Skip to content

Commit 36d64c3

Browse files
authored
Merge pull request #53909 from edburns/edburns-MSFT-appGatewayKeyVault
On branch edburns-MSFT-appGatewayKeyVault Update the PR with new learning
2 parents d9cd51c + 75c4e7f commit 36d64c3

File tree

1 file changed

+15
-1
lines changed

1 file changed

+15
-1
lines changed

articles/application-gateway/key-vault-certs.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,21 @@ Application Gateway integration with Key Vault requires a three-step configurati
4545
You then either import an existing certificate or create a new one in your key vault. The certificate will be used by applications that run through the application gateway. In this step, you can also use a key vault secret that's stored as a password-less, base-64 encoded PFX file. We recommend using a certificate type because of the autorenewal capability that's available with certificate type objects in the key vault. After you've created a certificate or a secret, you define access policies in the key vault to allow the identity to be granted *get* access to the secret.
4646

4747
> [!NOTE]
48-
> If you deploy the application gateway via an ARM template, either by using the Azure CLI or PowerShell, or via an Azure Application deployed from the Azure portal, the SSL certificate that's stored in the key vault as a base-64-encoded PFX file **must be passwordless**. Also, you must complete the steps in [Use Azure Key Vault to pass secure parameter value during deployment](../azure-resource-manager/templates/key-vault-parameter.md). It's particularly important to set `enabledForTemplateDeployment` to `true`.
48+
> If you deploy the application gateway via an ARM template, either by using the Azure CLI or PowerShell, or via an Azure application deployed from the Azure portal, the SSL certificate is stored in the key vault as a base64-encoded PFX file. You must complete the steps in [Use Azure Key Vault to pass secure parameter value during deployment](../azure-resource-manager/templates/key-vault-parameter.md).
49+
>
50+
> It's particularly important to set `enabledForTemplateDeployment` to `true`. The certificate may be passwordless or it may have a password. In the case of a certificate with a password, the following example shows a possible configuration for the `sslCertificates` entry in the `properties` for the ARM template configuration for an app gateway. The values of `appGatewaySSLCertificateData` and `appGatewaySSLCertificatePassword` are looked up from the key vault as described in the section [Reference secrets with dynamic ID](../azure-resource-manager/templates/key-vault-parameter.md#reference-secrets-with-dynamic-id). Follow the references backward from `parameters('secretName')` to see how the lookup happens. If the certificate is passwordless, omit the `password` entry.
51+
>
52+
> ```
53+
> "sslCertificates": [
54+
> {
55+
> "name": "appGwSslCertificate",
56+
> "properties": {
57+
> "data": "[parameters('appGatewaySSLCertificateData')]",
58+
> "password": "[parameters('appGatewaySSLCertificatePassword')]"
59+
> }
60+
> }
61+
> ]
62+
> ```
4963
5064
1. **Configure the application gateway**
5165

0 commit comments

Comments
 (0)