Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 18276be

Browse files
committedDec 16, 2021
Fixed blocking errors
1 parent 1c494f0 commit 18276be

File tree

9 files changed

+42
-40
lines changed

9 files changed

+42
-40
lines changed
 

‎articles/application-gateway/configure-keyvault-portal.md renamed to ‎articles/application-gateway/configure-key-vault-portal.md

Lines changed: 40 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Configure TLS termination with Key Vault certificates - Portal
3-
description: Learn how how to use an Azure Portal to integrate your key vault with your application gateway for TLS/SSL termination certificates.
3+
description: Learn how to use an Azure portal to integrate your key vault with your application gateway for TLS/SSL termination certificates.
44
author: gaking
55
ms.author: tcsougan
66
ms.service: application-gateway
@@ -9,13 +9,13 @@ ms.date: 10/01/2021
99
ms.custom: template-how-to #Required; leave this attribute/value as-is.
1010
---
1111

12-
# Configure TLS termination with Key Vault certificates using Azure Portal
12+
# Configure TLS termination with Key Vault certificates using Azure portal
1313

1414
[Azure Key Vault](../key-vault/general/overview.md) is a platform-managed secret store that you can use to safeguard secrets, keys, and TLS/SSL certificates. Azure Application Gateway supports integration with Key Vault for server certificates that are attached to HTTPS-enabled listeners. This support is limited to the Application Gateway v2 SKU.
1515

1616
For more information, see [TLS termination with Key Vault certificates](key-vault-certs.md).
1717

18-
This article shows you how to use Azure Portal to integrate your key vault with your application gateway for TLS/SSL termination certificates.
18+
This article shows you how to use Azure portal to integrate your key vault with your application gateway for TLS/SSL termination certificates.
1919

2020

2121
<!-- 3. Prerequisites
@@ -27,7 +27,7 @@ Use clear and unambiguous language and use a list format.
2727

2828
Before you begin, you must have an Azure subscription. If not, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
2929

30-
## Configuration Steps
30+
## Configuration steps
3131

3232
### Create a resource group
3333
<!-- Introduction paragraph -->
@@ -62,7 +62,7 @@ Before you begin, you must have an Azure subscription. If not, create a [free ac
6262
Leave the other options to their defaults.
6363
5. After providing the information above, select **create**.
6464

65-
:::image type="content" source="media/configure-keyvault-portal/create-keyvault.png" alt-text="screenshot of keyvault creation":::
65+
:::image type="content" source="media/configure-key-vault-portal/create-key-vault.png" alt-text="screenshot of key vault creation":::
6666

6767
At this point, your Azure account is the only one authorized to perform operations on this new vault.
6868

@@ -74,7 +74,7 @@ At this point, your Azure account is the only one authorized to perform operatio
7474
3. Input your Certificate name and complete all the required fields.
7575
4. After providing the information above, select **Create**.
7676

77-
:::image type="content" source="media/configure-keyvault-portal/create-keyvault-certificate.png" alt-text="Screenshot of keyvault certificate creation":::
77+
:::image type="content" source="media/configure-key-vault-portal/create-key-vault-certificate.png" alt-text="Screenshot of key vault certificate creation":::
7878

7979
> [!Important]
8080
> Issuance policies only affect certificates that will be issued in the future. Modifying this issuance policy will not affect any existing certificates.
@@ -114,21 +114,21 @@ You'll create the application gateway using the tabs on the **Create an applicat
114114

115115
2. For Azure to communicate between the resources that you create, it needs a virtual network. You can either create a new virtual network or use an existing one. In this example, you'll create a new virtual network at the same time that you create the application gateway. Application Gateway instances are created in separate subnets. You create two subnets in this example: one for the application gateway, and another for the backend servers.
116116

117-
> [!Note]
118-
[Virtual network service endpoint policies](../virtual-network/virtual-network-service-endpoint-policies-overview.md) are currently not supported in an Application Gateway subnet.
117+
> [!Note]
118+
> [Virtual network service endpoint policies](../virtual-network/virtual-network-service-endpoint-policies-overview.md) are currently not supported in an Application Gateway subnet.
119119
120-
Under Configure virtual network, create a new virtual network by selecting Create new. In the Create virtual network window that opens, enter the following values to create the virtual network and two subnets:
120+
Under Configure virtual network, create a new virtual network by selecting Create new. In the Create virtual network window that opens, enter the following values to create the virtual network and two subnets:
121121

122-
Name: Enter myVNet for the name of the virtual network.
122+
Name: Enter myVNet for the name of the virtual network.
123123

124-
Subnet name (Application Gateway subnet): The Subnets grid will show a subnet named Default. Change the name of this subnet to myAGSubnet.
125-
The application gateway subnet can contain only application gateways. No other resources are allowed.
124+
Subnet name (Application Gateway subnet): The Subnets grid will show a subnet named Default. Change the name of this subnet to myAGSubnet.
125+
The application gateway subnet can contain only application gateways. No other resources are allowed.
126126

127-
Subnet name (backend server subnet): In the second row of the Subnets grid, enter myBackendSubnet in the Subnet name column.
127+
Subnet name (backend server subnet): In the second row of the Subnets grid, enter myBackendSubnet in the Subnet name column.
128128

129-
Address range (backend server subnet): In the second row of the Subnets Grid, enter an address range that doesn't overlap with the address range of myAGSubnet. For example, if the address range of myAGSubnet is 10.0.0.0/24, enter 10.0.1.0/24 for the address range of myBackendSubnet.
129+
Address range (backend server subnet): In the second row of the Subnets Grid, enter an address range that doesn't overlap with the address range of myAGSubnet. For example, if the address range of myAGSubnet is 10.0.0.0/24, enter 10.0.1.0/24 for the address range of myBackendSubnet.
130130

131-
Select OK to close the Create virtual network window and save the virtual network settings.
131+
Select OK to close the Create virtual network window and save the virtual network settings.
132132

133133
3. On the Basics tab, accept the default values for the other settings and then select Next: Frontends.
134134

@@ -137,8 +137,8 @@ Select OK to close the Create virtual network window and save the virtual networ
137137
1. On the Frontends tab, verify Frontend IP address type is set to Public.
138138
You can configure the Frontend IP to be Public or Private as per your use case. In this example, you'll choose a Public Frontend IP.
139139

140-
> [!Note]
141-
For the Application Gateway v2 SKU, there must be a Public frontend IP configuration. You can still have both a Public and a Private frontend IP configuration, but Private only frontend IP configuration (Only ILB mode) is currently not enabled for the v2 SKU.
140+
> [!Note]
141+
> For the Application Gateway v2 SKU, there must be a Public frontend IP configuration. You can still have both a Public and a Private frontend IP configuration, but Private only frontend IP configuration (Only ILB mode) is currently not enabled for the v2 SKU.
142142
143143
2. Select Add new for the Public IP address and enter myAGPublicIPAddress for the public IP address name, and then select OK.
144144

@@ -191,21 +191,21 @@ Review the settings on the Review + create tab, and then select Create to create
191191
Add backend targets to your Backend Pool.
192192

193193

194-
### Create User-Assigned Managed Identity
194+
### Create user-assigned managed identity
195195

196196
Search for 'Managed Identity'
197-
1. Create User Assigned Managed Identity
198-
2. Go back to Key Vault previously created
199-
3. Click on Access Policy
200-
4. Click 'Add access policy'
201-
5. Fill in the required level of permissions you need
202-
6. Select principal - click on 'None selected'
203-
7. Search for the managed identity name previously created and click select to use that one
197+
1. Create user assigned managed identity.
198+
2. Go back to Key Vault previously created.
199+
3. Select Access Policy.
200+
4. Select 'Add access policy'.
201+
5. Fill in the required level of permissions you need.
202+
6. Select principal - then choose 'None selected'.
203+
7. Search for the managed identity name previously created and use that one.
204204
Skip Application identity.
205205

206-
:::image type="content" source="media/configure-keyvault-portal/create-user-assigned-identity.png" alt-text="Screenshot of user assigned identity creation":::
206+
:::image type="content" source="media/configure-key-vault-portal/create-user-assigned-identity.png" alt-text="Screenshot of user assigned identity creation":::
207207

208-
For additional information on configuring Access Policy permissions and Key Vault Firewall permissions, please read below articles.
208+
For additional information on configuring Access Policy permissions and Key Vault Firewall permissions, read below articles.
209209

210210
[Delegate user-assigned managed identity to Key Vault](./key-vault-certs.md#delegate-user-assigned-managed-identity-to-key-vault)
211211

@@ -214,21 +214,21 @@ For additional information on configuring Access Policy permissions and Key Vaul
214214
### Point the TLS/SSL certificate to your key vault by assigning the user-managed identity to the application gateway
215215

216216
1. Go back to the application gateway previously configured
217-
2. Click on 'Listeners' and select 'Add listener' (this will be the HTTPS listener)
218-
3. Fill the in the below fields:
219-
220-
- Listener name: unique-name
221-
- Frontend IP: Public
222-
- Port: 443
223-
- Protocol: HTTPS
224-
- Https Settings: Choose a certificate from Key Vault
225-
- Cert name: unique-name
226-
- Managed identity: select the name of the managed identity previously created from above
227-
- Key vault: select name of key vault previously configured
228-
- Certificate: this should auto-populate the certificate(s) found in key vault
217+
2. Select 'Listeners' and then choose 'Add listener' (this will add the HTTPS listener)
218+
3. Complete the following fields:
219+
220+
- Listener name: unique-name
221+
- Frontend IP: Public
222+
- Port: 443
223+
- Protocol: HTTPS
224+
- Https Settings: Choose a certificate from Key Vault
225+
- Cert name: unique-name
226+
- Managed identity: select the name of the managed identity previously created from above
227+
- Key vault: select name of key vault previously configured
228+
- Certificate: auto-populates the certificate(s) found in key vault
229229
Leave remaining selections as default
230230

231-
:::image type="content" source="media/configure-keyvault-portal/applicationgateway-using-keyvault-cert.png" alt-text="Screenshot of application gateway using keyvault":::
231+
:::image type="content" source="media/configure-key-vault-portal/application-gateway-using-key-vault-cert.png" alt-text="Screenshot of application gateway using key vault":::
232232

233233
<!-- 5. Next steps
234234
Required. Provide at least one next step and no more than three. Include some
Loading

‎articles/application-gateway/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -138,6 +138,8 @@
138138
href: tutorial-ssl-cli.md
139139
- name: Configure Key Vault - PowerShell
140140
href: configure-keyvault-ps.md
141+
- name: Configure Key Vault - Portal
142+
href: configure-key-vault-portal.md
141143
- name: End-to-end SSL
142144
items:
143145
- name: End-to-end SSL - Portal

0 commit comments

Comments
 (0)
Please sign in to comment.