last sync: 2025-Jun-13 17:56:51 Etc/UTC

Web App - Microsoft Azure Resource type
microsoft.web/sites

Azure Resource Provider Resource provider (RP) - Microsoft Web Apps [Microsoft.Web]
RP Microsoft.Web
RP display name Microsoft Web Apps
Azure Resource Type
RP Resource types
Resource types: 364
Azure Policy Alias
RP aliases
RP aliases: 2934
Azure Policy definition
RP Azure Policy
Azure Policy definitions: 208
if: 208
then.deployment: 28
then.details: 0
then.existenceCondition: 4
then.operations: 0
Azure RBAC Role Based Access Control
RP RBAC operations
RP RBAC operations: 655
RP RBAC operationType action: 169
RP RBAC operationType Delete: 88
RP RBAC operationType Read: 297
RP RBAC operationType Write: 101
Azure RBAC Role definition
RP RBAC Roles & Operation actions
Unique RBAC Roles: 29
RBAC Roles with action operationType: 14
RBAC Roles with Delete operationType: 10
RBAC Roles with Read operationType: 28
RBAC Roles with Write operationType: 11
Azure Application
RP related 1st party Service Principals
RP related 1st party Service Principals: 1
• Microsoft Azure App Service (appId: abfa0a7c-a6b6-4736-8310-5855508787cd) [ JSON;CSV]
All Azure RPs Microsoft Learn
AzResourceTypesAdvertizer (Microsoft only)
Azure Resource Type Resource type (RT) - Web App [microsoft.web/sites]
RT information
RT microsoft.web/sites
RT display name Web App
RT type only
(without RP)
sites
RT sub- Resource types sub-Resource types: 208
RT schema RT schema API versions: 19
All Microsoft Azure RTs AzResourceTypesAdvertizer
Aliases and Azure Policy
Azure Policy Alias
Aliases
aliases: 369
Azure Policy definition
Azure Policy
Azure Policy definitions: 136
if: 136
then.deployment: 5
then.details: 0
then.existenceCondition: 0
then.operations: 0
RBAC Operations and Roles & Roles related operation actions
Azure RBAC Role Based Access Control
RBAC operations
RBAC operations: 34
RBAC operationType Action: 31
RBAC operationType Delete: 1
RBAC operationType Read: 1
RBAC operationType Write: 1
Azure RBAC Role definition
RBAC Roles & Operation actions
Unique RBAC Roles: 24
RBAC Roles with Action operationType: 6
RBAC Roles with Delete operationType: 6
RBAC Roles with Read operationType: 23
RBAC Roles with Write operationType: 7
Capabilities & Locations
Azure Resource Diagnostic settings logs
Diagnostic logs
True
log-categories
Azure Resource Diagnostic settings metrics
Diagnostic metrics
True
metrics
Azure Customer-managed key
Customer-managed key (CMK) [experimental]
Unknown
Enforce Encryption with a customer-managed key (CMK) at scale
Azure Managed identity
System-Assigned-Resource-Identity
True
Azure Resource Mover
Cross-ResourceGroup-Resource-Move
True
Azure Resource Mover
Cross-Subscription-Resource-Move
True
Azure Resource Tags
Tags
True
Azure Extension
Extension
False
Azure Private Endpoint
Private-Endpoint
True
Azure Private Endpoint location Azure Private Endpoint location
Supported Locations for Private-Endpoint
Supported Locations for Private-Endpoint: 45
australiacentral, australiaeast, australiasoutheast, brazilsouth, canadacentral, canadaeast, centralindia, centralus, chilecentral, eastasia, eastus, eastus2, francecentral, germanywestcentral, indonesiacentral, israelcentral, italynorth, japaneast, japanwest, jioindiawest, koreacentral, koreasouth, mexicocentral, newzealandnorth, northcentralus, northeurope, norwayeast, polandcentral, qatarcentral, southafricanorth, southcentralus, southeastasia, southindia, spaincentral, swedencentral, switzerlandnorth, uaenorth, uksouth, ukwest, westcentralus, westeurope, westindia, westus, westus2, westus3
Non supported Locations for Private-Endpoint Non supported Locations for Private-Endpoint: 15
malaysiawest, eastus2euap, brazilus, eastusstg, centraluseuap, southcentralusstg, southafricawest, australiacentral2, jioindiacentral, francesouth, germanynorth, norwaywest, switzerlandwest, uaecentral, brazilsoutheast
Azure location
Location
True
Azure Resource type location Azure Resource type location
Locations
Locations: 45
australiacentral, australiaeast, australiasoutheast, brazilsouth, canadacentral, canadaeast, centralindia, centralus, chilecentral, eastasia, eastus, eastus2, francecentral, germanywestcentral, indonesiacentral, israelcentral, italynorth, japaneast, japanwest, koreacentral, koreasouth, malaysiawest, mexicocentral, newzealandnorth, northcentralus, northeurope, norwayeast, polandcentral, qatarcentral, southafricanorth, southcentralus, southeastasia, southindia, spaincentral, swedencentral, switzerlandnorth, uaenorth, uksouth, ukwest, westcentralus, westeurope, westindia, westus, westus2, westus3
Not locations Not locations: 55
asia, asiapacific, australia, australiacentral2, brazil, brazilsoutheast, brazilus, canada, centraluseuap, centralusstage, eastasiastage, eastus2euap, eastus2stage, eastusstage, eastusstg, europe, france, francesouth, germany, germanynorth, global, india, indonesia, israel, italy, japan, jioindiacentral, jioindiawest, korea, malaysia, mexico, newzealand, northcentralusstage, norway, norwaywest, poland, qatar, singapore, southafrica, southafricawest, southcentralusstage, southcentralusstg, southeastasiastage, spain, sweden, switzerland, switzerlandwest, taiwan, uae, uaecentral, uk, unitedstates, unitedstateseuap, westus2stage, westusstage
Assessment tooling
Azure Advisor
Azure Advisor
Azure Advisor recommendations: 45
Cost [Medium] Right-size underutilized App Service plans
Cost [Medium] Unused/Empty App Service plan
HighAvailability [High] Check your app's service health issues
HighAvailability [High] Fix application code, a worker process crashed due to an unhandled exception
HighAvailability [High] Fix the backup database settings of your App Service resource
HighAvailability [High] Fix the backup storage settings of your App Service resource
HighAvailability [High] Move your App Service resource to Standard or higher and use deployment slots
HighAvailability [High] Scale out your App Service plan to avoid CPU exhaustion
HighAvailability [High] Scale up your App Service plan SKU to avoid memory problems
HighAvailability [High] Upgrade your App Service to a Standard plan to avoid request rejects
HighAvailability [High] Use deployment slots for your App Service resource
HighAvailability [Low] CX Observer Personalized Recommendation
HighAvailability [Medium] Consider changing your application architecture to 64-bit
OperationalExcellence [Low] Update Service Connector API Version
OperationalExcellence [Low] Update Service Connector SDK to the latest version
Security [High] FTPS should be required in API apps
Security [High] FTPS should be required in function apps
Security [High] FTPS should be required in web apps
Security [High] Function apps should have vulnerability findings resolved
Security [High] Overly permissive permissions should not be configured on Function App or Web App
Security [High] TLS should be updated to the latest version for API apps
Security [High] TLS should be updated to the latest version for function apps
Security [High] TLS should be updated to the latest version for web apps
Security [Low] CORS should not allow every resource to access API Apps
Security [Low] CORS should not allow every resource to access Function Apps
Security [Low] CORS should not allow every resource to access Web Applications
Security [Low] Remote debugging should be turned off for API App
Security [Low] Remote debugging should be turned off for Function App
Security [Low] Remote debugging should be turned off for Web Applications
Security [Low] Unused API endpoints should be disabled and removed from Function Apps
Security [Low] Unused API endpoints should be disabled and removed from Logic Apps
Security [Low] Unused discovered API endpoints should be disabled and removed from Azure App Services.
Security [Medium] API App should only be accessible over HTTPS
Security [Medium] Diagnostic logs in App Service should be enabled
Security [Medium] Ensure API app has Client Certificates Incoming client certificates set to On
Security [Medium] Function App should only be accessible over HTTPS
Security [Medium] Function apps should have Client Certificates (Incoming client certificates) enabled
Security [Medium] Java should be updated to the latest version for API apps
Security [Medium] Managed identity should be enabled on function apps
Security [Medium] Managed identity should be enabled on web apps
Security [Medium] Managed identity should be used in API apps
Security [Medium] PHP should be updated to the latest version for API apps
Security [Medium] Python should be updated to the latest version for API apps
Security [Medium] Web Application should only be accessible over HTTPS
Security [Medium] Web apps should request an SSL certificate for all incoming requests
Azure Proactive Resilience Library v2 (APRLv2)
Azure Proactive Resilience Library v2 (APRLv2)
Azure Proactive Resilience Library v2 recommendations: 12
HighAvailability [Low] Enable auto heal for Functions App
MonitoringAndAlerting [High] Monitor Performance
MonitoringAndAlerting [Low] Enable diagnostics logging
MonitoringAndAlerting [Medium] No warmup trigger added to Function App
OtherBestPractices [High] Enable Health check for App Services
OtherBestPractices [Low] Deploy to a staging slot
OtherBestPractices [Low] Ensure unique hostid set for Function App
OtherBestPractices [Medium] Store configuration as app settings for Web Sites
OtherBestPractices [Medium] Ensure Function App runs a supported version
OtherBestPractices [Medium] Ensure FUNCTIONS_WORKER_RUNTIME is set properly
Scalability [Low] Separate web apps from web APIs
Scalability [Medium] Create a separate storage account for logs
PSRule for Azure
PSRule for Azure
PSRule for Azure rules: 13
Performance Efficiency [Awareness] Disable Application Request Routing
Performance Efficiency [Awareness] Use HTTP/2 connections for App Service apps
Reliability [Important] Use App Service Always On
Reliability [Important] Web apps use a dedicated health probe path
Reliability [Important] Web apps use health probes
Security [Critical] App Service site allows insecure TLS versions
Security [Important] App Service allows unencrypted traffic
Security [Important] App Service apps uses a managed identity
Security [Important] Disable App Service remote debugging
Security [Important] Use a newer .NET version
Security [Important] Use a newer PHP runtime version
Security [Important] Use a supported Node.js runtime version
Security [Important] Web apps disable insecure FTP
Azure Quick Review (AZQR)
Azure Quick Review (AZQR)
Azure Quick Review (AZQR) recommendations: 40
Governance [Low] App Service Name should comply with naming conventions
Governance [Low] App Service should have tags
Governance [Low] Function Name should comply with naming conventions
Governance [Low] Function should have tags
Governance [Low] Logic App Name should comply with naming conventions
Governance [Low] Logic App should have tags
Governance [Medium] Configure network access restrictions
HighAvailability [Low] Enable auto heal for Functions App
HighAvailability [Medium] App Service should avoid using Client Affinity
HighAvailability [Medium] Function should avoid using Client Affinity
HighAvailability [Medium] Logic App should avoid using Client Affinity
MonitoringAndAlerting [Low] App Service should have diagnostic settings enabled
MonitoringAndAlerting [Low] Function should have diagnostic settings enabled
MonitoringAndAlerting [Low] Logic App should have diagnostic settings enabled
OtherBestPractices [High] Enable Health check for App Services
OtherBestPractices [Low] Deploy to a staging slot
OtherBestPractices [Medium] Store configuration as app settings for Web Sites
Scalability [High] App Service should have Always On enabled
Security [High] App Service remote debugging should be disabled
Security [High] App Service should have private endpoints enabled
Security [High] App Service should not allow insecure FTP
Security [High] App Service should use HTTPS only
Security [High] App Service should use TLS 1.2
Security [High] Function should have private endpoints enabled
Security [High] Function should use HTTPS only
Security [High] Logic App should have private endpoints enabled
Security [High] Logic App should use HTTPS only
Security [Medium] App Service should have VNET Route all enabled for VNET integration
Security [Medium] App Service should use Managed Identities
Security [Medium] App Service should use VNET integration
Security [Medium] Function remote debugging should be disabled
Security [Medium] Function should have VNET Route all enabled for VNET integration
Security [Medium] Function should use Managed Identities
Security [Medium] Function should use TLS 1.2
Security [Medium] Function should use VNET integration
Security [Medium] Logic App remote debugging should be disabled
Security [Medium] Logic App should have VNET Route all enabled for VNET integration
Security [Medium] Logic App should use Managed Identities
Security [Medium] Logic App should use TLS 1.2
Security [Medium] Logic App should use VNET integration
Infrastructure as Code (IaC)
ARM (Azure Resource Manager)
ARM (Azure Resource Manager) templates
ARM (Azure Resource Manager) template API versions: 19
latest
Azure Bicep
Bicep templates
Bicep template API versions: 19
latest
Terraform
Terraform provider
Terraform providers: 11
app_service
app_service_source_control
function_app
function_app_active_slot
function_app_flex_consumption
linux_function_app
linux_web_app
logic_app_standard
web_app_active_slot
windows_function_app
windows_web_app
AzAPI Terraform
AzAPI Terraform templates
AzAPI Terraform template API versions: 19
latest
Pulumi
Pulumi provider
Pulumi providers: 1
web/webapp
OpenTofu
OpenTofu provider
OpenTofu TF providers: 11
app_service
app_service_source_control
function_app
function_app_active_slot
function_app_flex_consumption
linux_function_app
linux_web_app
logic_app_standard
web_app_active_slot
windows_function_app
windows_web_app
Azure Verified Modules (AVM) Bicep Azure Verified Modules (AVM) Bicep
Azure Verified Modules (AVM) Bicep
Web Site Configuration
Azure Verified Modules (AVM) Terraform Azure Verified Modules (AVM) Terraform
Azure Verified Modules (AVM) Terraform
• GitHub: Web/Function App
• Terraform registry: Web/Function App
REST-API (Representational State Transfer - Application Programming Interface)
REST-API versions REST-API versions: 34
2024-11-01
2024-04-01
2023-12-01
2023-01-01
2022-09-01
2022-03-01
2021-03-01
2021-02-01
2021-01-15
2021-01-01
2020-12-01
2020-10-01
2020-09-01
2020-06-01
2019-08-01
2018-11-01
2018-02-01
2017-08-01
2016-09-01
2016-08-01
2016-03-01
2015-11-01
2015-08-01-preview
2015-08-01
2015-07-01
2015-06-01
2015-05-01
2015-04-01
2015-02-01
2015-01-01
2014-11-01
2014-06-01
2014-04-01-preview
2014-04-01
REST-API version default 2024-04-01
API profiles API profiles: 5
2018-02-01;2019-03-01-hybrid
2018-02-01
2017-03-09-profile
2016-08-01;2018-06-01-profile
2016-08-01;2018-03-01-hybrid
Resource naming
Azure Naming Tool
Azure Naming Tool
The Azure Naming Tool was created to help administrators define and manage their naming conventions, while providing a simple interface for users to generate a compliant name.
Resource naming details
[
  {
    "property": "Static Web App",
    "ShortName": "stapp",
    "scope": "global",
    "lengthMin": "2",
    "lengthMax": "60",
    "validText": "Contains alphanumerics and hyphens.",
    "invalidText": "Can't start or end with hyphen.",
    "invalidCharacters": "",
    "invalidCharactersStart": "-",
    "invalidCharactersEnd": "-",
    "invalidCharactersConsecutive": "",
    "regx": "^[a-zA-Z0-9][a-zA-Z0-9-]{0,58}[a-zA-Z0-9]$",
    "staticValues": ""
  },
  {
    "property": "Web App",
    "ShortName": "app",
    "scope": "global",
    "lengthMin": "2",
    "lengthMax": "60",
    "validText": "Contains alphanumerics and hyphens.",
    "invalidText": "Can't start or end with hyphen.",
    "invalidCharacters": "",
    "invalidCharactersStart": "-",
    "invalidCharactersEnd": "-",
    "invalidCharactersConsecutive": "",
    "regx": "^[a-zA-Z0-9][a-zA-Z0-9-]{0,58}[a-zA-Z0-9]$",
    "staticValues": ""
  },
  {
    "property": "Function App",
    "ShortName": "func",
    "scope": "global",
    "lengthMin": "2",
    "lengthMax": "60",
    "validText": "Contains alphanumerics and hyphens.",
    "invalidText": "Can't start or end with hyphen.",
    "invalidCharacters": "",
    "invalidCharactersStart": "-",
    "invalidCharactersEnd": "-",
    "invalidCharactersConsecutive": "",
    "regx": "^[a-zA-Z0-9][a-zA-Z0-9-]{0,58}[a-zA-Z0-9]$",
    "staticValues": ""
  },
  {
    "property": "App Service Environment",
    "ShortName": "ase",
    "scope": "global",
    "lengthMin": "2",
    "lengthMax": "60",
    "validText": "Contains alphanumerics and hyphens.",
    "invalidText": "Can't start or end with hyphen.",
    "invalidCharacters": "",
    "invalidCharactersStart": "-",
    "invalidCharactersEnd": "-",
    "invalidCharactersConsecutive": "",
    "regx": "^[a-zA-Z0-9][a-zA-Z0-9-]{0,58}[a-zA-Z0-9]$",
    "staticValues": ""
  },
  {
    "property": "Azure Static Web Apps",
    "ShortName": "aswba",
    "scope": "global",
    "lengthMin": "2",
    "lengthMax": "60",
    "validText": "Contains alphanumerics and hyphens.",
    "invalidText": "Can't start or end with hyphen.",
    "invalidCharacters": "",
    "invalidCharactersStart": "-",
    "invalidCharactersEnd": "-",
    "invalidCharactersConsecutive": "",
    "regx": "^[a-zA-Z0-9][a-zA-Z0-9-]{0,58}[a-zA-Z0-9]$",
    "staticValues": ""
  }
]