Skip to content

Commit 24c31ea

Browse files
Merge pull request #221092 from greg-lindsay/fwlog
add line
2 parents 177b938 + 5ced56e commit 24c31ea

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

articles/firewall/premium-certificates.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: vhorne
55
ms.service: firewall
66
services: firewall
77
ms.topic: conceptual
8-
ms.date: 12/05/2022
8+
ms.date: 12/11/2022
99
ms.author: victorh
1010
---
1111

@@ -68,6 +68,7 @@ To configure your key vault:
6868
- It's recommended to use a CA certificate import because it allows you to configure an alert based on certificate expiration date.
6969
- After you've imported a certificate or a secret, you need to define access policies in the key vault to allow the identity to be granted get access to the certificate/secret.
7070
- The provided CA certificate needs to be trusted by your Azure workload. Ensure they are deployed correctly.
71+
- Since Azure Firewall Premium is listed as Key Vault [Trusted Service](../key-vault/general/overview-vnet-service-endpoints.md#trusted-services), it allows you to bypass Key Vault internal Firewall and to eliminate any exposure of your Key Vault to the Internet.
7172

7273
You can either create or reuse an existing user-assigned managed identity, which Azure Firewall uses to retrieve certificates from Key Vault on your behalf. For more information, see [What is managed identities for Azure resources?](../active-directory/managed-identities-azure-resources/overview.md)
7374

0 commit comments

Comments
 (0)