You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cdn/cdn-custom-ssl.md
+2-63Lines changed: 2 additions & 63 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -110,70 +110,9 @@ You can use your own certificate to enable the HTTPS feature. This process is do
110
110
> - Azure Content Delivery Network only supports PFX certificates.
111
111
> - The certificate must have a complete certificate chain with leaf and intermediate certificates, and root CA must be part of the [Microsoft Trusted CA List](https://ccadb-public.secure.force.com/microsoft/IncludedCACertificateReportForMSFT).
112
112
113
-
### Register Azure CDN
113
+
### Set up managed identity for Azure CDN
114
114
115
-
Register Azure CDN as an app in your Microsoft Entra ID.
116
-
117
-
> [!NOTE]
118
-
> -`205478c0-bd83-4e1b-a9d6-db63a3e1e1c8` is the service principal for `Microsoft.AzureFrontDoor-Cdn`.
119
-
> - You need to have the **Global Administrator** role to run this command.
120
-
> - The service principal name was changed from `Microsoft.Azure.Cdn` to `Microsoft.AzureFrontDoor-Cdn`.
121
-
122
-
#### Azure PowerShell
123
-
124
-
1. If needed, install [Azure PowerShell](/powershell/azure/install-azure-powershell) on your local machine.
ObjectType : ServicePrincipal DisplayName : Microsoft.AzureFrontDoor-Cdn Id : abcdef12-3456-7890-abcd-ef1234567890
138
-
Type :
139
-
```
140
-
141
-
<a name='azure-cli'></a>
142
-
143
-
#### The Azure CLI
144
-
145
-
1. If needed, install the [Azure CLI](/cli/azure/install-azure-cli) on your local machine.
146
-
147
-
1. Use the Azure CLI to run the following command:
148
-
149
-
```azurecli-interactive
150
-
az ad sp create --id 205478c0-bd83-4e1b-a9d6-db63a3e1e1c8
151
-
```
152
-
153
-
### Grant Azure CDN access to your key vault
154
-
155
-
Grant Azure CDN permission to access the certificates (secrets) in your Azure Key Vault account.
156
-
157
-
1. In your key vault in the **Settings** section, select **Access policies**. In the right pane, select **+ Add Access Policy**:
158
-
159
-
:::image type="content" source="./media/cdn-custom-ssl/cdn-new-access-policy.png" alt-text="Screenshot of create a Key Vault access policy for Azure Content Delivery Network." border="true":::
160
-
161
-
2. In the **Add access policy** page, select **None selected** next to **Select principal**. In the **Principal** page, enter **205478c0-bd83-4e1b-a9d6-db63a3e1e1c8**. Select **Microsoft.AzureFrontdoor-Cdn**. Choose **Select**:
162
-
163
-
3. In **Select principal**, search for **205478c0-bd83-4e1b-a9d6-db63a3e1e1c8**, choose **Microsoft.AzureFrontDoor-Cdn**. Choose **Select**.
164
-
165
-
:::image type="content" source="./media/cdn-custom-ssl/cdn-access-policy-settings.png" alt-text="Select service principal of Azure CDN" border="true":::
166
-
167
-
4. Select **Certificate permissions**. Select the checkbox for **Get** to allow CDN permissions to get the certificates.
168
-
169
-
5. Select **Secret permissions**. Select the checkbox for **Get** to allow CDN permissions to get the secrets:
170
-
171
-
:::image type="content" source="./media/cdn-custom-ssl/cdn-vault-permissions.png" alt-text="Screenshot of select permissions for Azure Content Delivery Network to Key Vault." border="true":::
172
-
173
-
6. Select **Add**.
174
-
175
-
> [!NOTE]
176
-
> Azure CDN can now access this key vault and the certificates (secrets) that are stored in this key vault. Any CDN instance created in this subscription will have access to the certificates in this key vault.
115
+
Follow the steps in [Configure managed identity for Azure CDN](managed-identity.md) to allow Azure CDN to access your Azure Key Vault account.
177
116
178
117
### Select the certificate for Azure CDN to deploy
Copy file name to clipboardExpand all lines: articles/frontdoor/standard-premium/how-to-configure-https-custom-domain.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,13 +77,14 @@ You can also choose to use your own TLS certificate. Your TLS certificate must m
77
77
78
78
Create a separate Azure Key Vault instance in which you store your Azure Front Door TLS certificates. For more information, see [Create a Key Vault instance](../../key-vault/general/quick-create-portal.md). If you already have a certificate, you can upload it to your new Key Vault instance. Otherwise, you can create a new certificate through Key Vault from one of the certificate authority (CA) partners.
79
79
80
-
> [!WARNING]
81
-
> Azure Front Door currently only supports Key Vault in the same subscription. Selecting Key Vault under a different subscription results in a failure.
80
+
There are currently two ways to authenticate Azure Front Door to access your Key Vault:
82
81
83
-
Other points to note about certificates:
82
+
-**Managed identity**: Azure Front Door uses a managed identity to authenticate to your Key Vault. This method is recommended because it's more secure and doesn't require you to manage credentials. For more information, see [Use managed identities in Azure Front Door](../managed-identity.md). Skip to [Select the certificate for Azure Front Door to deploy](#select-the-certificate-for-azure-front-door-to-deploy) if you're using this method.
83
+
-**App registration**: Azure Front Door uses an app registration to authenticate to your Key Vault. This method is being deprecated and will be retired in the future. For more information, see [Use app registration in Azure Front Door](#register-azure-front-door).
84
84
85
-
* Azure Front Door doesn't support certificates with elliptic curve cryptography algorithms. Also, your certificate must have a complete certificate chain with leaf and intermediate certificates. The root CA also must be part of the [Microsoft Trusted CA List](https://ccadb-public.secure.force.com/microsoft/IncludedCACertificateReportForMSFT).
86
-
* We recommend that you use [managed identity](../managed-identity.md) to allow access to your Key Vault certificates because app registration will be retired in the future.
85
+
> [!WARNING]
86
+
> *Azure Front Door currently only supports Key Vault in the same subscription. Selecting Key Vault under a different subscription results in a failure.
87
+
> * Azure Front Door doesn't support certificates with elliptic curve cryptography algorithms. Also, your certificate must have a complete certificate chain with leaf and intermediate certificates. The root CA also must be part of the [Microsoft Trusted CA List](https://ccadb-public.secure.force.com/microsoft/IncludedCACertificateReportForMSFT).
Copy file name to clipboardExpand all lines: articles/key-vault/general/overview-vnet-service-endpoints.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ Here's a list of trusted services that are allowed to access a key vault if the
53
53
| Azure Backup|Allow backup and restore of relevant keys and secrets during Azure Virtual Machines backup, by using [Azure Backup](../../backup/backup-overview.md).|
54
54
| Azure Batch |[Configure customer-managed keys for Batch accounts](../../batch/batch-customer-managed-key.md) and [Key Vault for User Subscription Batch accounts](../../batch/batch-account-create-portal.md)|
55
55
| Azure Bot Service |[Azure AI Bot Service encryption for data at rest](/azure/bot-service/bot-service-encryption#grant-azure-bot-service-access-to-a-key-vault)|
56
-
| Azure CDN |[Configure HTTPS on an Azure CDN custom domain: Grant Azure CDN access to your key vault](../../cdn/cdn-custom-ssl.md?tabs=option-2-enable-https-with-your-own-certificate#grant-azure-cdn-access-to-your-key-vault)|
56
+
| Azure CDN |[Configure HTTPS on an Azure CDN custom domain: Grant Azure CDN access to your key vault](../../cdn/cdn-custom-ssl.md?tabs=option-2-enable-https-with-your-own-certificate#set-up-managed-identity-for-azure-cdn)|
57
57
| Azure Container Registry|[Registry encryption using customer-managed keys](../../container-registry/tutorial-enable-customer-managed-keys.md)
58
58
| Azure Data Factory|[Fetch data store credentials in Key Vault from Data Factory](https://go.microsoft.com/fwlink/?linkid=2109491)|
59
59
| Azure Data Lake Store|[Encryption of data in Azure Data Lake Store](../../data-lake-store/data-lake-store-encryption.md) with a customer-managed key.|
0 commit comments