Skip to content

Commit f3bd9fb

Browse files
duongauCopilot
andcommitted
Firewall | UUF | Clarify Key Vault secret vs certificate type for TLS inspection
Resolves UUF #275402 - Azure Firewall Premium certificates article was ambiguous about how certificates are accessed from Key Vault. Azure Firewall uses the Secrets interface exclusively. Added a NOTE callout clarifying Secret permissions are always required, not Certificate permissions. Co-authored-by: Copilot <[email protected]>
1 parent 5937091 commit f3bd9fb

1 file changed

Lines changed: 8 additions & 6 deletions

File tree

articles/firewall/premium-certificates.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: duongau
55
ms.service: azure-firewall
66
services: firewall
77
ms.topic: concept-article
8-
ms.date: 12/11/2022
8+
ms.date: 03/23/2026
99
ms.author: duau
1010
ms.custom: sfi-image-nochange
1111
# Customer intent: As a network engineer, I want to configure TLS inspection on Azure Firewall Premium using Intermediate CA certificates stored in Azure Key Vault, so that I can ensure secure traffic management and compliance with organizational standards.
@@ -66,10 +66,12 @@ Ensure your CA certificate complies with the following requirements:
6666

6767
To configure your key vault:
6868

69-
- You need to import an existing certificate with its key pair into your key vault.
70-
- Alternatively, you can also use a key vault secret that's stored as a password-less, base-64 encoded PFX file. A PFX file is a digital certificate containing both private key and public key.
71-
- It's recommended to use a CA certificate import because it allows you to configure an alert based on certificate expiration date.
72-
- After you import a certificate or a secret, you need to define access policies in the key vault to allow the identity to be granted get access to the certificate/secret.
69+
- Store your intermediate CA certificate as a **Key Vault secret** using a password-less, base-64 encoded PFX file. A PFX file is a digital certificate containing both a private key and public key. Azure Firewall accesses the certificate exclusively through the Key Vault **Secrets** interface.
70+
- Alternatively, you can import the certificate using the Key Vault **Certificates** feature. When you do this, Key Vault automatically creates a corresponding secret with the same name, which Azure Firewall uses to access the certificate. Using the Certificates feature is recommended because it lets you configure expiration alerts.
71+
- After you store the certificate, define access policies in the key vault to grant the managed identity **Get** and **List** permissions under **Secret Permissions**.
72+
73+
> [!NOTE]
74+
> Azure Firewall does not support accessing certificates stored solely as Key Vault Certificate objects without a corresponding secret. Regardless of how you import the certificate, the managed identity must have **Secret** permissions (not Certificate permissions) on the key vault.
7375
- The provided CA certificate needs to be trusted by your Azure workload. Ensure they are deployed correctly.
7476
- Since Azure Firewall Premium is listed as Key Vault [Trusted Service](/azure/key-vault/general/overview-vnet-service-endpoints#trusted-services), it allows you to bypass Key Vault internal Firewall and to eliminate any exposure of your Key Vault to the Internet.
7577

@@ -116,7 +118,7 @@ The scripts generate the following files:
116118
>
117119
After the certificates are created, deploy them to the following locations:
118120
- rootCA.crt - Deploy on endpoint machines (Public certificate only).
119-
- interCA.pfx - Import as certificate on a Key Vault and assign to firewall policy.
121+
- interCA.pfx - Store as a secret in Azure Key Vault and assign to firewall policy.
120122

121123
### **openssl.cnf**
122124
```

0 commit comments

Comments
 (0)