You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-configure-listener-specific-ssl-policy.md
+9-9Lines changed: 9 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Configure listener-specific SSL policies on Azure Application Gateway through Portal
3
-
description: Learn how to configure listener-specific SSL policies on Application Gateway through Portal
2
+
title: Configure listener-specific SSL policies on Azure Application Gateway through portal
3
+
description: Learn how to configure listener-specific SSL policies on Application Gateway through portal
4
4
services: application-gateway
5
5
author: mscatyao
6
6
ms.service: application-gateway
@@ -9,7 +9,7 @@ ms.date: 03/30/2021
9
9
ms.author: caya
10
10
---
11
11
12
-
# Configure listener-specific SSL policies on Application Gateway through Portal (Preview)
12
+
# Configure listener-specific SSL policies on Application Gateway through portal (Preview)
13
13
14
14
This article describes how to use the Azure portal to configure listener-specific SSL policies on your Application Gateway. Listener-specific SSL policies allow you to configure specific listeners to use different SSL policies from each other. You'll still be able to set a default SSL policy that all listeners will use unless overwritten by the listener-specific SSL policy.
15
15
@@ -24,7 +24,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
24
24
25
25
First create a new Application Gateway as you would usually through the portal - there are no additional steps needed in the creation to configure listener-specific SSL policies. For more information on how to create an Application Gateway in portal, check out our [portal quickstart tutorial](./quick-create-portal.md).
26
26
27
-
## Set up a listener-specific SSL policy on an existing Application Gateway
27
+
## Set up a listener-specific SSL policy
28
28
29
29
To set up a listener-specific SSL policy, you'll need to first go to the **SSL settings (Preview)** tab in the Portal and create a new SSL profile. When you create an SSL profile, you'll see two tabs: **Client Authentication** and **SSL Policy**. The **SSL Policy** tab is to configure a listener-specific SSL policy. The **Client Authentication** tab is where to upload a client certificate(s) for mutual authentication - for more information, check out [Configuring a mutual authentication](./mutual-authentication-portal.md).
30
30
@@ -45,11 +45,11 @@ To set up a listener-specific SSL policy, you'll need to first go to the **SSL s
45
45
46
46
7. Select **Add** to save.
47
47
48
-
> [!NOTE]
49
-
> You don't have to configure client authentication on an SSL profile to associate it to a listener. You can have only client authentication configure, or only listener specific SSL policy configured, or both configured in your SSL profile.
50
-
51
-

48
+
> [!NOTE]
49
+
> You don't have to configure client authentication on an SSL profile to associate it to a listener. You can have only client authentication configure, or only listener specific SSL policy configured, or both configured in your SSL profile.
52
50
51
+

52
+
53
53
## Associate the SSL profile with a listener
54
54
55
55
Now that we've created an SSL profile with a listener-specific SSL policy, we need to associate the SSL profile to the listener to put the listener-specific policy in action.
@@ -70,7 +70,7 @@ Now that we've created an SSL profile with a listener-specific SSL policy, we ne
70
70
71
71
8. Click **Add** to save your new listener with the SSL profile associated to it.
72
72
73
-

73
+

Copy file name to clipboardExpand all lines: articles/application-gateway/mutual-authentication-certificate-management.md
+33-20Lines changed: 33 additions & 20 deletions
Original file line number
Diff line number
Diff line change
@@ -27,73 +27,85 @@ The following steps help you export the .pem or .cer file for your certificate:
27
27
28
28
1. To obtain a .cer file from the certificate, open **Manage user certificates**. Locate the certificate, typically in 'Certificates - Current User\Personal\Certificates', and right-click. Click **All Tasks**, and then click **Export**. This opens the **Certificate Export Wizard**. If you can't find the certificate under Current User\Personal\Certificates, you may have accidentally opened "Certificates - Local Computer", rather than "Certificates - Current User"). If you want to open Certificate Manager in current user scope using PowerShell, you type *certmgr* in the console window.
29
29
30
-

30
+
> [!div class="mx-imgBorder"]
31
+
> 
5. For **File to Export**, **Browse** to the location to which you want to export the certificate. For **File name**, name the certificate file. Then, click **Next**.
45
46
46
-

47
+
> [!div class="mx-imgBorder"]
48
+
> 
47
49
48
50
6. Click **Finish** to export the certificate.
49
51
50
-

52
+
> [!div class="mx-imgBorder"]
53
+
> 
51
54
52
55
7. Your certificate is successfully exported.
53
56
54
-

57
+
> [!div class="mx-imgBorder"]
58
+
> 
55
59
56
60
The exported certificate looks similar to this:
57
61
58
-

62
+
> [!div class="mx-imgBorder"]
63
+
> 
59
64
60
65
### Export CA certificate(s) from the public certificate
61
66
62
67
Now that you've exported your public certificate, you will now export the CA certificate(s) from your public certificate. If you only have a root CA, you'll only need to export that certificate. However, if you have 1+ intermediate CAs, you'll need to export each of those as well.
63
68
64
69
1. Once the public key has been exported, open the file.
1. At this point, you've extracted the details of the root CA certificate from the public certificate. You'll see the **Certificate Export Wizard**. Follow steps 2-7 from the previous section ([Export public certificate](./mutual-authentication-certificate-management.md#export-public-certificate)) to complete the Certificate Export Wizard.
87
98
88
99
1. Now repeat steps 2-6 from this current section ([Export CA certificate(s) from the public certificate](./mutual-authentication-certificate-management.md#export-ca-certificates-from-the-public-certificate)) for all intermediate CAs to export all intermediate CA certificates in the Base-64 encoded X.509(.CER) format.
Copy file name to clipboardExpand all lines: articles/application-gateway/mutual-authentication-portal.md
+8-7Lines changed: 8 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Configure mutual authentication on Azure Application Gateway through Portal
3
-
description: Learn how to configure an Application Gateway to have mutual authentication through Portal
2
+
title: Configure mutual authentication on Azure Application Gateway through portal
3
+
description: Learn how to configure an Application Gateway to have mutual authentication through portal
4
4
services: application-gateway
5
5
author: mscatyao
6
6
ms.service: application-gateway
@@ -9,7 +9,7 @@ ms.date: 03/30/2021
9
9
ms.author: caya
10
10
---
11
11
12
-
# Configure mutual authentication with Application Gateway through Portal (Preview)
12
+
# Configure mutual authentication with Application Gateway through portal (Preview)
13
13
14
14
This article describes how to use the Azure portal to configure mutual authentication on your Application Gateway. Mutual authentication means Application Gateway authenticates the client sending the request using the client certificate you upload onto the Application Gateway.
15
15
@@ -25,7 +25,7 @@ To learn more, especially about what kind of client certificates you can upload,
25
25
26
26
First create a new Application Gateway as you would usually through the portal - there are no additional steps needed in the creation to enable mutual authentication. For more information on how to create an Application Gateway in portal, check out our [portal quickstart tutorial](./quick-create-portal.md).
27
27
28
-
## Configure mutual authentication on an existing Application Gateway
28
+
## Configure mutual authentication
29
29
30
30
To configure an existing Application Gateway with mutual authentication, you'll need to first go to the **SSL settings (Preview)** tab in the Portal and create a new SSL profile. When you create an SSL profile, you'll see two tabs: **Client Authentication** and **SSL Policy**. The **Client Authentication** tab is where you'll upload your client certificate(s). The **SSL Policy** tab is to configure a listener specific SSL policy - for more information, check out [Configuring a listener specific SSL policy](./application-gateway-configure-listener-specific-ssl-policy.md).
31
31
@@ -52,8 +52,8 @@ To configure an existing Application Gateway with mutual authentication, you'll
52
52
7. Consider adding a listener specific policy. See instructions at [setting up listener specific SSL policies](./application-gateway-configure-listener-specific-ssl-policy.md).
53
53
54
54
8. Select **Add** to save.
55
-
56
-

55
+
> [!div class="mx-imgBorder"]
56
+
> 
57
57
58
58
## Associate the SSL profile with a listener
59
59
@@ -75,7 +75,8 @@ Now that we've created an SSL profile with mutual authentication configured, we
75
75
76
76
8. Click **Add** to save your new listener with the SSL profile associated to it.
77
77
78
-

78
+
> [!div class="mx-imgBorder"]
79
+
> 
0 commit comments