Azure web app still serving old certificate

bayo 1 Reputation point
2021-06-11T05:34:20.307+00:00

I uploaded a new certificate to my web app and added the necessary bindings.

But when I visit my website, it is showing certificate error because it is still serving *.azurewebsites.net certificate.

I added two subdomains, www.wellahealth.com and wellahealth.com

www.wellahealth.com work perfectly, but wellahealth.com throws up SSL error.

The certificate contains both domains as seen in the screenshot104567-screenshot-206.png

I have many apps in the appservice plan and they all work well.

Any help will be really appreciated.

Azure App Service
Azure App Service
Azure App Service is a service used to create and deploy scalable, mission-critical web apps.
6,910 questions
{count} votes

1 answer

Sort by: Most helpful
  1. SnehaAgrawal-MSFT 18,366 Reputation points
    2021-06-14T07:18:43.587+00:00

    Thanks for asking question! As I can see that, the site is configured with IP SSL and while browsing to the default site URL, potentially, certificate corresponding to IP SSL binding may be returned instead of the default Azure certificate.

    This scenario manifests itself when there are non SNI enabled clients hitting the website. This will cause all SNI bindings, including the default binding of WellaHealth.azurewebsites.net to fail as these URL's will return the IP SSL certificate

    In order to rectify this, please ensure not to use SNI bindings along with IP SSL bindings and always browse to the website over custom domain URL if you have non SNI clients. In case you need to use SNI bindings, you need to ensure that the certificate that is bound to the IP SSL binding is issued to protect all configured URLs for the site (including the SNI bindings) and configure the same certificate against all other bindings. This behavior is by design.

    Check this official document link on: If you have an SNI SSL binding to <app-name>.azurewebsites.net, remap any CNAME mapping to point to sni.<app-name>.azurewebsites.net instead (add the sni prefix).

    Also suggest you refer this detailed blog on Breaking change for SNI-SSL hostnames on Azure App Service might be helpful.

    Hope this helps. If you have further query or issue remains please let us know.

    0 comments No comments