Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merge to live #1074

Open
wants to merge 23 commits into
base: live
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from 22 commits
Commits
Show all changes
23 commits
Select commit Hold shift + click to select a range
bec13cc
Delete iis/manage/configuring-security/iis-8-certificate-management-a…
Rick-Anderson May 23, 2024
a01ade9
Update TOC.yml
Rick-Anderson May 23, 2024
8aecd7e
Update TOC.yml
Rick-Anderson May 23, 2024
841fbc0
Delete iis/manage/configuring-security/iis-8-sandboxing-and-security.md
Rick-Anderson May 23, 2024
cf3ce84
Added new flags introduced in IIS 10 version 1809.
Jun 6, 2024
006a4b6
Update iis/configuration/system.applicationHost/sites/siteDefaults/bi…
Rick-Anderson Jun 6, 2024
2ec91c9
Update url-rewrite-module-video-walkthrough.md
Rick-Anderson Jun 25, 2024
4a30fc9
Merge branch 'main' of https://github.com/MicrosoftDocs/iis-docs
Rick-Anderson Jun 25, 2024
a567caa
Update url-rewrite-module-video-walkthrough.md (#1056)
Rick-Anderson Jun 25, 2024
f739436
Remove dead content (#1059)
Rick-Anderson Jun 26, 2024
20eb56e
Delete dead content (#1058)
Rick-Anderson Jun 26, 2024
000a1db
Update application-pool-identities.md (#1060)
lextm Jul 9, 2024
d364764
Revert "Remove dead content (#1059)" (#1062)
Rick-Anderson Jul 10, 2024
e19028e
SFI Image corrections for sev 0 (#1067)
wadepickett Sep 30, 2024
8df9ff5
IIS-docs: SFI Image Sev 1-2 Fixes (#1068)
wadepickett Oct 22, 2024
19d63dc
Fixed broken links in Learn Online Build Report. (#1065)
lextm Oct 23, 2024
632e245
Added new flags introduced in IIS 10 version 1809. (#1064)
lextm Oct 24, 2024
28046eb
Revert "IIS-docs: SFI Image Sev 1-2 Fixes (#1068)" (#1071)
Rick-Anderson Oct 24, 2024
4f8b1be
Update using-custom-rewrite-providers-with-url-rewrite-module.md (#1069)
r-V3 Oct 28, 2024
3868c26
adding examples and making modifications (#1070)
Rick-Anderson Nov 4, 2024
59e4aed
SFI images IIS-docs sev1-2 updates only (#1072)
wadepickett Nov 5, 2024
42a16fa
Delete .openpublishing.build.ps1 (#1073)
shujingMS Nov 15, 2024
0873eb2
Update ihttprequest-getclientcertificate-method.md (#1075)
JawaharGaneshS Nov 29, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
17 changes: 0 additions & 17 deletions .openpublishing.build.ps1

This file was deleted.

20 changes: 0 additions & 20 deletions iis/TOC.yml
Original file line number Diff line number Diff line change
Expand Up @@ -282,10 +282,6 @@
href: manage/configuring-security/analyzing-client-usage-data-with-iis-user-access-logging.md
- name: Configure Request Filtering in IIS
href: manage/configuring-security/configure-request-filtering-in-iis.md
- name: IIS 8 - Certificate Management and Deployment
href: manage/configuring-security/iis-8-certificate-management-and-deployment.md
- name: IIS 8 - Sandboxing and Security
href: manage/configuring-security/iis-8-sandboxing-and-security.md
- name: Managing Performance Settings
items:
- name: Improving Performance with Native Output Caching
Expand All @@ -296,8 +292,6 @@
href: manage/managing-performance-settings/walkthrough-iis-output-caching.md
- name: Configure IIS 7 Output Caching
href: manage/managing-performance-settings/configure-iis-7-output-caching.md
- name: Use Bit Rate Throttling
href: manage/managing-performance-settings/use-bit-rate-throttling.md
- name: Managing your Configuration Settings
items:
- name: Delegating Configuration to web.config Files
Expand Down Expand Up @@ -602,8 +596,6 @@
href: troubleshoot/using-failed-request-tracing/troubleshooting-failed-requests-using-tracing-in-iis.md
- name: Using Failed Request Tracing Rules to Troubleshoot Application Request Routing
href: troubleshoot/using-failed-request-tracing/using-failed-request-tracing-rules-to-troubleshoot-application-request-routing-arr.md
- name: Troubleshoot with Failed Request Tracing
href: troubleshoot/using-failed-request-tracing/troubleshoot-with-failed-request-tracing.md
- name: Troubleshooting Failed Requests Using Tracing in IIS 8.5
href: troubleshoot/using-failed-request-tracing/troubleshooting-failed-requests-using-tracing-in-iis-85.md
- name: Performance Issues
Expand Down Expand Up @@ -707,8 +699,6 @@
href: extensions/troubleshooting-application-request-routing/troubleshooting-502-errors-in-arr.md
- name: URL Rewrite Module
items:
- name: URL Rewrite Module - Video Walkthrough
href: extensions/url-rewrite-module/url-rewrite-module-video-walkthrough.md
- name: Using the URL Rewrite Module
href: extensions/url-rewrite-module/using-the-url-rewrite-module.md
- name: Creating Rewrite Rules for the URL Rewrite Module
Expand Down Expand Up @@ -773,8 +763,6 @@
href: extensions/introduction-to-iis-express/iis-75-express-readme.md
- name: IIS 8.0 Express Readme
href: extensions/introduction-to-iis-express/iis-80-express-readme.md
- name: IIS 8 - IIS Express for Developers
href: extensions/introduction-to-iis-express/iis-8-iis-express-for-developers.md
- name: Using IIS Express
items:
- name: Using the Windows System Tray to Manage Websites and Applications
Expand Down Expand Up @@ -972,8 +960,6 @@
href: web-hosting/getting-started/deploying-a-static-content-server.md
- name: Using Windows SharePoint Services 3.0 on IIS 7.0
href: web-hosting/getting-started/using-windows-sharepoint-services-30-on-iis.md
- name: Microsoft Web Platform Privacy Statements
href: web-hosting/getting-started/microsoft-web-platform-privacy-statements.md
- name: Frequently Asked Questions (FAQ)
items:
- name: Tools and Utilities Questions
Expand All @@ -998,12 +984,8 @@
href: web-hosting/migrate-to-the-microsoft-web-platform/breaking-changes-for-aspnet-4-apps-running-on-iis-7-integrated-mode.md
- name: IIS 7 for Apache Administrators
href: web-hosting/migrate-to-the-microsoft-web-platform/iis-for-apache-administrators.md
- name: Migrate to a Windows-Based Platform
href: web-hosting/migrate-to-the-microsoft-web-platform/migrate-to-a-windows-based-platform.md
- name: Migrate from MySQL to SQL Server 2008
href: web-hosting/migrate-to-the-microsoft-web-platform/migrate-from-mysql-to-sql-server-2008.md
- name: How to Migrate to the Microsoft Web Platform
href: web-hosting/migrate-to-the-microsoft-web-platform/how-to-migrate-to-the-microsoft-web-platform.md
- name: Configuring Components
items:
- name: Enabling LINQ with ASP.NET
Expand Down Expand Up @@ -1054,8 +1036,6 @@
href: web-hosting/configuring-servers-in-the-windows-web-platform/sql-server-2005.md
- name: SQL 2008 for Hosters
href: web-hosting/configuring-servers-in-the-windows-web-platform/sql-2008-for-hosters.md
- name: Configure your Servers for the Windows Web Hosting Platform
href: web-hosting/configuring-servers-in-the-windows-web-platform/configure-your-servers-for-the-windows-web-hosting-platform.md
- name: Installing Infrastructure Components
items:
- name: Planning the Deployment
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -101,7 +101,7 @@ You can add `<binding>` elements within the `<bindings>` element for each site i
| --- | --- |
| `bindingInformation` | Required string attribute.<br><br>Specifies information to communicate with a site. For example, a Web site binding includes the IP address (or unspecified IP addresses), the port number, and an optional host header used to communicate with the site. |
| `protocol` | Required string attribute.<br><br>Specifies the protocol for communicating with a site. |
| `sslFlags` | Optional uint attribute.<br><br>Specifies the type of binding used for Secure Sockets Layer (SSL) certificates.<br><ul> <li>A value of "0" specifies that the secure connection be made using an IP/Port combination. Only one certificate can be bound to a combination of IP address and the port.</li> <li>A value of "1" specifies that the secure connection be made using the port number and the host name obtained by using Server Name Indication (SNI).</li> <li>A value of "2" specifies that the secure connection be made using the centralized SSL certificate store without requiring a Server Name Indicator.</li> <li>A value of "3" specifies that the secure connection be made using the centralized SSL certificate store while requiring Server Name Indicator</li></ul> Centralized SSL certificate support enables you to create a centralized certificate store that can contain multiple certificate files. You can name the certificate files to correspond to the host names that they contain. This enables you to create a binding that only requires a port, rather than an IP/port or a host name/port combination. When a request comes in, IIS matches the port, determines the host name from the request, and searches the centralized certificate store for a certificate file with a matching name. It uses that certificate. <br><br> With a Server Name Indicator (SNI), the host name is exchanged as part of the SSL handshake. SNI is enabled in the Add Site Binding dialog box when you add a binding with a type of HTTPS. This is especially useful for SSL connections that host multiple servers on a single network address. For more information, see [IIS 8.0 Server Name Indication (SNI): SSL Scalability](/iis/get-started/whats-new-in-iis-8/iis-80-server-name-indication-sni-ssl-scalability). <br><br>The sslFlags attribute is only set when the protocol is **https**. The default value is `0`. |
| `sslFlags` | Optional `uint` attribute that works like flags type, with the following possible flags: <table> <tbody> <tr> <th>Value</th> <th>Description</th></tr> <tr> <th><code>0</code></th> <td>The secure connection made using an IP/Port combination. Only one certificate can be bound to a combination of IP address and the port.</td></tr> <tr> <th><code>1</code></th> <td>The secure connection made using the port number and the host name obtained by using Server Name Indication (SNI).</td></tr> <tr> <th><code>2</code></th> <td>The secure connection be made using the centralized SSL certificate store.</td></tr> <tr> <th><code>4</code></th> <td>Disable HTTP/2.</td></tr> <tr> <th><code>8</code></th> <td>Disable OCSP Stapling.</td></tr> <tr> <th><code>16</code></th> <td>Disable QUIC.</td></tr> <tr> <th><code>32</code></th> <td>Disable TLS 1.3 over TCP.</td></tr> <tr> <th><code>64</code></th> <td>Disable Legacy TLS.</td></tr> </tbody></table> Centralized SSL certificate support enables creating a centralized certificate store that can contain multiple certificate files. The certificate files can be named to correspond to the host names that they contain. This enables creating a binding that only requires a port, rather than an IP/port or a host name/port combination. When a request comes in, IIS matches the port, determines the host name from the request, and searches the centralized certificate store for a certificate file with a matching name. It uses that certificate. <br><br> With a Server Name Indicator (SNI), the host name is exchanged as part of the SSL handshake. SNI is enabled in the **Add Site Binding** dialog box when adding a binding with a type of HTTPS. This is useful for SSL connections that host multiple servers on a single network address. <br><br> Values greater than 4 are only supported in IIS 10 version 1809 and higher. The default value is `0`. |

### Child Elements

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -76,7 +76,7 @@ You can add default `<binding>` elements within the `<bindings>` element in the
| --- | --- |
| `bindingInformation` | Required string attribute.<br><br>Specifies information to communicate with a site. For example, a Web site binding includes the IP address (or unspecified IP addresses), the port number, and an optional host header used to communicate with the site. |
| `protocol` | Required string attribute.<br><br>Specifies the protocol for communicating with a site. |
| `sslFlags` | Optional uint attribute.<br><br>Specifies the type of binding used for Secure Sockets Layer (SSL) certificates.<br><ul> <li>A value of "0" specifies that the secure connection be made using an IP/Port combination. Only one certificate can be bound to a combination of IP address and the port.</li> <li>A value of "1" specifies that the secure connection be made using the port number and the host name obtained by using Server Name Indication (SNI).</li> <li>A value of "2" specifies that the secure connection be made using the centralized SSL certificate store without requiring Server Name Indicator (SNI)</li> <li>A value of "3" specifies that the secure connection be made using the centralized SSL certificate store while requiring Server Name Indicator (SNI)</li></ul> Centralized SSL certificate support enables you to create a centralized certificate store that can contain multiple certificate files. You can name the certificate files to correspond to the host names that they contain. This enables you to create a binding that only requires a port, rather than an IP/port or a host name/port combination. When a request comes in, IIS matches the port, determines the host name from the request, and searches the centralized certificate store for a certificate file with a matching name. It uses that certificate. <br><br> With a Server Name Indicator (SNI), the host name is exchanged as part of the SSL handshake. SNI is enabled in the Add Site Binding dialog box when you add a binding with a type of HTTPS. This is especially useful for SSL connections that host multiple servers on a single network address. <br><br> The default value is `0`. |
| `sslFlags` | Optional `uint` attribute that works like flags type, with the following possible flags: <table> <tbody> <tr> <th>Value</th> <th>Description</th></tr> <tr> <th><code>0</code></th> <td>The secure connection made using an IP/Port combination. Only one certificate can be bound to a combination of IP address and the port.</td></tr> <tr> <th><code>1</code></th> <td>The secure connection made using the port number and the host name obtained by using Server Name Indication (SNI).</td></tr> <tr> <th><code>2</code></th> <td>The secure connection be made using the centralized SSL certificate store.</td></tr> <tr> <th><code>4</code></th> <td>Disable HTTP/2.</td></tr> <tr> <th><code>8</code></th> <td>Disable OCSP Stapling.</td></tr> <tr> <th><code>16</code></th> <td>Disable QUIC.</td></tr> <tr> <th><code>32</code></th> <td>Disable TLS 1.3 over TCP.</td></tr> <tr> <th><code>64</code></th> <td>Disable Legacy TLS.</td></tr> </tbody></table> Centralized SSL certificate support enables creating a centralized certificate store that can contain multiple certificate files. The certificate files can be named to correspond to the host names that they contain. This enables creating a binding that only requires a port, rather than an IP/port or a host name/port combination. When a request comes in, IIS matches the port, determines the host name from the request, and searches the centralized certificate store for a certificate file with a matching name. It uses that certificate. <br><br> With a Server Name Indicator (SNI), the host name is exchanged as part of the SSL handshake. SNI is enabled in the **Add Site Binding** dialog box when adding a binding with a type of HTTPS. This is useful for SSL connections that host multiple servers on a single network address. <br><br> Values greater than 4 are only supported in IIS 10 version 1809 and higher. The default value is `0`. |

### Child Elements

Expand Down

This file was deleted.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If this video topic file was being deleted because the video was lost, I think the video moved to here:
https://learn.microsoft.com/en-us/shows/iis-net-site-videos/url-rewrite-module-video-walkthrough

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actually please disregard this. Although the video was moved and available it is damaged, it only has a starter image and then only the sound plays with a blank video for the rest, making it useless.

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ This walkthrough will guide you through how to use custom rewrite providers with

## Install URL Rewrite Extensibility Samples

In order to complete this walkthrough, download and install URL Rewrite Extensibility Samples (`https://www.microsoft.com/download/details.aspx?id=43353`). The Extensibility Samples installation package includes .NET assemblies and the source code with full implementation of rewrite providers for the three most common use cases:
In order to complete this walkthrough, download and install [IIS URL Rewrite 2.1](https://iis-umbraco.azurewebsites.net/downloads/microsoft/url-rewrite). The URL Rewrite Extensibility Samples for 2.0 are no longer available.

- Storing of the rewrite or redirect mappings in a SQL database;
- Storing of the rewrite or redirect mappings in a text file;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -87,10 +87,6 @@ These articles cover the functionality of the URL Rewrite Module and explain how
- [URL Rewrite for ASP.NET Web Forms](url-rewriting-for-aspnet-web-forms.md)
- [Developing rule templates for the URL Rewrite module](developing-rule-template-for-url-rewrite-module.md)

### Video walkthrough

- [Using the URL rewrite module - video walkthrough](url-rewrite-module-video-walkthrough.md)

## Changes since Go Live release

The following additions, changes, and important bug fixes have been made to URL rewrite module since the Go Live release:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ Learn more: [Introducing IIS on Nano Server](introducing-iis-on-nano-server.md)

Windows Server 2016 and Windows 10 with the Anniversary Update add support for containers which are isolated, resource controlled, and portable operating environments. Windows Server 2016 and Windows 10 support two different container runtimes with a different degree of isolation: Windows containers achieve isolation through process and namespace isolation, while Hyper-V containers achieve isolation through lightweight virtual machines. IIS 10.0 runs in both container runtimes as well as on both base OS images, Server Core and Nano Server, allowing you to choose the best Windows container environment for your web workloads.

Get started with [IIS base images available on Docker Hub](https://hub.docker.com/r/microsoft/iis/) or follow this tutorial to [deploy an ASP.NET MVC application to IIS running inside a container](/aspnet/mvc/overview/deployment/docker-aspnetmvc).
Get started with [IIS base images available on Docker Hub](https://hub.docker.com/r/microsoft/windows-servercore-iis/) or follow this tutorial to [deploy an ASP.NET MVC application to IIS running inside a container](/aspnet/mvc/overview/deployment/docker-aspnetmvc).

## Managing IIS

Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Original file line number Diff line number Diff line change
Expand Up @@ -54,11 +54,11 @@ You can try this by selecting a file in Windows Explorer and adding the "Default
4. Select the **Security** tab
5. Click the **Edit** button and then **Add** button
6. Click the **Locations** button and make sure that you select your computer.

![Screenshot of the Select Users or Groups dialog.](application-pool-identities/_static/image9.jpg)
7. Enter **IIS AppPool\DefaultAppPool** in the **Enter the object names to select:** text box.
8. Click the **Check Names** button and click **OK**.

![Screenshot of the Select Users or Groups dialog.](application-pool-identities/_static/image9.jpg)

By doing this, the file or directory you selected will now also allow the **DefaultAppPool** identity access.

You can do this via the command-line by using the ICACLS tool. The following example gives full access to the DefaultAppPool identity.
Expand Down

This file was deleted.

This file was deleted.

Binary file added iis/manage/configuring-security/image-1.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added iis/manage/configuring-security/image-10.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added iis/manage/configuring-security/image-11.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added iis/manage/configuring-security/image-12.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added iis/manage/configuring-security/image-2.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added iis/manage/configuring-security/image-3.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added iis/manage/configuring-security/image-4.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added iis/manage/configuring-security/image-5.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added iis/manage/configuring-security/image-6.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added iis/manage/configuring-security/image-7.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added iis/manage/configuring-security/image-8.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added iis/manage/configuring-security/image-9.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added iis/manage/configuring-security/image.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading