Skip to content

Commit 66f4fda

Browse files
committed
Add new diagram and updates
1 parent a2a3455 commit 66f4fda

2 files changed

Lines changed: 8 additions & 17 deletions

File tree

158 KB
Loading

articles/vpn-gateway/site-to-site-certificate-authentication-gateway-portal.md

Lines changed: 8 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -5,30 +5,30 @@ description: Learn how to configure VPN Gateway server settings for site-to-site
55
author: cherylmc
66
ms.service: azure-vpn-gateway
77
ms.topic: how-to
8-
ms.date: 03/18/2026
8+
ms.date: 03/25/2026
99
ms.author: cherylmc
1010

11-
#customer intent: As a network engineer, I want to create a site-to-site VPN connection between my on-premises location and my Azure virtual network using certificate authentication and Azure Key Vault.
12-
1311
# Customer intent: "As a network engineer, I want to establish a secure site-to-site VPN connection using certificate authentication, so that I can securely connect my on-premises network to my Azure virtual network."
1412
---
1513
# Configure a S2S VPN Gateway certificate authentication connection - Azure portal - Preview
1614

1715
In this article, you use the Azure portal to create a site-to-site (S2S) certificate authentication VPN gateway connection between your on-premises network and your virtual network. The steps for this configuration use Managed Identity, Azure Key Vault, and certificates. For more information about site-to-site certificate authentication, see [About site-to-site VPN connections with certificate authentication](site-to-site-certificate-authentication-gateway-about.md). If you need to create a site-to-site VPN connection that uses a shared key instead, see [Create a S2S VPN connection](tutorial-site-to-site-portal.md).
1816

19-
:::image type="content" source="./media/tutorial-site-to-site-portal/diagram.png" alt-text="Diagram that shows site-to-site VPN gateway cross-premises connections." lightbox="./media/tutorial-site-to-site-portal/diagram.png":::
17+
**Site-to-site VPN connection with certificate authentication**
18+
19+
:::image type="content" source="./media/site-to-site-certificate-authentication-gateway-portal/diagram.png" alt-text="Diagram that shows site-to-site VPN gateway cross-premises connections." lightbox="./media/site-to-site-certificate-authentication-gateway-portal/diagram.png":::
2020

2121
> [!IMPORTANT]
2222
> Site-to-site certificate authentication is currently in Preview.
2323
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
2424
2525
## Prerequisites
2626

27-
> [!IMPORTANT]
28-
> Site-to-site certificate authentication isn't supported on Basic SKU VPN gateways. We recommend using VpnGw1AZ or higher.
29-
3027
* You already have a virtual network and a VPN gateway. If you don't, follow the steps to [Create a VPN gateway](tutorial-create-gateway-portal.md), then return to this page to configure your site-to-site certificate authentication connection.
3128

29+
> [!NOTE]
30+
> Site-to-site certificate authentication isn't supported on Basic SKU VPN gateways.
31+
3232
* Make sure you have a compatible VPN device and someone who can configure it. For more information about compatible VPN devices and device configuration, see [About VPN devices](vpn-gateway-about-vpn-devices.md).
3333

3434
* Verify that you have an externally facing public IPv4 address for your VPN device.
@@ -253,20 +253,11 @@ The following steps help you upload the outbound certificate information to Azur
253253
1. On the **Members** tab, for **Assign access to**, select **Managed identity**.
254254
1. Select **+ Select members**. In **Select managed identities**, set **Managed identity** to **User-assigned managed identity**, then choose the user-assigned managed identity you created earlier.
255255
1. Select **Next**, review the settings, then select **Review + assign** to apply the role assignment.
256-
1. Repeat the steps above to assign the **Key Vault Certificate User** role to the same user-assigned managed identity. This is required; otherwise, the managed identity won't be able to access the outbound certificate stored in Key Vault.
256+
1. Repeat the previous steps to assign the **Key Vault Certificate User** role to the same user-assigned managed identity. This is required; otherwise, the managed identity can't access the outbound certificate stored in Key Vault.
257257

258258
> [!NOTE]
259259
> RBAC role assignment changes aren't applied immediately to Key Vault. Before proceeding to the next step, verify under **Role assignments** that both built-in roles **Key Vault Secrets User** and **Key Vault Certificate User** are present.
260260
261-
## Add the Managed Identity to your key vault
262-
263-
1. Go to your key vault. In the left pane, open the **Access policies** page.
264-
1. Select **+Create**.
265-
1. On the **Create an access policy** page, for **Secret Management Options** and **Certificate Management Operations**, select **Select all**.
266-
1. Select **Next** to move to the **Principal** page.
267-
1. On the **Principal** page, search and select the Managed Identity that you created earlier.
268-
1. Select **Next** and advance to the **Review + create** page. Select **Create**.
269-
270261
## <a name="VPNDevice"></a>Configure your VPN device
271262

272263
Site-to-site connections to an on-premises network require a VPN device. In this step, configure your VPN device. When you configure your VPN device, you need the following values:

0 commit comments

Comments
 (0)