You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/configure-key-vault-portal.md
+40-40Lines changed: 40 additions & 40 deletions
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Configure TLS termination with Key Vault certificates - Portal
3
-
description: Learn how how to use an Azure Portal to integrate your key vault with your application gateway for TLS/SSL termination certificates.
3
+
description: Learn how to use an Azure portal to integrate your key vault with your application gateway for TLS/SSL termination certificates.
4
4
author: gaking
5
5
ms.author: tcsougan
6
6
ms.service: application-gateway
@@ -9,13 +9,13 @@ ms.date: 10/01/2021
9
9
ms.custom: template-how-to #Required; leave this attribute/value as-is.
10
10
---
11
11
12
-
# Configure TLS termination with Key Vault certificates using Azure Portal
12
+
# Configure TLS termination with Key Vault certificates using Azure portal
13
13
14
14
[Azure Key Vault](../key-vault/general/overview.md) is a platform-managed secret store that you can use to safeguard secrets, keys, and TLS/SSL certificates. Azure Application Gateway supports integration with Key Vault for server certificates that are attached to HTTPS-enabled listeners. This support is limited to the Application Gateway v2 SKU.
15
15
16
16
For more information, see [TLS termination with Key Vault certificates](key-vault-certs.md).
17
17
18
-
This article shows you how to use Azure Portal to integrate your key vault with your application gateway for TLS/SSL termination certificates.
18
+
This article shows you how to use Azure portal to integrate your key vault with your application gateway for TLS/SSL termination certificates.
19
19
20
20
21
21
<!-- 3. Prerequisites
@@ -27,7 +27,7 @@ Use clear and unambiguous language and use a list format.
27
27
28
28
Before you begin, you must have an Azure subscription. If not, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
29
29
30
-
## Configuration Steps
30
+
## Configuration steps
31
31
32
32
### Create a resource group
33
33
<!-- Introduction paragraph -->
@@ -62,7 +62,7 @@ Before you begin, you must have an Azure subscription. If not, create a [free ac
62
62
Leave the other options to their defaults.
63
63
5. After providing the information above, select **create**.
64
64
65
-
:::image type="content" source="media/configure-keyvault-portal/create-keyvault.png" alt-text="screenshot of keyvault creation":::
65
+
:::image type="content" source="media/configure-key-vault-portal/create-key-vault.png" alt-text="screenshot of key vault creation":::
66
66
67
67
At this point, your Azure account is the only one authorized to perform operations on this new vault.
68
68
@@ -74,7 +74,7 @@ At this point, your Azure account is the only one authorized to perform operatio
74
74
3. Input your Certificate name and complete all the required fields.
75
75
4. After providing the information above, select **Create**.
76
76
77
-
:::image type="content" source="media/configure-keyvault-portal/create-keyvault-certificate.png" alt-text="Screenshot of keyvault certificate creation":::
77
+
:::image type="content" source="media/configure-key-vault-portal/create-key-vault-certificate.png" alt-text="Screenshot of key vault certificate creation":::
78
78
79
79
> [!Important]
80
80
> Issuance policies only affect certificates that will be issued in the future. Modifying this issuance policy will not affect any existing certificates.
@@ -114,21 +114,21 @@ You'll create the application gateway using the tabs on the **Create an applicat
114
114
115
115
2. For Azure to communicate between the resources that you create, it needs a virtual network. You can either create a new virtual network or use an existing one. In this example, you'll create a new virtual network at the same time that you create the application gateway. Application Gateway instances are created in separate subnets. You create two subnets in this example: one for the application gateway, and another for the backend servers.
116
116
117
-
> [!Note]
118
-
[Virtual network service endpoint policies](../virtual-network/virtual-network-service-endpoint-policies-overview.md) are currently not supported in an Application Gateway subnet.
117
+
> [!Note]
118
+
> [Virtual network service endpoint policies](../virtual-network/virtual-network-service-endpoint-policies-overview.md) are currently not supported in an Application Gateway subnet.
119
119
120
-
Under Configure virtual network, create a new virtual network by selecting Create new. In the Create virtual network window that opens, enter the following values to create the virtual network and two subnets:
120
+
Under Configure virtual network, create a new virtual network by selecting Create new. In the Create virtual network window that opens, enter the following values to create the virtual network and two subnets:
121
121
122
-
Name: Enter myVNet for the name of the virtual network.
122
+
Name: Enter myVNet for the name of the virtual network.
123
123
124
-
Subnet name (Application Gateway subnet): The Subnets grid will show a subnet named Default. Change the name of this subnet to myAGSubnet.
125
-
The application gateway subnet can contain only application gateways. No other resources are allowed.
124
+
Subnet name (Application Gateway subnet): The Subnets grid will show a subnet named Default. Change the name of this subnet to myAGSubnet.
125
+
The application gateway subnet can contain only application gateways. No other resources are allowed.
126
126
127
-
Subnet name (backend server subnet): In the second row of the Subnets grid, enter myBackendSubnet in the Subnet name column.
127
+
Subnet name (backend server subnet): In the second row of the Subnets grid, enter myBackendSubnet in the Subnet name column.
128
128
129
-
Address range (backend server subnet): In the second row of the Subnets Grid, enter an address range that doesn't overlap with the address range of myAGSubnet. For example, if the address range of myAGSubnet is 10.0.0.0/24, enter 10.0.1.0/24 for the address range of myBackendSubnet.
129
+
Address range (backend server subnet): In the second row of the Subnets Grid, enter an address range that doesn't overlap with the address range of myAGSubnet. For example, if the address range of myAGSubnet is 10.0.0.0/24, enter 10.0.1.0/24 for the address range of myBackendSubnet.
130
130
131
-
Select OK to close the Create virtual network window and save the virtual network settings.
131
+
Select OK to close the Create virtual network window and save the virtual network settings.
132
132
133
133
3. On the Basics tab, accept the default values for the other settings and then select Next: Frontends.
134
134
@@ -137,8 +137,8 @@ Select OK to close the Create virtual network window and save the virtual networ
137
137
1. On the Frontends tab, verify Frontend IP address type is set to Public.
138
138
You can configure the Frontend IP to be Public or Private as per your use case. In this example, you'll choose a Public Frontend IP.
139
139
140
-
> [!Note]
141
-
For the Application Gateway v2 SKU, there must be a Public frontend IP configuration. You can still have both a Public and a Private frontend IP configuration, but Private only frontend IP configuration (Only ILB mode) is currently not enabled for the v2 SKU.
140
+
> [!Note]
141
+
> For the Application Gateway v2 SKU, there must be a Public frontend IP configuration. You can still have both a Public and a Private frontend IP configuration, but Private only frontend IP configuration (Only ILB mode) is currently not enabled for the v2 SKU.
142
142
143
143
2. Select Add new for the Public IP address and enter myAGPublicIPAddress for the public IP address name, and then select OK.
144
144
@@ -191,21 +191,21 @@ Review the settings on the Review + create tab, and then select Create to create
191
191
Add backend targets to your Backend Pool.
192
192
193
193
194
-
### Create User-Assigned Managed Identity
194
+
### Create user-assigned managed identity
195
195
196
196
Search for 'Managed Identity'
197
-
1. Create User Assigned Managed Identity
198
-
2. Go back to Key Vault previously created
199
-
3.Click on Access Policy
200
-
4.Click 'Add access policy'
201
-
5. Fill in the required level of permissions you need
202
-
6. Select principal - click on 'None selected'
203
-
7. Search for the managed identity name previously created and click select to use that one
197
+
1. Create user assigned managed identity.
198
+
2. Go back to Key Vault previously created.
199
+
3.Select Access Policy.
200
+
4.Select 'Add access policy'.
201
+
5. Fill in the required level of permissions you need.
202
+
6. Select principal - then choose 'None selected'.
203
+
7. Search for the managed identity name previously created and use that one.
204
204
Skip Application identity.
205
205
206
-
:::image type="content" source="media/configure-keyvault-portal/create-user-assigned-identity.png" alt-text="Screenshot of user assigned identity creation":::
206
+
:::image type="content" source="media/configure-key-vault-portal/create-user-assigned-identity.png" alt-text="Screenshot of user assigned identity creation":::
207
207
208
-
For additional information on configuring Access Policy permissions and Key Vault Firewall permissions, please read below articles.
208
+
For additional information on configuring Access Policy permissions and Key Vault Firewall permissions, read below articles.
209
209
210
210
[Delegate user-assigned managed identity to Key Vault](./key-vault-certs.md#delegate-user-assigned-managed-identity-to-key-vault)
211
211
@@ -214,21 +214,21 @@ For additional information on configuring Access Policy permissions and Key Vaul
214
214
### Point the TLS/SSL certificate to your key vault by assigning the user-managed identity to the application gateway
215
215
216
216
1. Go back to the application gateway previously configured
217
-
2.Click on 'Listeners' and select 'Add listener' (this will be the HTTPS listener)
218
-
3.Fill the in the below fields:
219
-
220
-
- Listener name: unique-name
221
-
- Frontend IP: Public
222
-
- Port: 443
223
-
- Protocol: HTTPS
224
-
- Https Settings: Choose a certificate from Key Vault
225
-
- Cert name: unique-name
226
-
- Managed identity: select the name of the managed identity previously created from above
227
-
- Key vault: select name of key vault previously configured
228
-
- Certificate: this should auto-populate the certificate(s) found in key vault
217
+
2.Select 'Listeners' and then choose 'Add listener' (this will add the HTTPS listener)
218
+
3.Complete the following fields:
219
+
220
+
- Listener name: unique-name
221
+
- Frontend IP: Public
222
+
- Port: 443
223
+
- Protocol: HTTPS
224
+
- Https Settings: Choose a certificate from Key Vault
225
+
- Cert name: unique-name
226
+
- Managed identity: select the name of the managed identity previously created from above
227
+
- Key vault: select name of key vault previously configured
228
+
- Certificate: auto-populates the certificate(s) found in key vault
229
229
Leave remaining selections as default
230
230
231
-
:::image type="content" source="media/configure-keyvault-portal/applicationgateway-using-keyvault-cert.png" alt-text="Screenshot of application gateway using keyvault":::
231
+
:::image type="content" source="media/configure-key-vault-portal/application-gateway-using-key-vault-cert.png" alt-text="Screenshot of application gateway using key vault":::
232
232
233
233
<!-- 5. Next steps
234
234
Required. Provide at least one next step and no more than three. Include some
0 commit comments