Skip to content

Commit 01bb455

Browse files
authored
Merge pull request #300577 from Harikrishnan-M-B/tocedit
MI edits + TOC change
2 parents 6bf67bd + 3b860ae commit 01bb455

File tree

3 files changed

+42
-52
lines changed

3 files changed

+42
-52
lines changed

articles/frontdoor/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -127,6 +127,8 @@
127127
href: how-to-enable-private-link-application-gateway.md
128128
- name: Connect to Azure API Management
129129
href: standard-premium/how-to-enable-private-link-apim.md
130+
- name: Connect to Azure Container App
131+
href: ../container-apps/how-to-integrate-with-azure-front-door.md
130132
- name: Caching
131133
items:
132134
- name: Caching with Azure Front Door
22.4 KB
Loading

articles/frontdoor/origin-authentication-with-managed-identities.md

Lines changed: 40 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -13,35 +13,35 @@ ms.date: 05/12/2025
1313

1414
**Applies to:** :heavy_check_mark: Front Door Standard :heavy_check_mark: Front Door Premium
1515

16-
Managed identities provided by Microsoft Entra ID enable your Azure Front Door Standard/Premium instance to securely access other Microsoft Entra protected resources, such as Azure Blob Storage, without the need to manage credentials. For more information, see [What are managed identities for Azure resources?](../active-directory/managed-identities-azure-resources/overview.md)
16+
Managed identities provided by Microsoft Entra ID enables your Azure Front Door Standard/Premium instance to securely access other Microsoft Entra protected resources, such as Azure Blob Storage, without the need to manage credentials. For more information, see [What are managed identities for Azure resources?](../active-directory/managed-identities-azure-resources/overview.md).
1717

18-
After you enable managed identity for Azure Front Door and granting the managed identity necessary permissions to your origin, Front Door will use the managed identity to obtain an access token from Microsoft Entra ID for accessing the specified resource. After successfully obtaining the token, the policy will set the value of the token in the Authorization header using the Bearer scheme. Front Door caches the token until it expires.
18+
After you enable managed identity for Azure Front Door and granting the managed identity necessary permissions to your origin, Front Door will use the managed identity to obtain an access token from Microsoft Entra ID for accessing the specified resource. After successfully obtaining the token, Front Door will set the value of the token in the Authorization header using the Bearer scheme and then forward the request to the origin. Front Door caches the token until it expires.
1919

2020
> [!Note]
2121
> This feature is currently not supported for origins with Private Link enabled in Front Door.
2222
2323
Azure Front Door supports two types of managed identities:
2424

25-
- **System-assigned identity**: This identity is tied to your service and is deleted if the service is deleted. Each service can have only one system-assigned identity.
26-
- **User-assigned identity**: This identity is a standalone Azure resource that can be assigned to your service. Each service can have multiple user-assigned identities.
25+
* **System-assigned identity**: This identity is tied to your service and is deleted if the service is deleted. Each service can have only one system-assigned identity.
26+
* **User-assigned identity**: This is a standalone Azure resource that can be assigned to your service. Each service can have multiple user-assigned identities.
2727

2828
Managed identities are specific to the Microsoft Entra tenant where your Azure subscription is hosted. If a subscription is moved to a different directory, you need to recreate and reconfigure the identity.
2929

3030
## Prerequisites
3131

32-
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
32+
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3333

34-
- An Azure Front Door Standard or Premium profile. To create a new profile, see [create an Azure Front Door](create-front-door-portal.md).
34+
* An Azure Front Door Standard or Premium profile. To create a new profile, see [create an Azure Front Door](create-front-door-portal.md).
3535

3636
## Enable managed identity
3737

3838
1. Navigate to your existing Azure Front Door profile. Select **Identity** under *Security* in the left menu.
3939

4040
1. Choose either a **System assigned** or **User assigned** managed identity.
4141

42-
- **[System assigned](#system-assigned)** - A managed identity tied to the Azure Front Door profile lifecycle.
42+
* **[System assigned](#system-assigned)** - A managed identity tied to the Azure Front Door profile lifecycle.
4343

44-
- **[User assigned](#user-assigned)** - A standalone managed identity resource with its own lifecycle.
44+
* **[User assigned](#user-assigned)** - A standalone managed identity resource with its own lifecycle.
4545

4646
### System assigned
4747

@@ -51,10 +51,6 @@ Managed identities are specific to the Microsoft Entra tenant where your Azure s
5151

5252
1. Confirm the creation of a system managed identity for your Front Door profile by selecting **Yes** when prompted.
5353

54-
1. Once created and registered with Microsoft Entra ID, use the **Object (principal) ID** to grant Azure Front Door access to your origin.
55-
56-
:::image type="content" source="./media/managed-identity/system-assigned-created.png" alt-text="Screenshot of the system assigned managed identity registered with Microsoft Entra ID.":::
57-
5854
### User assigned
5955

6056
To use a user-assigned managed identity, you must have one already created. For instructions on creating a new identity, see [create a user-assigned managed identity](../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md).
@@ -67,53 +63,45 @@ Managed identities are specific to the Microsoft Entra tenant where your Azure s
6763

6864
:::image type="content" source="./media/managed-identity/user-assigned-configured.png" alt-text="Screenshot of the user-assigned managed identity added to the Front Door profile.":::
6965

70-
## Associate the identity to an origin group
66+
## Associating the identity to an origin group
7167

7268
> [!Note]
73-
> The association will not work if the origin group contains any origins with private link enabled and/or the forwarding/accepted/health probe protocol is set to HTTP.
74-
75-
1. Go to your existing Azure Front Door profile and open origin groups.
76-
77-
1. Select an existing origin group which has origins already configured.
78-
79-
1. Under the **Authentication** section, enable **Origin authentication**.
80-
81-
1. Select **System assigned managed identity** or **User assigned managed identity**.
82-
83-
1. Enter the correct [scope](/entra/identity-platform/scopes-oidc) in the **Scope** box.
69+
> The association will only work if
70+
> * the origin group does not contain any origins with private link enabled.
71+
> * the health probe protocol is set to 'HTTPS' under origin group settings.
72+
> * the forwarding protocol is set to 'HTTPS Only' under route settings.
73+
> * the forwarding protocol is set to 'HTTPS Only' in case you are using a 'Route configuration override' action in rulesets.
74+
75+
1. Navigate to your existing Azure Front Door profile and open origin groups.
76+
2. Select an existing origin group which has origins already configured.
77+
3. Scroll down to the **Authentication** section.
78+
4. Enable **Origin authentication**.
79+
5. Choose between system assigned or user assigned managed identity.
80+
6. Enter the correct [scope](/entra/identity-platform/scopes-oidc) within the **Scope** field.
81+
7. Click on **Update**.
8482

8583
:::image type="content" source="./media/managed-identity/origin-auth.png" alt-text="Screenshot of associating the identity to an origin group.":::
8684

87-
1. Select **Update**.
88-
89-
## Provide access at the origin resource
90-
91-
1. Go to the management page of your origin resource. For example, if the origin is an Azure Blob Storage, go to that Storage Account management page.
92-
93-
> [!NOTE]
94-
> The next steps assume your origin is an Azure Blob Storage. If you're using a different resource type, make sure to select the appropriate **job function role** during role assignment. Otherwise, the steps remain the same for all resource types.
85+
## Providing access at the origin resource
86+
1. Navigate to the management page of your origin resource. For example, if the origin is an Azure Blob Storage, go to that Storage Account management page.
9587

96-
1. Go to the **Access Control (IAM)** section and select **Add**. Choose **Add role assignment** from the dropdown menu.
88+
> [!Note]
89+
> The next steps assume your origin is an Azure Blob Storage. If you're using a different resource type, make sure to select the appropriate **job function role** during role assignment. Otherwise, the steps remain the same for most resource types.
9790
91+
2. Go to the **Access Control (IAM)** section and click on **Add**. Choose **Add role assignment** from the dropdown menu.
9892
:::image type="content" source="./media/managed-identity/add-role-assignment-menu.png" alt-text="Screenshot of access control settings.":::
99-
100-
1. Under **Job function roles** in the **Roles** tab, select an appropriate role (for example, Storage Blob Data Reader or Storage Blob Data Contributor) from the list and then select **Next**.
101-
93+
3. Under **Job function roles** in the **Roles** tab, select an appropriate role (for example, Storage Blob Data Reader) from the list and then select **Next**.
10294
:::image type="content" source="./media/managed-identity/storage-job-function-roles.png" alt-text="Screenshot of Roles tab under Add role assignment.":::
103-
104-
1. In the **Members** tab, under the **Assign access to**, select **Managed identity** and then select **+ Select members**.
105-
95+
4. In the **Members** tab, under the **Assign access to**, choose **Managed identity** and then click on **Select members**.
10696
:::image type="content" source="./media/managed-identity/members.png" alt-text="Screenshot of Members tab under Add role assignment.":::
107-
108-
1. The **Select managed identities** window opens. Choose the subscription where your Front Door is located and under **Managed identity** dropdown, choose **Front Door and CDN profiles**. Under the **Select** dropdown, choose the managed identity created for your Front Door. Select the **Select** button in the bottom.
109-
110-
1. Select **Review and assign** and then select **Review and assign** once more after the validation is complete.
111-
112-
## Common troubleshooting tips
113-
114-
- Error during origin group configuration.
115-
- Ensure that health probe protocol is set to HTTPS.
116-
- Ensure that forwarding protocol and accepted protocols within route settings are HTTPS.
117-
- Ensure that there are no private link enabled origins within the origin group.
118-
- Access Denied: Verify that the Managed Identity has the appropriate role assigned to access the origin resource.
119-
- Transition from SAS Tokens for Storage: If transitioning from SAS tokens to Managed Identities, follow a step-wise approach to avoid downtime. Enable Managed Identity, associate it with the origin, and then stop using SAS tokens.
97+
5. The **Select managed identities** window opens. Choose the subscription where your Front Door is located and under **Managed identity** dropdown, choose **Front Door and CDN profiles**. Under the **Select** dropdown, choose the managed identity created for your Front Door. Click on the **Select** button in the bottom.
98+
6. Select **Review and assign** and then select **Review and assign** once more after the validation is complete.
99+
100+
## Tips while using origin authentication
101+
* If you are facing errors during origin group configuration,
102+
* Ensure that the health probe protocol is set to HTTPS.
103+
* Ensure that forwarding protocol within route settings and/or route configuration override settings (in rulesets) is set to 'HTTPS Only'.
104+
* Ensure that there are no private link enabled origins within the origin group.
105+
* If you see 'Access Denied; responses from origin, verify that the Managed Identity has the appropriate role assigned to access the origin resource.
106+
* Transition from SAS Tokens for Storage: If transitioning from SAS tokens to Managed Identities, follow a step-wise approach to avoid downtime. Enable Managed Identity, associate it with the origin, and then stop using SAS tokens.
107+
* After you enable origin authentication in origin group settings, you should not directly disable/delete the identities from the Identity settings under Front Door portal, nor directly delete the user-assigned managed identity under the Managed Identity portal. Doing so will cause origin authentication to fail immediately. Instead, if you want to stop using the origin authentication feature or want to delete/disable the identities, first disable the access restrictions under the Access Control (IAM) section of the origin resource so that the origin is accessible without the need of a managed identity or Entra ID token. Then disable origin authentication under Front Door origin group settings. Wait for some time for the configuration to be updated and then delete/disable the identity if required.

0 commit comments

Comments
 (0)