Share via

Timeout creating new app service managed certificate

Derek Chan 6 Reputation points
2025-08-28T04:50:14.6966667+00:00

I am trying to create a new managed certificate. I have created hundreds of these before and they are all renewing without a problem.

The domain name validates fine, but adding it eventually times out with this error:

Add App Service Managed Certificate

Error adding managed certificate: Pending managed certificate failed: Request Time-out Refer to the documentations for more info: https://go.microsoft.com/fwlink/?linkid=2158627.

  • I have checked all requirements for creating app service certificates
  • I have checked and run all validation scripts to ensure it passes the new requirements from 28 July 2025
  • i have attempted to create using "az webapp config ssl create ... ". This returns "Managed Certificate creation in progress. Please use the command 'az webapp config ssl show ...' to view your certificate once it is created" - but the certificate is never created
Azure App Service
Azure App Service

Azure App Service is a service used to create and deploy scalable, mission-critical web apps.

{count} vote

3 answers

Sort by: Most helpful
  1. Jonas Aebersold 1 Reputation point
    2025-09-03T13:20:53.31+00:00

    Hi

    Together with Azure Support, I discovered the solution (or rather, a workaround) more or less by chance. In our Azure Automation Runbook, we always stopped the WebApp immediately after creating it and only started it again once it was fully configured. When you start the web app, you can create the managed certificate without any problems. I don't know if the status code is taken into account when creating the certificate (stopped 403, started 200). In any case, I started the web app as a first test, and then I was able to create the certificate in the Azure portal. Then I removed the stop of the WebApp in the Azure Automation Runbook, the runbook also ran without errors.

    For one day we had a workaround, with 100% success rate and multiple retries on different subscriptions. But today this workaround is not working anymore.

    0 comments No comments

  2. TP 150.9K Reputation points Volunteer Moderator
    2025-08-28T05:35:32.8466667+00:00

    Hi Derek,

    If you post the domain you are attempting to create managed certificate for in a comment I will run some DNS queries from multiple global points and see if I see anything wrong. Since you have done it so many times there probably isn't anything wrong, but it won't hurt for me to check.

    After you attempt to add managed certificate, please see if domain validation token is being created using instructions below.

    For example, say you are adding managed certificate for www.yourcustomdomain.com. You start process in Azure portal, then in separate tab you immediately navigate to below link:

    https://www.yourcustomdomain.com/.well-known/pki-validation/fileauth.txt

    You will get security warning, since certificate hasn't been issued, so click Advanced and then click to continue to site. Every 3 seconds or so, refresh the page. At first, you should receive error similar to below screenshot:

    enter image description here

    However, if you keep refreshing your browser every few seconds, within a few minutes you should see token appear, which would be similar to below screenshot:

    enter image description here

    If you keep refreshing the page for 10-15 minutes and token never appears and/or certificate never gets issued, then it means there is an issue and your managed certificate is unlikely to ever get issued.

    After the token shows up, if things are working properly your certificate should be issued in about 5-10 minutes. When it is issued if you again browse to above link the token will be replaced by error message since the token is no longer needed and thus removed.

    Please click Accept Answer and upvote if the above was helpful.

    Thanks.

    -TP


  3. Michele Ariis 7,210 Reputation points MVP
    2025-08-28T05:32:20.4+00:00

    Hi, the “Request Time-out” error when creating the App Service Managed Certificate is almost always caused by a failed domain check. Check that the host points directly to the app with a CNAME → <appname>.azurewebsites.net (no Front Door/Cloudflare/WAF in the middle; on Cloudflare, set “DNS only”), that there are no blocking CAAs or add issue "digicert.com" (and issuewild "digicert.com" if necessary), and that the app is publicly accessible (Access restrictions disabled, no Private Endpoint/“Public network access: Off” during issuance). Delete any Pending/Failed certificates and the domain binding, re-add the domain, and re-issue; if using the CLI, run it and then check the certificate status with az resource show -g <rg> -n "<hostname>" --resource-type Microsoft.Web/certificates (look at provisioningState/statusReason). If you need to run a proxy in front of you, don't use AMSC: use the Front Door/ALB managed certificate or issue via Key Vault/ACME and connect that to the App Service. If it keeps expiring, collect quick evidence (nslookup -type=CAA domain, nslookup host) and open an App Service ticket asking them to requeue the issuance for the host, including subscription/app/area and the certificate status JSON.


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.