You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/vpn-gateway/site-to-site-certificate-authentication-gateway-portal.md
+8-17Lines changed: 8 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,30 +5,30 @@ description: Learn how to configure VPN Gateway server settings for site-to-site
5
5
author: cherylmc
6
6
ms.service: azure-vpn-gateway
7
7
ms.topic: how-to
8
-
ms.date: 03/18/2026
8
+
ms.date: 03/25/2026
9
9
ms.author: cherylmc
10
10
11
-
#customer intent: As a network engineer, I want to create a site-to-site VPN connection between my on-premises location and my Azure virtual network using certificate authentication and Azure Key Vault.
12
-
13
11
# Customer intent: "As a network engineer, I want to establish a secure site-to-site VPN connection using certificate authentication, so that I can securely connect my on-premises network to my Azure virtual network."
In this article, you use the Azure portal to create a site-to-site (S2S) certificate authentication VPN gateway connection between your on-premises network and your virtual network. The steps for this configuration use Managed Identity, Azure Key Vault, and certificates. For more information about site-to-site certificate authentication, see [About site-to-site VPN connections with certificate authentication](site-to-site-certificate-authentication-gateway-about.md). If you need to create a site-to-site VPN connection that uses a shared key instead, see [Create a S2S VPN connection](tutorial-site-to-site-portal.md).
> Site-to-site certificate authentication is currently in Preview.
23
23
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
24
24
25
25
## Prerequisites
26
26
27
-
> [!IMPORTANT]
28
-
> Site-to-site certificate authentication isn't supported on Basic SKU VPN gateways. We recommend using VpnGw1AZ or higher.
29
-
30
27
* You already have a virtual network and a VPN gateway. If you don't, follow the steps to [Create a VPN gateway](tutorial-create-gateway-portal.md), then return to this page to configure your site-to-site certificate authentication connection.
* Make sure you have a compatible VPN device and someone who can configure it. For more information about compatible VPN devices and device configuration, see [About VPN devices](vpn-gateway-about-vpn-devices.md).
33
33
34
34
* Verify that you have an externally facing public IPv4 address for your VPN device.
@@ -253,20 +253,11 @@ The following steps help you upload the outbound certificate information to Azur
253
253
1. On the **Members** tab, for **Assign access to**, select **Managed identity**.
254
254
1. Select **+ Select members**. In **Select managed identities**, set **Managed identity** to **User-assigned managed identity**, then choose the user-assigned managed identity you created earlier.
255
255
1. Select **Next**, review the settings, then select **Review + assign** to apply the role assignment.
256
-
1. Repeat the steps above to assign the **Key Vault Certificate User** role to the same user-assigned managed identity. This is required; otherwise, the managed identity won't be able to access the outbound certificate stored in Key Vault.
256
+
1. Repeat the previous steps to assign the **Key Vault Certificate User** role to the same user-assigned managed identity. This is required; otherwise, the managed identity can't access the outbound certificate stored in Key Vault.
257
257
258
258
> [!NOTE]
259
259
> RBAC role assignment changes aren't applied immediately to Key Vault. Before proceeding to the next step, verify under **Role assignments** that both built-in roles **Key Vault Secrets User** and **Key Vault Certificate User** are present.
260
260
261
-
## Add the Managed Identity to your key vault
262
-
263
-
1. Go to your key vault. In the left pane, open the **Access policies** page.
264
-
1. Select **+Create**.
265
-
1. On the **Create an access policy** page, for **Secret Management Options** and **Certificate Management Operations**, select **Select all**.
266
-
1. Select **Next** to move to the **Principal** page.
267
-
1. On the **Principal** page, search and select the Managed Identity that you created earlier.
268
-
1. Select **Next** and advance to the **Review + create** page. Select **Create**.
269
-
270
261
## <aname="VPNDevice"></a>Configure your VPN device
271
262
272
263
Site-to-site connections to an on-premises network require a VPN device. In this step, configure your VPN device. When you configure your VPN device, you need the following values:
0 commit comments