Security Best Practices for Azure App Service Web Apps, Part 1

By on Apr 29, 2016

Microsoft’s Azure App Service is a fully managed Platform as a Service for developers that provides features and frameworks to quickly and easily build apps for any platform and any device. In spite of its ease of use, developers still need to keep security in mind because Azure will not take care of every aspect of security. This post is the first in a short series of articles from McAfee’s Foundstone Professional Services that offers advice for securing Azure App Service Web app development.

Developers can create four application types using the Azure App Service:

Azure App Service Web Apps take care of the infrastructure and its security. The developer needs to focus only on the application code. Azure App Service is different from typical cloud scenarios in which developers set up their own servers in the cloud, install their own web applications, and take full responsibility for performance and security. With Azure App Service Web Apps, Microsoft owns and manages the infrastructure. The developers need only ensure the security of their application code. Both approaches has their merits.

In this post we will focus on various security guidelines for web apps built using the Azure App Service, which supports major languages such as ASP.NET, PHP, Node.js, Java, and Python.


Get a custom domain name with HTTPS

When a web application is created using Azure App Service, it is assigned to a subdomain of For example, if the app name is Demo, the URL is By default, Azure enables HTTPS with a wildcard certificate assigned to the * domain. There creates multiple security issues:

  • A phishing attack can be easily carried out by creating similar-looking web application and domain name, for example, an attacker could create the malicious web app, which is similar to the legitimate name Because the web application is assigned to a subdomain of, the name of the malicious application looks very convincing and hard to differentiate from the original name unless one looks very closely.
  • If the DNS record for * is entered by mistake or through DNS cache poisoning, then the application will be adversely affected.
  • The wildcard certificate creates more headaches for the developer because they need to ensure the path and domain of cookies are properly constrained.
  • The certificate is controlled by Microsoft. Thus for any certificate-related errors—such as expiration, strong or weak signing algorithms, trusted or untrusted certificate signing authorities, or certificates not self-signed—the developer will be dependent on Microsoft. Because the certificate is a wild card, extended validation of certificates can’t be enforced, which is preferred for financial applications.

Apart from security issues, most organizations want their customers to see a custom domain name instead a subdomain of Thus it is necessary to create a custom domain name and get a certificate for that domain. Do not use self-signed certificates, rather buy one from a trusted certificate authority. Consider following while buying a certificate for a web app:

  • The name of the certificate should match domain name. The certificate can be a single domain or multidomain but not a wildcard certificate.
  • The certificate should be signed using a strong signing algorithm such as SHA-256.
  • The certificate should be valid and not expired.
  • For financial and other sensitive applications, it is best to have an extended validation for the certificate.

A custom domain name is not available with Microsoft’s free pricing plan, one of five plans. It is available with the other four. A custom domain name with HTTPS is available with the standard and premium pricing plans. To ensure the use of HTTPS, we recommend choosing either the standard or premium pricing plans when creating a web application with Azure App Service. (Microsoft has tie-in with GoDaddy to offer a custom domain name and a certificate from the Azure portal. Or you can buy a custom domain name and certificate from another domain registrar and use it with an Azure web app.)

For custom domain names purchased outside of Microsoft, follow these steps to configure it in the Azure portal:

  • Log in to the Azure portal.
  • Navigate to “App Services” in left navigation pane.
  • Select your web application.
  • Click on “Settings” and select “Custom domains and SSL.”20160420 Azure 1
  • A new frame will open on the right side. Click on “Bring external domains.”
  • Note the IP address located at the bottom. Go to your domain registrar website and create DNS entries using this IP address. It can take some time for the changes to propagate, depending on your DNS provider.
  • In the “Domain Names” text box, enter the custom domain name you bought from the domain registrar.
  • Save the changes.
  • Click on “Upload certificate.”
  • Locate and upload your .pfx certificate file.
  • Under “SSL bindings,” select the domain name to secure with SSL, and the certificate to use.
  • Save the changes.
  • You should be able to access the web app using your custom domain name over HTTPS.

For more details on how to set up a custom domain name and its certificate, follow these links from Microsoft:

This blog post was written by Piyush Mittal.

About the Author


We're here to make life online safe and enjoyable for everyone.

Read more posts from McAfee

Subscribe to McAfee Securing Tomorrow Blogs