You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
docs: Freshness review for premium-deploy-certificates-enterprise-ca.md
- Updated ms.date to 12/31/2025
- Improved clarity and consistency throughout article
- Fixed numbered list formatting (all items use '1.')
- Simplified language (removed 'you should', changed 'navigate' to 'go')
- Improved readability in validation steps
Copy file name to clipboardExpand all lines: articles/firewall/premium-deploy-certificates-enterprise-ca.md
+22-22Lines changed: 22 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: duau
5
5
ms.service: azure-firewall
6
6
services: firewall
7
7
ms.topic: how-to
8
-
ms.date: 02/03/2022
8
+
ms.date: 12/31/2025
9
9
ms.author: duau
10
10
ms.custom: sfi-image-nochange
11
11
# Customer intent: "As a network administrator, I want to deploy and configure Enterprise CA certificates for Azure Firewall Premium, so that I can enable TLS inspection and ensure secure traffic management within my organization's network."
@@ -14,54 +14,54 @@ ms.custom: sfi-image-nochange
14
14
# Deploy and configure Enterprise CA certificates for Azure Firewall
15
15
16
16
17
-
Azure Firewall Premium includes a TLS inspection feature, which requires a certificate authentication chain. For production deployments, you should use an Enterprise PKI to generate the certificates that you use with Azure Firewall Premium. Use this article to create and manage an Intermediate CA certificate for Azure Firewall Premium.
17
+
Azure Firewall Premium includes a TLS inspection feature, which requires a certificate authentication chain. For production deployments, use an Enterprise PKI to generate the certificates that you use with Azure Firewall Premium. Use this article to create and manage an Intermediate CA certificate for Azure Firewall Premium.
18
18
19
19
For more information about certificates used by Azure Firewall Premium, see [Azure Firewall Premium certificates](premium-certificates.md).
20
20
21
21
## Prerequisites
22
22
23
23
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn) before you begin.
24
24
25
-
To use an Enterprise CA to generate a certificate to use with Azure Firewall Premium, you must have the following resources:
25
+
To use an Enterprise CA to generate a certificate to use with Azure Firewall Premium, you need the following resources:
26
26
27
27
- an Active Directory Forest
28
28
- an Active Directory Certification Services Root CA with Web Enrollment enabled
29
29
- an Azure Firewall Premium with Premium tier Firewall Policy
30
30
- an [Azure Key Vault](premium-certificates.md#azure-key-vault)
31
31
- a Managed Identity with Read permissions to **Certificates and Secrets** defined in the Key Vault Access Policy
32
32
33
-
## Create a new Subordinate Certificate Template
33
+
## Create a new subordinate certificate template
34
34
35
35
1. Run `certtmpl.msc` to open the Certificate Template Console.
36
-
2. Find the **Subordinate Certification Authority** template in the console.
37
-
3. Right-click on the **Subordinate Certification Authority** template and select **Duplicate Template**.
38
-
4. In the **Properties of New Template** window, go to the **Compatibility** tab and set the appropriate compatibility settings or leave them as default.
39
-
5. Go to the **General** tab, set the **Template Display Name** (for example: `My Subordinate CA`), and adjust the validity period if necessary. Optionally, select the **Publish certificate in Active Directory** checkbox.
40
-
6. In the **Settings** tab, ensure the required users and groups have read and `enroll` permissions.
41
-
7. Navigate to the **Extensions** tab, select **Key Usage**, and select **Edit**.
36
+
1. Find the **Subordinate Certification Authority** template in the console.
37
+
1. Right-click on the **Subordinate Certification Authority** template and select **Duplicate Template**.
38
+
1. In the **Properties of New Template** window, go to the **Compatibility** tab and set the appropriate compatibility settings or leave them as default.
39
+
1. Go to the **General** tab, set the **Template Display Name** (for example: `My Subordinate CA`), and adjust the validity period if necessary. Optionally, select the **Publish certificate in Active Directory** checkbox.
40
+
1. In the **Settings** tab, ensure the required users and groups have read and `enroll` permissions.
41
+
1. Navigate to the **Extensions** tab, select **Key Usage**, and select **Edit**.
42
42
- Ensure that the **Digital signature**, **Certificate signing**, and **CRL signing** checkboxes are selected.
43
43
- Select the **Make this extension critical** checkbox and select **OK**.
44
44
45
45
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/certificate-template-key-usage-extension.png" alt-text="Screenshot of certificate template key usage extensions.":::
46
-
8. Select **OK** to save the new certificate template.
47
-
9. Ensure the new template is enabled so it can be used to issue certificates.
46
+
1. Select **OK** to save the new certificate template.
47
+
1. Ensure the new template is enabled so it can be used to issue certificates.
48
48
49
49
## Request and export a certificate
50
50
51
-
1. Access the web enrollment site on the Root CA, usually `https://<servername>/certsrv` and select **Request a Certificate**.
51
+
1. Access the web enrollment site on the Root CA, usually `https://<servername>/certsrv`, and select **Request a Certificate**.
52
52
1. Select **Advanced Certificate Request**.
53
53
1. Select **Create and Submit a Request to this CA**.
54
54
1. Fill out the form using the Subordinate Certification Authority template created in the previous section.
55
55
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/advanced-certificate-request.png" alt-text="Screenshot of advanced certificate request":::
56
56
1. Submit the request and install the certificate.
57
-
1. Assuming this request is made from a Windows Server using Internet Explorer, open **Internet Options**.
57
+
1. Assuming you make this request from a Windows Server using Internet Explorer, open **Internet Options**.
58
58
1. Navigate to the **Content** tab and select **Certificates**.
59
59
60
-
1. Select the certificate that was just issued and then select **Export**.
60
+
1. Select the certificate that the CA issued and then select **Export**.
61
61
62
62
1. Select **Next** to begin the wizard. Select **Yes, export the private key**, and then select **Next**.
63
63
64
-
1. .pfx file format is selected by default. Uncheck **Include all certificates in the certification path if possible**. If you export the entire certificate chain, the import process to Azure Firewall will fail.
64
+
1.The wizard selects the .pfx file format by default. Uncheck **Include all certificates in the certification path if possible**. If you export the entire certificate chain, the import process to Azure Firewall fails.
65
65
66
66
1. Assign and confirm a password to protect the key, and then select **Next**.
67
67
@@ -71,23 +71,23 @@ To use an Enterprise CA to generate a certificate to use with Azure Firewall Pre
71
71
72
72
## Add the certificate to a Firewall Policy
73
73
74
-
1. In the Azure portal, navigate to the Certificates page of your Key Vault, and select **Generate/Import**.
74
+
1. In the Azure portal, go to the Certificates page of your Key Vault, and select **Generate/Import**.
75
75
76
-
1. Select **Import** as the method of creation, name the certificate, select the exported .pfx file, enter the password, and then select **Create**.
76
+
1. Select **Import** as the creation method. Enter a name for the certificate, select the exported .pfx file, enter the password, and then select **Create**.
77
77
78
-
1.Navigate to the **TLS Inspection** page of your Firewall policy and select your Managed identity, Key Vault, and certificate.
78
+
1.Go to the **TLS Inspection** page of your Firewall policy and select your Managed identity, Key Vault, and certificate.
79
79
80
80
1. Select **Save**.
81
81
82
82
## Validate TLS inspection
83
83
84
-
1. Create an Application Rule using TLS inspection to the destination URL or FQDN of your choice. For example: `*bing.com`.
84
+
1. Create an Application Rule that uses TLS inspection for the destination URL or FQDN of your choice. For example: `*bing.com`.
85
85
86
-
1. From a domain-joined machine within the Source range of the rule, navigate to your Destination and select the lock symbol next to the address bar in your browser. The certificate should show that it was issued by your Enterprise CA rather than a public CA.
86
+
1. From a domain-joined machine within the source range of the rule, go to your destination and select the lock symbol next to the address bar in your browser. The certificate should show that your Enterprise CA issued it rather than a public CA.
87
87
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/browser-certificate.png" alt-text="Screenshot showing the browser certificate":::
88
88
1. Show the certificate to display more details, including the certificate path.
0 commit comments