Skip to content

Commit 7c267a3

Browse files
Merge pull request #267424 from duongau/afdkeyvault
Azure Front Door - HTTPS and certificate with Key Vault (add text about new Key Vault)
2 parents 33bea4c + 1577bb3 commit 7c267a3

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/frontdoor/standard-premium/how-to-configure-https-custom-domain.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -77,13 +77,13 @@ You can also choose to use your own TLS certificate. Your TLS certificate must m
7777

7878
#### Prepare your key vault and certificate
7979

80-
If you already have a certificate, you can upload it to your key vault. Otherwise, create a new certificate directly through Azure Key Vault from one of the partner certificate authorities (CAs) that Azure Key Vault integrates with.
80+
We recommend you create a separate Azure Key Vault to store your Azure Front Door TLS certificates. For more information, see [create an Azure Key Vault](../../key-vault/general/quick-create-portal.md). If you already a certificate, you can upload it to your new Azure Key Vault. Otherwise, you can create a new certificate through Azure Key Vault from one of the certificate authorities (CAs) partners.
8181

8282
> [!WARNING]
83-
> Azure Front Door currently only supports Key Vault accounts in the same subscription as the Front Door configuration. Choosing a Key Vault under a different subscription than your Front Door will result in a failure.
83+
> Azure Front Door currently only supports Azure Key Vault in the same subscription. Selecting an Azure Key Vault under a different subscription will result in a failure.
8484
8585
> [!NOTE]
86-
> * Front Door doesn't support certificates with elliptic curve (EC) cryptography algorithms. Also, your certificate must have a complete certificate chain with leaf and intermediate certificates, and the root certification authority (CA) must be part of the [Microsoft Trusted CA List](https://ccadb-public.secure.force.com/microsoft/IncludedCACertificateReportForMSFT).
86+
> * Azure Front Door doesn't support certificates with elliptic curve (EC) cryptography algorithms. Also, your certificate must have a complete certificate chain with leaf and intermediate certificates, and also the root certification authority (CA) must be part of the [Microsoft Trusted CA List](https://ccadb-public.secure.force.com/microsoft/IncludedCACertificateReportForMSFT).
8787
> * We recommend using [**managed identity**](../managed-identity.md) to allow access to your Azure Key Vault certificates because App registration will be retired in the future.
8888
8989
#### Register Azure Front Door
@@ -131,9 +131,9 @@ Register the service principal for Azure Front Door as an app in your Microsoft
131131
```
132132
---
133133
134-
#### Grant Azure Front Door access to your key vault
134+
#### Grant Azure Front Door access to your Key Vault
135135
136-
Grant Azure Front Door permission to access the certificates in your Azure Key Vault account.
136+
Grant Azure Front Door permission to access the certificates in your Azure Key Vault account. You only need to give **GET** permission to the certificate and secret in order for Azure Front Door to retrieve the certificate.
137137
138138
1. In your key vault account, select **Access policies**.
139139

0 commit comments

Comments
 (0)