/src/FrontDoor/FrontDoor/help/Enable-AzFrontDoorCustomDomainHttps.md

https://github.com/Azure/azure-powershell · Markdown · 367 lines · 298 code · 69 blank · 0 comment · 0 complexity · 23c98067d7af5e561c2a67b2a7cc9996 MD5 · raw file

  1. ---
  2. external help file: Microsoft.Azure.PowerShell.Cmdlets.FrontDoor.dll-Help.xml
  3. Module Name: Az.FrontDoor
  4. online version: https://docs.microsoft.com/en-us/powershell/module/az.frontdoor/enable-azfrontdoorcustomdomainhttps
  5. schema: 2.0.0
  6. ---
  7. # Enable-AzFrontDoorCustomDomainHttps
  8. ## SYNOPSIS
  9. Enable HTTPS for a custom domain using Front Door managed certificate or using own certificate from Azure Key Vault.
  10. ## SYNTAX
  11. ### ByFieldsParameterSet (Default)
  12. ```
  13. Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName <String> -FrontDoorName <String>
  14. -FrontendEndpointName <String> [-MinimumTlsVersion <String>] [-DefaultProfile <IAzureContextContainer>]
  15. [-WhatIf] [-Confirm] [<CommonParameters>]
  16. ```
  17. ### ByFieldsWithVaultParameterSet
  18. ```
  19. Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName <String> -FrontDoorName <String>
  20. -FrontendEndpointName <String> -VaultId <String> -SecretName <String> -SecretVersion <String>
  21. [-MinimumTlsVersion <String>] [-DefaultProfile <IAzureContextContainer>] [-WhatIf] [-Confirm]
  22. [<CommonParameters>]
  23. ```
  24. ### ByResourceIdParameterSet
  25. ```
  26. Enable-AzFrontDoorCustomDomainHttps -ResourceId <String> [-MinimumTlsVersion <String>]
  27. [-DefaultProfile <IAzureContextContainer>] [-WhatIf] [-Confirm] [<CommonParameters>]
  28. ```
  29. ### ByResourceIdWithVaultParameterSet
  30. ```
  31. Enable-AzFrontDoorCustomDomainHttps -ResourceId <String> -VaultId <String> -SecretName <String>
  32. -SecretVersion <String> [-MinimumTlsVersion <String>] [-DefaultProfile <IAzureContextContainer>] [-WhatIf]
  33. [-Confirm] [<CommonParameters>]
  34. ```
  35. ### ByObjectParameterSet
  36. ```
  37. Enable-AzFrontDoorCustomDomainHttps -InputObject <PSFrontendEndpoint> [-MinimumTlsVersion <String>]
  38. [-DefaultProfile <IAzureContextContainer>] [-WhatIf] [-Confirm] [<CommonParameters>]
  39. ```
  40. ### ByObjectWithVaultParameterSet
  41. ```
  42. Enable-AzFrontDoorCustomDomainHttps -InputObject <PSFrontendEndpoint> -VaultId <String> -SecretName <String>
  43. -SecretVersion <String> [-MinimumTlsVersion <String>] [-DefaultProfile <IAzureContextContainer>] [-WhatIf]
  44. [-Confirm] [<CommonParameters>]
  45. ```
  46. ## DESCRIPTION
  47. The **Enable-AzFrontDoorCustomDomainHttps** enables HTTPS for a custom domain.
  48. ## EXAMPLES
  49. ### Example 1: Enable HTTPS for a custom domain with FrontDoorName and ResourceGroupName using Front Door managed certificate.
  50. ```powershell
  51. PS C:\> Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" -MinimumTlsVersion "1.2"
  52. HostName : frontendpointname1.custom.xyz
  53. SessionAffinityEnabledState : Disabled
  54. SessionAffinityTtlSeconds : 0
  55. WebApplicationFirewallPolicyLink :
  56. Backends :
  57. CustomHttpsProvisioningState : Enabling
  58. CustomHttpsProvisioningSubstate : SubmittingDomainControlValidationRequest
  59. CertificateSource : FrontDoor
  60. ProtocolType : ServerNameIndication
  61. MinimumTlsVersion : 1.2
  62. Vault :
  63. SecretName :
  64. SecretVersion :
  65. CertificateType :
  66. ResourceState : Enabled
  67. Id : /subscriptions/{guid}/resourcegroups/resourcegroup1
  68. /providers/Microsoft.Network/frontdoors/frontdoor1/frontendendpoints/frontendpointname1-custom-xyz
  69. Name : frontendpointname1-custom-xyz
  70. Type : Microsoft.Network/frontdoors/frontendendpoints
  71. ```
  72. Enable HTTPS for a custom domain "frontendpointname1-custom-xyz" that is part of Front Door "frontdoor1" in resource group "resourcegroup1" using Front Door managed certificate.
  73. ### Example 2: Enable HTTPS for a custom domain with FrontDoorName and ResourceGroupName using own certificate in Key Vault.
  74. ```powershell
  75. PS C:\> $vaultId = (Get-AzKeyVault -VaultName $vaultName).ResourceId
  76. PS C:\> Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" -Vault $vaultId -secretName $secretName -SecretVersion $secretVersion -MinimumTlsVersion "1.0"
  77. HostName : frontendpointname1.custom.xyz
  78. SessionAffinityEnabledState : Disabled
  79. SessionAffinityTtlSeconds : 0
  80. WebApplicationFirewallPolicyLink :
  81. Backends :
  82. CustomHttpsProvisioningState : Enabling
  83. CustomHttpsProvisioningSubstate : SubmittingDomainControlValidationRequest
  84. CertificateSource : AzureKeyVault
  85. ProtocolType : ServerNameIndication
  86. MinimumTlsVersion : 1.0
  87. Vault :
  88. SecretName :
  89. SecretVersion :
  90. CertificateType :
  91. ResourceState : Enabled
  92. Id : /subscriptions/{guid}/resourcegroups/resourcegroup1
  93. /providers/Microsoft.Network/frontdoors/frontdoor1/frontendendpoints/frontendpointname1-custom-xyz
  94. Name : frontendpointname1-custom-xyz
  95. Type : Microsoft.Network/frontdoors/frontendendpoints
  96. ```
  97. Enable HTTPS for a custom domain "frontendpointname1-custom-xyz" that is part of Front Door "frontdoor1" in resource group "resourcegroup1" using Front Door managed certificate.
  98. ### Example 3: Enable HTTPS for a custom domain with PSFrontendEndpoint object using Front Door managed certificate.
  99. ```powershell
  100. PS C:\> Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -Name "frontendpointname1-custom-xyz" | Enable-AzFrontDoorCustomDomainHttps
  101. HostName : frontendpointname1.custom.xyz
  102. SessionAffinityEnabledState : Disabled
  103. SessionAffinityTtlSeconds : 0
  104. WebApplicationFirewallPolicyLink :
  105. Backends :
  106. CustomHttpsProvisioningState : Enabling
  107. CustomHttpsProvisioningSubstate : SubmittingDomainControlValidationRequest
  108. CertificateSource : FrontDoor
  109. ProtocolType : ServerNameIndication
  110. MinimumTlsVersion : 1.2
  111. Vault :
  112. SecretName :
  113. SecretVersion :
  114. CertificateType :
  115. ResourceState : Enabled
  116. Id : /subscriptions/{guid}/resourcegroups/resourcegroup1
  117. /providers/Microsoft.Network/frontdoors/frontdoor1/frontendendpoints/frontendpointname1-custom-xyz
  118. Name : frontendpointname1-custom-xyz
  119. Type : Microsoft.Network/frontdoors/frontendendpoints
  120. ```
  121. Enable HTTPS for a custom domain with PSFrontendEndpoint object using Front Door managed certificate.
  122. ### Example 4: Enable HTTPS for a custom domain with resource id using Front Door managed certificate.
  123. ```powershell
  124. PS C:\> Enable-AzFrontDoorCustomDomainHttps -ResourceId $resourceId
  125. HostName : frontendpointname1.custom.xyz
  126. SessionAffinityEnabledState : Disabled
  127. SessionAffinityTtlSeconds : 0
  128. WebApplicationFirewallPolicyLink :
  129. Backends :
  130. CustomHttpsProvisioningState : Enabling
  131. CustomHttpsProvisioningSubstate : SubmittingDomainControlValidationRequest
  132. CertificateSource : FrontDoor
  133. ProtocolType : ServerNameIndication
  134. MinimumTlsVersion : 1.2
  135. Vault :
  136. SecretName :
  137. SecretVersion :
  138. CertificateType :
  139. ResourceState : Enabled
  140. Id : /subscriptions/{guid}/resourcegroups/resourcegroup1
  141. /providers/Microsoft.Network/frontdoors/frontdoor1/frontendendpoints/frontendpointname1-custom-xyz
  142. Name : frontendpointname1-custom-xyz
  143. Type : Microsoft.Network/frontdoors/frontendendpoints
  144. ```
  145. Enable HTTPS for a custom domain "frontendpointname1-custom-xyz" with resource id $resourceId using Front Door managed certificate.
  146. ## PARAMETERS
  147. ### -DefaultProfile
  148. The credentials, account, tenant, and subscription used for communication with Azure.
  149. ```yaml
  150. Type: Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer
  151. Parameter Sets: (All)
  152. Aliases: AzContext, AzureRmContext, AzureCredential
  153. Required: False
  154. Position: Named
  155. Default value: None
  156. Accept pipeline input: False
  157. Accept wildcard characters: False
  158. ```
  159. ### -FrontDoorName
  160. The name of the Front Door.
  161. ```yaml
  162. Type: System.String
  163. Parameter Sets: ByFieldsParameterSet, ByFieldsWithVaultParameterSet
  164. Aliases:
  165. Required: True
  166. Position: Named
  167. Default value: None
  168. Accept pipeline input: False
  169. Accept wildcard characters: False
  170. ```
  171. ### -FrontendEndpointName
  172. Frontend endpoint name.
  173. ```yaml
  174. Type: System.String
  175. Parameter Sets: ByFieldsParameterSet, ByFieldsWithVaultParameterSet
  176. Aliases:
  177. Required: True
  178. Position: Named
  179. Default value: None
  180. Accept pipeline input: False
  181. Accept wildcard characters: False
  182. ```
  183. ### -InputObject
  184. The Frontend endpoint object to update.
  185. ```yaml
  186. Type: Microsoft.Azure.Commands.FrontDoor.Models.PSFrontendEndpoint
  187. Parameter Sets: ByObjectParameterSet, ByObjectWithVaultParameterSet
  188. Aliases:
  189. Required: True
  190. Position: Named
  191. Default value: None
  192. Accept pipeline input: True (ByValue)
  193. Accept wildcard characters: False
  194. ```
  195. ### -MinimumTlsVersion
  196. The minimum TLS version required from the clients to establish an SSL handshake with Front Door.
  197. ```yaml
  198. Type: System.String
  199. Parameter Sets: (All)
  200. Aliases:
  201. Required: False
  202. Position: Named
  203. Default value: None
  204. Accept pipeline input: False
  205. Accept wildcard characters: False
  206. ```
  207. ### -ResourceGroupName
  208. The resource group to which the Front Door belongs.
  209. ```yaml
  210. Type: System.String
  211. Parameter Sets: ByFieldsParameterSet, ByFieldsWithVaultParameterSet
  212. Aliases:
  213. Required: True
  214. Position: Named
  215. Default value: None
  216. Accept pipeline input: False
  217. Accept wildcard characters: False
  218. ```
  219. ### -ResourceId
  220. Resource Id of the Front Door endpoint to enable https
  221. ```yaml
  222. Type: System.String
  223. Parameter Sets: ByResourceIdParameterSet, ByResourceIdWithVaultParameterSet
  224. Aliases:
  225. Required: True
  226. Position: Named
  227. Default value: None
  228. Accept pipeline input: True (ByPropertyName)
  229. Accept wildcard characters: False
  230. ```
  231. ### -SecretName
  232. The name of the Key Vault secret representing the full certificate PFX
  233. ```yaml
  234. Type: System.String
  235. Parameter Sets: ByFieldsWithVaultParameterSet, ByResourceIdWithVaultParameterSet, ByObjectWithVaultParameterSet
  236. Aliases:
  237. Required: True
  238. Position: Named
  239. Default value: None
  240. Accept pipeline input: False
  241. Accept wildcard characters: False
  242. ```
  243. ### -SecretVersion
  244. The version of the Key Vault secret representing the full certificate PFX
  245. ```yaml
  246. Type: System.String
  247. Parameter Sets: ByFieldsWithVaultParameterSet, ByResourceIdWithVaultParameterSet, ByObjectWithVaultParameterSet
  248. Aliases:
  249. Required: True
  250. Position: Named
  251. Default value: None
  252. Accept pipeline input: False
  253. Accept wildcard characters: False
  254. ```
  255. ### -VaultId
  256. The Key Vault id containing the SSL certificate
  257. ```yaml
  258. Type: System.String
  259. Parameter Sets: ByFieldsWithVaultParameterSet, ByResourceIdWithVaultParameterSet, ByObjectWithVaultParameterSet
  260. Aliases:
  261. Required: True
  262. Position: Named
  263. Default value: None
  264. Accept pipeline input: False
  265. Accept wildcard characters: False
  266. ```
  267. ### -Confirm
  268. Prompts you for confirmation before running the cmdlet.
  269. ```yaml
  270. Type: System.Management.Automation.SwitchParameter
  271. Parameter Sets: (All)
  272. Aliases: cf
  273. Required: False
  274. Position: Named
  275. Default value: None
  276. Accept pipeline input: False
  277. Accept wildcard characters: False
  278. ```
  279. ### -WhatIf
  280. Shows what would happen if the cmdlet runs. The cmdlet is not run.
  281. ```yaml
  282. Type: System.Management.Automation.SwitchParameter
  283. Parameter Sets: (All)
  284. Aliases: wi
  285. Required: False
  286. Position: Named
  287. Default value: None
  288. Accept pipeline input: False
  289. Accept wildcard characters: False
  290. ```
  291. ### CommonParameters
  292. This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
  293. ## INPUTS
  294. ### System.String
  295. ## OUTPUTS
  296. ### Microsoft.Azure.Commands.FrontDoor.Models.PSFrontendEndpoint
  297. ## NOTES
  298. ## RELATED LINKS