diff --git a/aspnetcore/aspnetcore-2.0.md b/aspnetcore/aspnetcore-2.0.md
index 0282986f63..0a9f360636 100644
--- a/aspnetcore/aspnetcore-2.0.md
+++ b/aspnetcore/aspnetcore-2.0.md
@@ -145,7 +145,6 @@ For information about the status of C# 7.1 features, see [the Roslyn GitHub repo
* [Configuring Twitter authentication](xref:security/authentication/twitter-logins)
* [Configuring Google authentication](xref:security/authentication/google-logins)
* [Configuring Microsoft Account authentication](xref:security/authentication/microsoft-logins)
-* [Setting up HTTPS for development in ASP.NET Core](xref:security/https)
## Migration guidance
diff --git a/aspnetcore/includes/make-ssl-cert.md b/aspnetcore/includes/make-ssl-cert.md
index 2071c0f00b..8f0d7b1b4d 100644
--- a/aspnetcore/includes/make-ssl-cert.md
+++ b/aspnetcore/includes/make-ssl-cert.md
@@ -1,5 +1,3 @@
For generating self-signed SSL certificates on Windows, you can use the PowerShell cmdlet [New-SelfSignedCertificate](/powershell/module/pkiclient/new-selfsignedcertificate?view=win10-ps). For a third-party tool that makes it easier for you to generate self-signed certificates, see [SelfCert](https://www.pluralsight.com/blog/software-development/selfcert-create-a-self-signed-certificate-interactively-gui-or-programmatically-in-net).
On macOS and Linux you can create a self-signed certificate using [OpenSSL](https://www.openssl.org/).
-
-For more information, see [Setting up HTTPS for development](xref:security/https).
diff --git a/aspnetcore/security/authentication/social/index.md b/aspnetcore/security/authentication/social/index.md
index 242a9a7286..a8280db0b9 100644
--- a/aspnetcore/security/authentication/social/index.md
+++ b/aspnetcore/security/authentication/social/index.md
@@ -49,9 +49,7 @@ OAuth 2.0 requires the use of SSL for authentication over the HTTPS protocol.
Note: Projects created using **Web Application** or **Web API** project templates for ASP.NET Core 2.x are automatically configured to enable SSL and launch with https URL if the **Individual User Accounts** option was selected on **Change Authentication dialog** in the project wizard as shown above.
-* Learn how to enable SSL manually by following the steps in [Setting up HTTPS for development in ASP.NET Core](xref:security/https) topic.
-
-* Then, require SSL on your site by following the steps in [Enforcing SSL in an ASP.NET Core app](xref:security/enforcing-ssl) topic.
+* Require SSL on your site by following the steps in [Enforcing SSL in an ASP.NET Core app](xref:security/enforcing-ssl) topic.
## Use SecretManager to store tokens assigned by login providers
diff --git a/aspnetcore/security/authorization/secure-data.md b/aspnetcore/security/authorization/secure-data.md
index 7c809ecdbf..48a276a729 100644
--- a/aspnetcore/security/authorization/secure-data.md
+++ b/aspnetcore/security/authorization/secure-data.md
@@ -103,7 +103,7 @@ In the `ConfigureServices` method of the *Startup.cs* file, add the [RequireHttp
[!code-csharp[Main](secure-data/samples/final/Startup.cs?name=snippet_SSL&highlight=1)]
-If you're using Visual Studio, see [Set up IIS Express for SSL/HTTPS](xref:security/enforcing-ssl#set-up-iis-express-for-sslhttps). To redirect HTTP requests to HTTPS, see [URL Rewriting Middleware](xref:fundamentals/url-rewriting). If you are using Visual Studio Code or testing on local platform that doesn't include a test certificate for SSL:
+To redirect HTTP requests to HTTPS, see [URL Rewriting Middleware](xref:fundamentals/url-rewriting). If you are using Visual Studio Code or testing on local platform that doesn't include a test certificate for SSL:
- Set `"LocalTest:skipSSL": true` in the *appsettings.json* file.
diff --git a/aspnetcore/security/enforcing-ssl.md b/aspnetcore/security/enforcing-ssl.md
index cbf4c3a1b2..70633a4f51 100644
--- a/aspnetcore/security/enforcing-ssl.md
+++ b/aspnetcore/security/enforcing-ssl.md
@@ -36,7 +36,3 @@ See [URL Rewriting Middleware](xref:fundamentals/url-rewriting) for more informa
Requiring HTTPS globally (`options.Filters.Add(new RequireHttpsAttribute());`) is a security best practice. Applying the
`[RequireHttps]` attribute to all controller is not considered as secure as requiring HTTPS globally. You can't guarantee new controllers added to your app will remember to apply the `[RequireHttps]` attribute.
-
-## Set up IIS Express for SSL/HTTPS
-
-See [Setting up HTTPS for development in ASP.NET Core](xref:security/https#iisxpress).
diff --git a/aspnetcore/security/https.md b/aspnetcore/security/https.md
deleted file mode 100644
index ec77e5822e..0000000000
--- a/aspnetcore/security/https.md
+++ /dev/null
@@ -1,128 +0,0 @@
----
-title: Setting up HTTPS for development in ASP.NET Core
-author: Rick-Anderson
-description: Shows how to set up HTTPS for development in ASP.NET Core 2.0.
-keywords: ASP.NET Core,SSL,HTTPS
-ms.author: riande
-manager: wpickett
-ms.date: 05/10/2017
-ms.topic: article
-ms.assetid: 94f2f1a4-7d46-45e2-a085-a57916e41724
-ms.technology: aspnet
-ms.prod: asp.net-core
-uid: security/https
----
-# Setting up HTTPS for development in ASP.NET Core
-
-> [!NOTE]
-> This topic applies to ASP.NET Core 2.0 Preview 1
-
-You can configure your application to use HTTPS during development to simulate HTTPS in your production environment. Enabling HTTPS may be required to enable integration with various identity providers (like [Azure AD](https://azure.microsoft.com/services/active-directory) and [Azure AD B2C](https://azure.microsoft.com/services/active-directory-b2c/)).
-
-
-
-On Windows if you’ve installed Visual Studio or IIS Express, the IIS Express Development Certificate will be in your LocalMachine certificate store. You can update your project properties in Visual Studio to use this certificate when running behind IIS Express.
-
- * In Solution Explorer, right-click the project and select **Properties**.
- * On the left pane, select **Debug**.
- * Check **Enable SSL**
- * Copy the SSL URL and paste it into the **App URL**
-
-![Debug tab of web application properties](enforcing-ssl/_static/ssl.png)
-
-For development you can use the IIS Express Development Certificate if it is available, or create a new certificate for development purposes. The development certificate should be configured in the `appsettings.Development.json` file so that it is not used in production:
-
-```json
-{
- "Certificates": {
- "HTTPS": {
- "Source": "Store",
- "StoreLocation": "LocalMachine",
- "StoreName": "My",
- "Subject": "CN=localhost",
- "AllowInvalid": true
- }
- }
-}
-```
-
-An app with this configuration running in production will throw an exception saying "No certificate named 'HTTPS' found in configuration for the current environment (Production)". To switch the [environment](xref:fundamentals/environments) to `Development`, set the `ASPNETCORE_ENVIRONMENT` environment variable to `Development`.
-
-If you do not have the IIS Express Development Certificate installed, you can create a development certificate yourself. On Windows you can create a development certificate and add it to the trusted root store for the current user by running the following PowerShell commands in an elevated prompt:
-
-```powershell
-$cert = New-SelfSignedCertificate -Subject localhost -DnsName localhost -FriendlyName "ASP.NET Core Development" -KeyUsage DigitalSignature -TextExtension @("2.5.29.37={text}1.3.6.1.5.5.7.3.1")
-Export-Certificate -Cert $cert -FilePath cert.cer
-Import-Certificate -FilePath cert.cer -CertStoreLocation cert:/CurrentUser/Root
-```
-
-
-
-## Kestrel on macOS and Linux
-
-You can configure Kestrel to listen over HTTPS by configuring an endpoint with the desired IP address, port, and certificate. The certificate can be configured inline, or in the top-level `Certificates` section and then referenced by name:
-
-```json
-{
- "Kestrel": {
- "Endpoints": {
- "LocalhostHttps": {
- "Address": "127.0.0.1",
- "Port": "43434",
- "Certificate": "HTTPS"
- }
- }
- }
-}
-
-```
-
-On macOS and Linux you can create a self-signed certificate for HTTPS using [OpenSSL](https://www.openssl.org/):
-
-```bash
-openssl req -new -x509 -newkey rsa:2048 -keyout localhost.key -out localhost.cer -days 365 -subj /CN=localhost
-openssl pkcs12 -export -out certificate.pfx -inkey localhost.key -in localhost.cer
-```
-
-Once the `certificate.pfx` file has been generated, configure the HTTPS certificate in your `appsettings.Development.json` file:
-
-```json
-{
- "Certificates": {
- "HTTPS": {
- "Source": "File",
- "Path": "certificate.pfx"
- }
- }
-}
-```
-
-You will also need to specify the passphrase for the certificate by setting the “Certificates:HTTPS:Password” config property. Passwords should not be stored in plain text. See [Safe Storage of App Secrets During Development](app-secrets.md) for appropriate handling of the certificate passphrase.
-
-On macOS you can [add the certificate to your keychain](https://support.apple.com/kb/PH20129?locale=en_US) and [change its trust settings](https://support.apple.com/kb/PH20127?locale=en_US&viewlocale=en_US) so that it is trusted for HTTPS during development. To add the certificate to your keychain (the equivalent of the `CurrentUser/My` store on Windows) run the following command:
-
-```bash
-security import certificate.pfx -k ~/Library/Keychains/login.keychain-db
-```
-
-And then to trust the certificate:
-
-```bash
-security add-trusted-cert localhost.cer
-```
-
-You can then configure your app to use this certificate in development like this:
-
-```json
-{
- "Certificates": {
- "HTTPS": {
- "Source": "Store",
- "StoreLocation": "CurrentUser",
- "StoreName": "My",
- "Subject": "CN=localhost",
- "AllowInvalid": true
- }
- }
-}
-```
diff --git a/aspnetcore/security/index.md b/aspnetcore/security/index.md
index c6e287f237..27119d4843 100644
--- a/aspnetcore/security/index.md
+++ b/aspnetcore/security/index.md
@@ -74,7 +74,6 @@ uid: security/index
* [Safe storage of app secrets during development](app-secrets.md)
* [Azure Key Vault configuration provider](key-vault-configuration.md)
* [Enforcing SSL](enforcing-ssl.md)
-* [Setting up HTTPS for development](https.md)
* [Anti-Request Forgery](anti-request-forgery.md)
* [Preventing Open Redirect Attacks](preventing-open-redirects.md)
* [Preventing Cross-Site Scripting](cross-site-scripting.md)
diff --git a/aspnetcore/toc.md b/aspnetcore/toc.md
index bda958de0c..09f0b84fb0 100644
--- a/aspnetcore/toc.md
+++ b/aspnetcore/toc.md
@@ -250,7 +250,6 @@
####[Sharing cookies between applications](xref:security/data-protection/compatibility/cookie-sharing)
####[Replacing in ASP.NET](xref:security/data-protection/compatibility/replacing-machinekey)
## [Enforcing SSL](xref:security/enforcing-ssl)
-## [Setting up HTTPS for development](xref:security/https)
## [Safe storage of app secrets during development](xref:security/app-secrets)
## [Azure Key Vault configuration provider](xref:security/key-vault-configuration)
## [Anti-Request Forgery](xref:security/anti-request-forgery)