Share via

Container App custom domain on internal environment — TLS handshake returns no peer certificate

Simon Horn 0 Reputation points
2026-05-21T01:49:44.19+00:00

Hi,

I have an internal Container Apps Environment with a Container App that has a custom domain bound. The binding is SniEnabled and points at a CAE-level certificate that I imported from Key Vault (Let's Encrypt, RSA-2048). Both the certificate resource and the binding report Succeeded with the correct thumbprint, subject and SAN.

From a VM inside the peered VNet, a TLS handshake to the default CAE FQDN works fine and returns the Microsoft wildcard certificate. A TLS handshake to the bound custom hostname on the same IP returns "no peer certificate available" — the server closes the connection before presenting anything. Same behaviour persists after waiting 12+ hours, after restarting the container app revision, and after rebuilding the certificate resource on the latest GA API version.

Has anyone seen this on an internal CAE? Is there a known issue with the ingress not picking up KV-imported certificates for the custom hostname even when the binding looks correct?

Happy to provide more detail or specific resource IDs if useful.

Cheers, Simon

Azure Container Apps
Azure Container Apps

An Azure service that provides a general-purpose, serverless container platform.


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.