You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-configure-listener-specific-ssl-policy.md
+3Lines changed: 3 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -28,6 +28,9 @@ First create a new Application Gateway as you would usually through the portal -
28
28
29
29
To set up a listener-specific SSL policy, you'll need to first go to the **SSL settings (Preview)** tab in the Portal and create a new SSL profile. When you create an SSL profile, you'll see two tabs: **Client Authentication** and **SSL Policy**. The **SSL Policy** tab is to configure a listener-specific SSL policy. The **Client Authentication** tab is where to upload a client certificate(s) for mutual authentication - for more information, check out [Configuring a mutual authentication](./mutual-authentication-portal.md).
30
30
31
+
> [!NOTE]
32
+
> We recommend using TLS 1.2 as TLS 1.2 will be mandated in the future.
33
+
31
34
1. Search for **Application Gateway** in portal, select **Application gateways**, and click on your existing Application Gateway.
32
35
33
36
2. Select **SSL settings (Preview)** from the left-side menu.
Copy file name to clipboardExpand all lines: articles/application-gateway/mutual-authentication-portal.md
+14Lines changed: 14 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -73,6 +73,20 @@ Now that we've created an SSL profile with mutual authentication configured, we
73
73
74
74

75
75
76
+
## Renew expired client CA certificates
77
+
78
+
In the case that your client CA certificate has expired, you can update the certificate on your gateway through the following steps:
79
+
80
+
1. Navigate to your Application Gateway and go to the **SSL settings (Preview)** tab in the left-hand menu.
81
+
82
+
1. Select the existing SSL profile(s) with the expired client certificate.
83
+
84
+
1. Select **Upload a new certificate** in the **Client Authentication** tab and upload your new client certificate.
85
+
86
+
1. Select the trash can icon next to the expired certificate. This will remove the association of that certificate from the SSL profile.
87
+
88
+
1. Repeat steps 2-4 with any other SSL profile that was using the same expired client certificate. You will be able to choose the new certificate you uploaded in step 3 from the dropdown menu in other SSL profiles.
Configure client authentication on your Application Gateway. Make sure the trusted client CA certificate chain you upload, if you upload a chain, is complete and contains all intermediate certificates (if any).
76
76
77
+
> [!IMPORTANT]
78
+
> Please ensure that you upload the entire client CA certificate chain in one file.
79
+
80
+
> [!NOTE]
81
+
> We recommend using TLS 1.2 with mutual authentication as TLS 1.2 will be mandated in the future.
Copy file name to clipboardExpand all lines: articles/application-gateway/mutual-authentication-troubleshooting.md
+5-47Lines changed: 5 additions & 47 deletions
Original file line number
Diff line number
Diff line change
@@ -39,53 +39,9 @@ The client certificate you uploaded is a self-signed certificate and is resultin
39
39
40
40
Double check that the self-signed certificate that you're using has the extension *BasicConstraintsOid* = "2.5.29.19" which indicates the subject can act as a CA. This will ensure that the certificate used is a CA certificate. For more information about how to generate self-signed client certificates, check out [trusted client certificates](./mutual-authentication-certificate-management.md).
41
41
42
-
### Expired client CA certificate
43
-
44
-
#### Problem
45
-
46
-
The client CA certificate you uploaded onto your Application Gateway is now expired. You can validate that this is the problem by looking through the gateway's access logs and checking to see what the error message is.
47
-
48
-
#### Solution
49
-
50
-
You can update the client certificate on your gateway through portal or through PowerShell.
51
-
52
-
**Portal**
53
-
1. Navigate to your Application Gateway and go to the **SSL settings (Preview)** tab in the left-hand menu.
54
-
2. Select the existing SSL profile(s) with the expired client certificate.
55
-
3. Select **Upload a new certificate** in the **Client Authentication** tab and upload your new client certificate.
56
-
4. Select the trash can icon next to the expired certificate. This will remove the association of that certificate from the SSL profile.
57
-
5. Repeat steps 2-4 with any other SSL profile that was using the same expired client certificate. You will be able to choose the new certificate you uploaded in step 3 from the dropdown menu in other SSL profiles.
You must have Azure PowerShell module version 1.0.0 or later installed. Run `Get-Module -ListAvailable Az` to find the version. If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-az-ps). After you verify the PowerShell version, run `Connect-AzAccount` to create a connection with Azure.
You might have been able to configure mutual authentication without any problems but you're running into problems when sending requests to your Application Gateway. We address some common problems and solutions in the following section. You can find the sslClientVerify property in the access logs of your Application Gateway.
44
+
You might have been able to configure mutual authentication without any problems but you're running into problems when sending requests to your Application Gateway. We address some common problems and solutions in the following section. You can find the *sslClientVerify* property in the access logs of your Application Gateway.
89
45
90
46
### SslClientVerify is NONE
91
47
@@ -97,11 +53,13 @@ The property *sslClientVerify* is appearing as "NONE" in your access logs.
97
53
98
54
This is seen when the client doesn't send a client certificate when sending a request to the Application Gateway. This could happen if the client sending the request to the Application Gateway isn't configured correctly to use client certificates. One way to verify that the client authentication setup on Application Gateway is working as expected is through the following OpenSSL command:
The cert flag is the leaf certificate, the key flag is the client private key file.
60
+
The `-cert` flag is the leaf certificate, the `-key` flag is the client private key file.
103
61
104
-
For more information on how to use the OpenSSL s_client command, check out their [manual page](https://www.openssl.org/docs/man1.0.2/man1/openssl-s_client.html).
62
+
For more information on how to use the OpenSSL `s_client` command, check out their [manual page](https://www.openssl.org/docs/man1.0.2/man1/openssl-s_client.html).
0 commit comments