You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/azure/app-service/connection-issues-with-ssl-or-tls/use-azure-app-service-certificate-with-application-gateway.md
+31-2Lines changed: 31 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,12 +58,41 @@ You can use App Service Certificate in Azure Application Gateway, but not direct
58
58
59
59
1. **Store App Service Certificate in Key Vault**: Navigate to the App Service Certificate resource. Then, use the **Key Vault** blade to store the certificate in a key vault of your choice.
60
60
61
-
2. **Enable Managed Identity for Application Gateway**: Enable user-assigned or system-assigned managed identity.
61
+
2. **Enable Managed Identity for Application Gateway**: Enable user-assigned.
62
62
63
63
3. **Grant Access to key vault**: In the key vault, go to **Access Policies**, and add a policy for Application Gateway identity that has `get`, `list`,
64
64
and `secret management` permissions.
65
65
66
-
4. **Reference Certificate from Key Vault**: Go to **Application Gateway**\>**Listeners**\>**+ Add Listener**, select**HTTPS**, and thenselect**Key Vault certificate**.
66
+
4. Due to current limitations, it's necessary to assign user-assigned managed identity and SSL certificate to Application Gateway. This can be done using Azure PowerShell.
5. **Reference Certificate from Key Vault**: Go to **Application Gateway** \> **Listeners** \> **+ Add Listener**, select **HTTPS**, and then select **Certificate** which you added in the previous step.
67
96
68
97
> [!NOTE]
69
98
> Currently, Key Vault integration supports only certificates that have the private key in `.pfx` format.
0 commit comments