You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/mutual-authentication-portal.md
+25-32Lines changed: 25 additions & 32 deletions
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
-
title: Mutual Authentication with Azure Application Gateway
2
+
title: COnfiguring mutual authentication on Azure Application Gateway through Portal
3
3
description: Learn how to configure an Application Gateway to have mutual authentication through Portal
4
4
services: application-gateway
5
5
author: mscatyao
6
6
ms.service: application-gateway
7
7
ms.topic: how-to
8
-
ms.date: 03/29/2021
8
+
ms.date: 03/30/2021
9
9
ms.author: caya
10
10
---
11
11
@@ -20,65 +20,58 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
20
20
21
21
## Before you begin
22
22
23
-
To configure mutual authentication with an Application Gateway, you need a client certificate to upload to the gateway. The client certificate will be used to validate the certificate the client will present to Application Gateway.
23
+
To configure mutual authentication with an Application Gateway, you need a client certificate to upload to the gateway. The client certificate will be used to validate the certificate the client will present to Application Gateway. For testing purposes, you can use a self-signed certificate. However, this is not advised for production workloads, because they're harder to manage and aren't completely secure. For more info, see [create a self-signed certificate](./create-ssl-portal.md#create-a-self-signed-certificate).
24
24
25
25
To learn more, especially about what kind of client certificates you can upload, see [Overview of mutual authentication with Application Gateway](./mutual-authentication-overview.md).
26
26
27
27
## Create a new Application Gateway
28
28
29
29
First create a new Application Gateway as you would usually through the portal - there are no additional steps needed in the creation to enable mutual authentication. For more information on how to create an Application Gateway in portal, check out our [portal quickstart tutorial](./quick-create-portal.md).
30
30
31
-
## Enable mutual authentication for an existing Application Gateway
31
+
## Enable mutual authentication on an existing Application Gateway
32
32
33
-
To configure an existing application gateway with mutual authentication, you must first enable TLS termination in the listener. This action enables TLS encryption for communication between the client and the application gateway. Then, put those certificates for back-end servers in the HTTP settings on the Safe Recipients list. This configuration enables TLS encryption for communication between the application gateway and the back-end servers. That accomplishes end-to-end TLS encryption.
33
+
To configure an existing Application Gateway with mutual authentication, you'll need to first go to the SSL settings (Preview) tab in the Portal and create a new SSL profile. When you create an SSL profile, you'll see two tabs: **Client Authentication** and **SSL Policy**. The **Client Authentication** tab is where you'll upload your client certificate(s). The **SSL Policy** tab is to configure a listener specific SSL policy - for more information, check out [Configuring a listener specific SSL policy](./application-gateway-configure-listener-specific-ssl-policy.md).
34
34
35
-
You'll need to use a listener with the HTTPS protocol and a certificate for enabling TLS termination. You can either use an existing listener that meets those conditions or create a new listener. If you choose the former option, you can ignore the following "Enable TLS termination in an existing application gateway" section and move directly to the "Add authentication/trusted root certificates for backend servers" section.
35
+
1. Search for **Application Gateway** in portal, select **Application gateways**, and click on your existing Application Gateway.
36
36
37
-
If you choose the latter option, apply the steps in the following procedure.
38
-
### Enable TLS termination in an existing application gateway
37
+
2. Select **SSL settings (Preview)** from the left-side menu.
39
38
40
-
1. Select **All resources**, and then select **myAppGateway**.
39
+
3. Click on the plus sign next to **SSL Profiles** at the top to create a new SSL profile.
41
40
42
-
2. Select **Listeners** from the left-side menu.
41
+
4. Enter a name under **SSL Profile Name**. In this example, we call our SSL profile *applicationGatewaySSLProfile*.
43
42
44
-
3. Select either **Basic** or **Multi-site** listener depending on your requirements.
45
-
46
-
4. Under **Protocol**, select **HTTPS**. A pane for **Certificate** appears.
47
-
48
-
5. Upload the PFX certificate you intend to use for TLS termination between the client and the application gateway.
43
+
5. Upload the PEM certificate you intend to use for mutual authentication between the client and the Application Gateway using the **Upload a new certificate** button.
49
44
50
45
> [!NOTE]
51
-
> For testing purposes, you can use a self-signed certificate. However, this is not advised for production workloads, because they're harder to manage and aren't completely secure. For more info, see [create a self-signed certificate](./create-ssl-portal.md#create-a-self-signed-certificate).
52
-
53
-
6. Add other required settings for the **Listener**, depending on your requirements.
46
+
> If this isn't your first SSL profile and you've uploaded other client certificates onto your Application Gateway, you can choose to reuse an existing certificate on your gateway through the dropdown menu.
54
47
55
-
7. Select **OK** to save.
48
+
6. Check the **Verify client certificate issuer's DN**box only if you want Application Gateway to verify the client certificate's immediate issuer Distinguished Name.
56
49
57
-
### Add authentication/trusted root certificates of back-end servers
50
+
7. Select **Add** to save.
58
51
59
-
1. Select **All resources**, and then select **myAppGateway**.
52
+

60
53
61
-
2. Select **HTTP settings** from the left-side menu. You can either put certificates in an existing back-end HTTP setting on the Safe Recipients list or create a new HTTP setting. (In the next step, the certificate for the default HTTP setting, **appGatewayBackendHttpSettings**, is added to the Safe Recipients list.)
54
+
## Associate the SSL profile with a listener
62
55
63
-
3. Select **appGatewayBackendHttpSettings**.
56
+
Now that we've created an SSL profile with mutual authentication configured, we need to associate the SSL profile to the listener to complete the set up of mutual authentication.
64
57
65
-
4. Under **Protocol**, select **HTTPS**. A pane for **Backend authentication certificates or Trusted root certificates** appears.
58
+
1. Navigate to your existing Application Gateway. If you just completed the steps above, you don't need to do anything here.
66
59
67
-
5. Select **Create new**.
60
+
2. Select **Listeners** from the left-side menu.
68
61
69
-
6. In the**Name**field, enter a suitable name.
62
+
3. Click on**Add listener**if you don't already have an HTTPS listener set up. If you already have an HTTPS listener, click on it from the list.
70
63
71
-
7. Select the certificate file in the**Upload CER certificate** box.
64
+
4. Fill out the **Listener name**, **Frontend IP**,**Port**, **Protocol**, and other **HTTPS Settings** to fit your requirements.
72
65
73
-
For Standard and WAF (v1) application gateways, you should upload the public key of your back-end server certificate in .cer format.
66
+
5. Check the **Enable SSL Profile** checkbox so that you can select which SSL Profile to associate with the listener.
6. Select the SSL profile you just created from the dropdown list. In this example, we choose the SSL profile we created from the earlier steps: *applicationGatewaySSLProfile*.
76
69
77
-
For Standard_v2 and WAF_v2 application gateways, you should upload the root certificate of the back-end server certificate in .cer format. If the back-end certificate is issued by a well-known CA, you can select the **Use Well Known CA Certificate** check box, and then you don't have to upload a certificate.
70
+
7. Continue configuring the remainder of the listener to fit your requirements.
0 commit comments