Networking
405 Ideas
Vote
Microsoft
7 years ago
Application Gateway: Support wildcard hosts in listeners
Our product creates dynamic DNS zones for our customers, e.g. foo.z1.contoso.com, bar.z2.contoso.com, etc. We use Azure DNS for this. (Notice that we stripe our customer's domains across multiple zones (z1, z2), because Azure DNS has a max record count of 5000.)
Completed
Application GatewayCompleted
Microsoft
Company Response
3 years agoWildcard host names in listeners for Application Gateway v2 is now general availability! You can configure host names with wildcard characters (* and ?) and up to 5 host names per listener with comma separated values. More details can be found here: https://docs.microsoft.com/azure/application-gateway/multiple-site-overview#wildcard-host-names-in-listener
Vote
Microsoft
5 years ago
TLS 1.3 and HSTS Support for Azure Application Gateway
This is about a feature request for an Azure Application Gateway to support TLS 1.3 and HSTS. At least HSTS is just a secure header which should be trivial to implement. I'm looking forward to feedback.
Mod Edit: Fixed typos
Completed
Application GatewayCompleted
Microsoft
Company Response
2 years agoTLS 1.3 support is now in GA phase. Please visit https://learn.microsoft.com/en-us/azure/application-gateway/application-gateway-ssl-policy-overview for details.
Vote
Idea collection
1 year ago
Application gateway V2 subnet to support UDR
Currently Standard v2 and WAF v2 application gateway must have a public IP to work. Please make it be able to work only with private IP address. This capability is available in standard sku and waf sku but not in standard v2 and waf v2 sku.
Completed
Application GatewayCompleted
Microsoft
Company Response
1 year agoApplication Gateway v2 sku now has capabilities to enable private IP frontend only, full route table control, and full network security group control. More information can be found here: https://learn.microsoft.com/azure/application-gateway/application-gateway-private-deployment
Vote
Idea collection
2 years ago
Enable cookie rewrite for Application Gateway Affinity Cookie
Scenario 1: Our security team is telling us that the cookie from the application gateway is failing security scans because the secure and httponly flags are not set. Scenario 2: When a request for contoso.com hits an Azure App Gateway and the back end is routed to contoso.azurewebsites.com, the set ARRAffinity cookie response includes the optional domain attribute (as per RFC6225 Page 22) that specifies contoso.azurewebsites.net. causing the user agent to never write the cookie since the Domain attribute doesn't match the requested domain.
Completed
Application GatewayCompleted
Jay Soni
Company Response
5 months agoHere is an update. Thanks for your patience.Scenario 1: You can now set these flags yourself by using the Rewrite headers feature - https://learn.microsoft.com/azure/application-gateway/application-gateway-secure-flag-session-affinity. This solution could not be recommended earlier due to a limitation when handling multiple headers with the same name. Scenario 2: A new configuration in App Services is now available to make App Service's Session Affinity (ARR) cookie compatible for use with Application Gateway & Front Door. You can enable this setting by referring to https://aka.ms/SessionaffinityproxyClosing this thread.