You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/environment/app-service-app-service-environment-custom-settings.md
+11-14Lines changed: 11 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: seligj95
5
5
6
6
ms.assetid: 1d1d85f3-6cc6-4d57-ae1a-5b37c642d812
7
7
ms.topic: tutorial
8
-
ms.date: 03/06/2024
8
+
ms.date: 08/18/2025
9
9
ms.author: jordanselig
10
10
ms.custom: mvc, devx-track-arm-template
11
11
ms.service: azure-app-service
@@ -19,7 +19,7 @@ Because App Service Environments are isolated to a single customer, there are ce
19
19
20
20
If you do not have an App Service Environment, see [How to Create an App Service Environment v3](./creation.md).
21
21
22
-
You can store App Service Environment customizations by using an array in the new **clusterSettings** attribute. This attribute is found in the "Properties" dictionary of the *hostingEnvironments* Azure Resource Manager entity.
22
+
You can store App Service Environment customizations by using an array in the **clusterSettings** attribute. This attribute is found in the "Properties" dictionary of the *hostingEnvironments* Azure Resource Manager entity.
23
23
24
24
The following abbreviated Resource Manager template snippet shows the **clusterSettings** attribute:
25
25
@@ -43,18 +43,7 @@ The following abbreviated Resource Manager template snippet shows the **clusterS
43
43
}
44
44
```
45
45
46
-
The **clusterSettings** attribute can be included in a Resource Manager template to update the App Service Environment.
47
-
48
-
## Use Azure Resource Explorer to update an App Service Environment
49
-
50
-
Alternatively, you can update the App Service Environment by using [Azure Resource Explorer](https://resources.azure.com).
51
-
52
-
1. In Resource Explorer, go to the node for the App Service Environment (**subscriptions** > **{your Subscription}** > **resourceGroups** > **{your Resource Group}** > **providers** > **Microsoft.Web** > **hostingEnvironments**). Then click the specific App Service Environment that you want to update.
53
-
2. In the right pane, click **Read/Write** in the upper toolbar to allow interactive editing in Resource Explorer.
54
-
3. Click the blue **Edit** button to make the Resource Manager template editable.
55
-
4. Scroll to the bottom of the right pane. The **clusterSettings** attribute is at the very bottom, where you can enter or update its value.
56
-
5. Type (or copy and paste) the array of configuration values you want in the **clusterSettings** attribute.
57
-
6. Click the green **PUT** button that's located at the top of the right pane to commit the change to the App Service Environment.
46
+
The **clusterSettings** attribute can be included in a Resource Manager template or with the Azure CLI to update the App Service Environment. Certain settings are available in the Azure portal.
58
47
59
48
However you submit the change, the change is not immediate and it can take up to 24 hours for the change to take full effect. Some settings have specific details on the time and impact of configuring the specific setting.
60
49
@@ -71,6 +60,10 @@ The App Service Environment operates as a black box system where you cannot see
71
60
],
72
61
```
73
62
63
+
You can also enable internal encryption using the Azure portal by going to the **Configuration** page for your App Service Environment.
64
+
65
+
:::image type="content" source="media/ase-portal-internal-encryption.png" alt-text="Screenshot of the Configuration page in the Azure portal for an App Service Environment showing where to enable internal encryption." border="false":::
66
+
74
67
Setting InternalEncryption to true encrypts internal network traffic in your App Service Environment between the front ends and workers, encrypts the pagefile and also encrypts the worker disks. After the InternalEncryption clusterSetting is enabled, there can be an impact to your system performance. When you make the change to enable InternalEncryption, your App Service Environment will be in an unstable state until the change is fully propagated. Complete propagation of the change can take a few hours to complete, depending on how many instances you have in your App Service Environment. We highly recommend that you do not enable InternalEncryption on an App Service Environment while it is in use. If you need to enable InternalEncryption on an actively used App Service Environment, we highly recommend that you divert traffic to a backup environment until the operation completes.
75
68
76
69
## Disable TLS 1.0 and TLS 1.1
@@ -90,6 +83,10 @@ If you want to disable all inbound TLS 1.0 and TLS 1.1 traffic for all of the ap
90
83
91
84
The name of the setting says 1.0 but when configured, it disables both TLS 1.0 and TLS 1.1.
92
85
86
+
You can also disable TLS 1.0 and TLS 1.1 using the Azure portal by going to the **Configuration** page for your App Service Environment and unchecking the checkbox.
87
+
88
+
:::image type="content" source="media/ase-portal-disable-tls.png" alt-text="Screenshot of the Configuration page in the Azure portal for an App Service Environment showing where to disable TLS 1.0 and TLS 1.1." border="false":::
89
+
93
90
## Change TLS cipher suite order
94
91
95
92
App Service Environment supports changing the cipher suite from the default. The default set of ciphers is the same set that is used in the multi-tenant App Service. Changing the cipher suite is only possible with App Service Environment, the single-tenant offering, not the multi-tenant offering, because changing it affects the entire App Service deployment. There are two cipher suites that are required for an App Service Environment: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 and TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256. Additionally, you should include the following cipher suites, which are required for TLS 1.3: TLS_AES_256_GCM_SHA384 and TLS_AES_128_GCM_SHA256.
0 commit comments