCert manages its own IPs and may change them without notice.
194
-
> - Microsoft doesn’t control DigiCert’s infrastructure and can’t guarantee the documentation stay up to date.
195
-
> - Microsoft doesn’t provide alerts if DigiCert updates its IPs.
196
-
> - Use this approach at your own risk.
197
-
198
-
For guidance on configuring access restrictions, refer to [set up Azure App Service access restrictions](app-service-ip-restrictions.md).
199
-
114
+
## Mitigation guidance as of November 2025
200
115
201
-
### Scenario 2: Site is an Azure Traffic Manager "nested" or "external" endpoint
116
+
### Scenario 1: Site is an Azure Traffic Manager "nested" or "external" endpoint
202
117
203
118
Only "Azure Endpoints" are supported. "Nested" and "External" endpoints are not supported for ASMC validation.
204
119
@@ -208,7 +123,7 @@ Only "Azure Endpoints" are supported. "Nested" and "External" endpoints are not
208
123
- For guidance on using App Service as an Azure Traffic Manager endpoint, refer to [App Service and Traffic Manager Profiles](web-sites-traffic-manager.md#app-service-and-traffic-manager-profiles).
209
124
210
125
211
-
### Scenario 3: Site relies on_*.trafficmanager.net_ domains
Certificates for `*.trafficmanager.net` domains are not supported. If your app relies on this domain and uses ASMC, you need to remove that dependency and secure your app using a custom domain and certificate.
0 commit comments