Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 388376c

Browse files
committedMar 30, 2021
added mtls portal instructions
1 parent b78971f commit 388376c

File tree

3 files changed

+25
-32
lines changed

3 files changed

+25
-32
lines changed
 

‎articles/application-gateway/mutual-authentication-portal.md

Lines changed: 25 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Mutual Authentication with Azure Application Gateway
2+
title: COnfiguring mutual authentication on Azure Application Gateway through Portal
33
description: Learn how to configure an Application Gateway to have mutual authentication through Portal
44
services: application-gateway
55
author: mscatyao
66
ms.service: application-gateway
77
ms.topic: how-to
8-
ms.date: 03/29/2021
8+
ms.date: 03/30/2021
99
ms.author: caya
1010
---
1111

@@ -20,65 +20,58 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
2020

2121
## Before you begin
2222

23-
To configure mutual authentication with an Application Gateway, you need a client certificate to upload to the gateway. The client certificate will be used to validate the certificate the client will present to Application Gateway.
23+
To configure mutual authentication with an Application Gateway, you need a client certificate to upload to the gateway. The client certificate will be used to validate the certificate the client will present to Application Gateway. For testing purposes, you can use a self-signed certificate. However, this is not advised for production workloads, because they're harder to manage and aren't completely secure. For more info, see [create a self-signed certificate](./create-ssl-portal.md#create-a-self-signed-certificate).
2424

2525
To learn more, especially about what kind of client certificates you can upload, see [Overview of mutual authentication with Application Gateway](./mutual-authentication-overview.md).
2626

2727
## Create a new Application Gateway
2828

2929
First create a new Application Gateway as you would usually through the portal - there are no additional steps needed in the creation to enable mutual authentication. For more information on how to create an Application Gateway in portal, check out our [portal quickstart tutorial](./quick-create-portal.md).
3030

31-
## Enable mutual authentication for an existing Application Gateway
31+
## Enable mutual authentication on an existing Application Gateway
3232

33-
To configure an existing application gateway with mutual authentication, you must first enable TLS termination in the listener. This action enables TLS encryption for communication between the client and the application gateway. Then, put those certificates for back-end servers in the HTTP settings on the Safe Recipients list. This configuration enables TLS encryption for communication between the application gateway and the back-end servers. That accomplishes end-to-end TLS encryption.
33+
To configure an existing Application Gateway with mutual authentication, you'll need to first go to the SSL settings (Preview) tab in the Portal and create a new SSL profile. When you create an SSL profile, you'll see two tabs: **Client Authentication** and **SSL Policy**. The **Client Authentication** tab is where you'll upload your client certificate(s). The **SSL Policy** tab is to configure a listener specific SSL policy - for more information, check out [Configuring a listener specific SSL policy](./application-gateway-configure-listener-specific-ssl-policy.md).
3434

35-
You'll need to use a listener with the HTTPS protocol and a certificate for enabling TLS termination. You can either use an existing listener that meets those conditions or create a new listener. If you choose the former option, you can ignore the following "Enable TLS termination in an existing application gateway" section and move directly to the "Add authentication/trusted root certificates for backend servers" section.
35+
1. Search for **Application Gateway** in portal, select **Application gateways**, and click on your existing Application Gateway.
3636

37-
If you choose the latter option, apply the steps in the following procedure.
38-
### Enable TLS termination in an existing application gateway
37+
2. Select **SSL settings (Preview)** from the left-side menu.
3938

40-
1. Select **All resources**, and then select **myAppGateway**.
39+
3. Click on the plus sign next to **SSL Profiles** at the top to create a new SSL profile.
4140

42-
2. Select **Listeners** from the left-side menu.
41+
4. Enter a name under **SSL Profile Name**. In this example, we call our SSL profile *applicationGatewaySSLProfile*.
4342

44-
3. Select either **Basic** or **Multi-site** listener depending on your requirements.
45-
46-
4. Under **Protocol**, select **HTTPS**. A pane for **Certificate** appears.
47-
48-
5. Upload the PFX certificate you intend to use for TLS termination between the client and the application gateway.
43+
5. Upload the PEM certificate you intend to use for mutual authentication between the client and the Application Gateway using the **Upload a new certificate** button.
4944

5045
> [!NOTE]
51-
> For testing purposes, you can use a self-signed certificate. However, this is not advised for production workloads, because they're harder to manage and aren't completely secure. For more info, see [create a self-signed certificate](./create-ssl-portal.md#create-a-self-signed-certificate).
52-
53-
6. Add other required settings for the **Listener**, depending on your requirements.
46+
> If this isn't your first SSL profile and you've uploaded other client certificates onto your Application Gateway, you can choose to reuse an existing certificate on your gateway through the dropdown menu.
5447
55-
7. Select **OK** to save.
48+
6. Check the **Verify client certificate issuer's DN** box only if you want Application Gateway to verify the client certificate's immediate issuer Distinguished Name.
5649

57-
### Add authentication/trusted root certificates of back-end servers
50+
7. Select **Add** to save.
5851

59-
1. Select **All resources**, and then select **myAppGateway**.
52+
![Add client authentication to SSL profile](./media/mutual-authentication-portal/mutual-authentication-portal.png)
6053

61-
2. Select **HTTP settings** from the left-side menu. You can either put certificates in an existing back-end HTTP setting on the Safe Recipients list or create a new HTTP setting. (In the next step, the certificate for the default HTTP setting, **appGatewayBackendHttpSettings**, is added to the Safe Recipients list.)
54+
## Associate the SSL profile with a listener
6255

63-
3. Select **appGatewayBackendHttpSettings**.
56+
Now that we've created an SSL profile with mutual authentication configured, we need to associate the SSL profile to the listener to complete the set up of mutual authentication.
6457

65-
4. Under **Protocol**, select **HTTPS**. A pane for **Backend authentication certificates or Trusted root certificates** appears.
58+
1. Navigate to your existing Application Gateway. If you just completed the steps above, you don't need to do anything here.
6659

67-
5. Select **Create new**.
60+
2. Select **Listeners** from the left-side menu.
6861

69-
6. In the **Name** field, enter a suitable name.
62+
3. Click on **Add listener** if you don't already have an HTTPS listener set up. If you already have an HTTPS listener, click on it from the list.
7063

71-
7. Select the certificate file in the **Upload CER certificate** box.
64+
4. Fill out the **Listener name**, **Frontend IP**, **Port**, **Protocol**, and other **HTTPS Settings** to fit your requirements.
7265

73-
For Standard and WAF (v1) application gateways, you should upload the public key of your back-end server certificate in .cer format.
66+
5. Check the **Enable SSL Profile** checkbox so that you can select which SSL Profile to associate with the listener.
7467

75-
![Add certificate](./media/end-to-end-ssl-portal/addcert.png)
68+
6. Select the SSL profile you just created from the dropdown list. In this example, we choose the SSL profile we created from the earlier steps: *applicationGatewaySSLProfile*.
7669

77-
For Standard_v2 and WAF_v2 application gateways, you should upload the root certificate of the back-end server certificate in .cer format. If the back-end certificate is issued by a well-known CA, you can select the **Use Well Known CA Certificate** check box, and then you don't have to upload a certificate.
70+
7. Continue configuring the remainder of the listener to fit your requirements.
7871

79-
![Add trusted root certificate](./media/end-to-end-ssl-portal/trustedrootcert-portal.png)
72+
8. Click **Add** to save your new listener with the SSL profile associated to it.
8073

81-
8. Select **Save**.
74+
![Associate SSL profile to new listener](./media/mutual-authentication-portal/mutual-authentication-listener-portal.png)
8275

8376
## Next steps
8477

0 commit comments

Comments
 (0)