Skip to content

Commit 76e3468

Browse files
Merge pull request #277857 from duongau/managedafd
Azure Front Door and CDN - Managed identity when configuring HTTPS for custom domain.
2 parents 8581d87 + df01365 commit 76e3468

File tree

3 files changed

+9
-69
lines changed

3 files changed

+9
-69
lines changed

articles/cdn/cdn-custom-ssl.md

Lines changed: 2 additions & 63 deletions
Original file line numberDiff line numberDiff line change
@@ -110,70 +110,9 @@ You can use your own certificate to enable the HTTPS feature. This process is do
110110
> - Azure Content Delivery Network only supports PFX certificates.
111111
> - The certificate must have a complete certificate chain with leaf and intermediate certificates, and root CA must be part of the [Microsoft Trusted CA List](https://ccadb-public.secure.force.com/microsoft/IncludedCACertificateReportForMSFT).
112112
113-
### Register Azure CDN
113+
### Set up managed identity for Azure CDN
114114

115-
Register Azure CDN as an app in your Microsoft Entra ID.
116-
117-
> [!NOTE]
118-
> - `205478c0-bd83-4e1b-a9d6-db63a3e1e1c8` is the service principal for `Microsoft.AzureFrontDoor-Cdn`.
119-
> - You need to have the **Global Administrator** role to run this command.
120-
> - The service principal name was changed from `Microsoft.Azure.Cdn` to `Microsoft.AzureFrontDoor-Cdn`.
121-
122-
#### Azure PowerShell
123-
124-
1. If needed, install [Azure PowerShell](/powershell/azure/install-azure-powershell) on your local machine.
125-
126-
2. In PowerShell, run the following command:
127-
128-
`New-AzADServicePrincipal -ApplicationId "205478c0-bd83-4e1b-a9d6-db63a3e1e1c8"`
129-
130-
```
131-
New-AzADServicePrincipal -ApplicationId "205478c0-bd83-4e1b-a9d6-db63a3e1e1c8"
132-
133-
Secret :
134-
ServicePrincipalNames : {205478c0-bd83-4e1b-a9d6-db63a3e1e1c8,
135-
https://microsoft.onmicrosoft.com/033ce1c9-f832-4658-b024-ef1cbea108b8}
136-
ApplicationId : 205478c0-bd83-4e1b-a9d6-db63a3e1e1c8
137-
ObjectType : ServicePrincipal DisplayName : Microsoft.AzureFrontDoor-Cdn Id : abcdef12-3456-7890-abcd-ef1234567890
138-
Type :
139-
```
140-
141-
<a name='azure-cli'></a>
142-
143-
#### The Azure CLI
144-
145-
1. If needed, install the [Azure CLI](/cli/azure/install-azure-cli) on your local machine.
146-
147-
1. Use the Azure CLI to run the following command:
148-
149-
```azurecli-interactive
150-
az ad sp create --id 205478c0-bd83-4e1b-a9d6-db63a3e1e1c8
151-
```
152-
153-
### Grant Azure CDN access to your key vault
154-
155-
Grant Azure CDN permission to access the certificates (secrets) in your Azure Key Vault account.
156-
157-
1. In your key vault in the **Settings** section, select **Access policies**. In the right pane, select **+ Add Access Policy**:
158-
159-
:::image type="content" source="./media/cdn-custom-ssl/cdn-new-access-policy.png" alt-text="Screenshot of create a Key Vault access policy for Azure Content Delivery Network." border="true":::
160-
161-
2. In the **Add access policy** page, select **None selected** next to **Select principal**. In the **Principal** page, enter **205478c0-bd83-4e1b-a9d6-db63a3e1e1c8**. Select **Microsoft.AzureFrontdoor-Cdn**. Choose **Select**:
162-
163-
3. In **Select principal**, search for **205478c0-bd83-4e1b-a9d6-db63a3e1e1c8**, choose **Microsoft.AzureFrontDoor-Cdn**. Choose **Select**.
164-
165-
:::image type="content" source="./media/cdn-custom-ssl/cdn-access-policy-settings.png" alt-text="Select service principal of Azure CDN" border="true":::
166-
167-
4. Select **Certificate permissions**. Select the checkbox for **Get** to allow CDN permissions to get the certificates.
168-
169-
5. Select **Secret permissions**. Select the checkbox for **Get** to allow CDN permissions to get the secrets:
170-
171-
:::image type="content" source="./media/cdn-custom-ssl/cdn-vault-permissions.png" alt-text="Screenshot of select permissions for Azure Content Delivery Network to Key Vault." border="true":::
172-
173-
6. Select **Add**.
174-
175-
> [!NOTE]
176-
> Azure CDN can now access this key vault and the certificates (secrets) that are stored in this key vault. Any CDN instance created in this subscription will have access to the certificates in this key vault.
115+
Follow the steps in [Configure managed identity for Azure CDN](managed-identity.md) to allow Azure CDN to access your Azure Key Vault account.
177116

178117
### Select the certificate for Azure CDN to deploy
179118

articles/frontdoor/standard-premium/how-to-configure-https-custom-domain.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -77,13 +77,14 @@ You can also choose to use your own TLS certificate. Your TLS certificate must m
7777

7878
Create a separate Azure Key Vault instance in which you store your Azure Front Door TLS certificates. For more information, see [Create a Key Vault instance](../../key-vault/general/quick-create-portal.md). If you already have a certificate, you can upload it to your new Key Vault instance. Otherwise, you can create a new certificate through Key Vault from one of the certificate authority (CA) partners.
7979

80-
> [!WARNING]
81-
> Azure Front Door currently only supports Key Vault in the same subscription. Selecting Key Vault under a different subscription results in a failure.
80+
There are currently two ways to authenticate Azure Front Door to access your Key Vault:
8281

83-
Other points to note about certificates:
82+
- **Managed identity**: Azure Front Door uses a managed identity to authenticate to your Key Vault. This method is recommended because it's more secure and doesn't require you to manage credentials. For more information, see [Use managed identities in Azure Front Door](../managed-identity.md). Skip to [Select the certificate for Azure Front Door to deploy](#select-the-certificate-for-azure-front-door-to-deploy) if you're using this method.
83+
- **App registration**: Azure Front Door uses an app registration to authenticate to your Key Vault. This method is being deprecated and will be retired in the future. For more information, see [Use app registration in Azure Front Door](#register-azure-front-door).
8484

85-
* Azure Front Door doesn't support certificates with elliptic curve cryptography algorithms. Also, your certificate must have a complete certificate chain with leaf and intermediate certificates. The root CA also must be part of the [Microsoft Trusted CA List](https://ccadb-public.secure.force.com/microsoft/IncludedCACertificateReportForMSFT).
86-
* We recommend that you use [managed identity](../managed-identity.md) to allow access to your Key Vault certificates because app registration will be retired in the future.
85+
> [!WARNING]
86+
> *Azure Front Door currently only supports Key Vault in the same subscription. Selecting Key Vault under a different subscription results in a failure.
87+
> * Azure Front Door doesn't support certificates with elliptic curve cryptography algorithms. Also, your certificate must have a complete certificate chain with leaf and intermediate certificates. The root CA also must be part of the [Microsoft Trusted CA List](https://ccadb-public.secure.force.com/microsoft/IncludedCACertificateReportForMSFT).
8788
8889
#### Register Azure Front Door
8990

articles/key-vault/general/overview-vnet-service-endpoints.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Here's a list of trusted services that are allowed to access a key vault if the
5353
| Azure Backup|Allow backup and restore of relevant keys and secrets during Azure Virtual Machines backup, by using [Azure Backup](../../backup/backup-overview.md).|
5454
| Azure Batch | [Configure customer-managed keys for Batch accounts](../../batch/batch-customer-managed-key.md) and [Key Vault for User Subscription Batch accounts](../../batch/batch-account-create-portal.md) |
5555
| Azure Bot Service | [Azure AI Bot Service encryption for data at rest](/azure/bot-service/bot-service-encryption#grant-azure-bot-service-access-to-a-key-vault) |
56-
| Azure CDN | [Configure HTTPS on an Azure CDN custom domain: Grant Azure CDN access to your key vault](../../cdn/cdn-custom-ssl.md?tabs=option-2-enable-https-with-your-own-certificate#grant-azure-cdn-access-to-your-key-vault)|
56+
| Azure CDN | [Configure HTTPS on an Azure CDN custom domain: Grant Azure CDN access to your key vault](../../cdn/cdn-custom-ssl.md?tabs=option-2-enable-https-with-your-own-certificate#set-up-managed-identity-for-azure-cdn)|
5757
| Azure Container Registry|[Registry encryption using customer-managed keys](../../container-registry/tutorial-enable-customer-managed-keys.md)
5858
| Azure Data Factory|[Fetch data store credentials in Key Vault from Data Factory](https://go.microsoft.com/fwlink/?linkid=2109491)|
5959
| Azure Data Lake Store|[Encryption of data in Azure Data Lake Store](../../data-lake-store/data-lake-store-encryption.md) with a customer-managed key.|

0 commit comments

Comments
 (0)