Skip to content

Commit 9b64ab2

Browse files
authored
Application Gateway | UUF | Update key-vault-certs.md
Added blurb about managed identities being used for RBAC permission model in code.
1 parent 27f6276 commit 9b64ab2

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

articles/application-gateway/key-vault-certs.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,8 @@ For Cert name, type a friendly name for the certificate to be referenced in Key
121121
Once selected, select **Add** (if creating) or **Save** (if editing) to apply the referenced Key Vault certificate to the listener.
122122
123123
#### Key Vault Azure role-based access control permission model
124-
Application Gateway supports certificates referenced in Key Vault via the Role-based access control permission model. The first few steps to reference the Key Vault must be completed via ARM template, Bicep, CLI, or PowerShell.
124+
125+
Application Gateway supports certificates referenced in Key Vault via the Role-based access control permission model. The first few steps to reference the Key Vault must be completed via ARM template, Bicep, CLI, or PowerShell. During this process, a managed identity containing the proper Role-based access control permissions is utilized.
125126
126127
> [!Note]
127128
> Specifying Azure Key Vault certificates that are subject to the role-based access control permission model is not supported via the portal.
@@ -140,7 +141,7 @@ Add-AzApplicationGatewaySslCertificate -KeyVaultSecretId $secretId -ApplicationG
140141
# Commit the changes to the Application Gateway
141142
Set-AzApplicationGateway -ApplicationGateway $appgw
142143
```
143-
144+
>
144145
Once the commands have been executed, you can navigate to your Application Gateway in the Azure portal and select the Listeners tab. Click Add Listener (or select an existing) and specify the Protocol to HTTPS.
145146
146147
Under **Choose a certificate** select the certificate named in the previous steps. Once selected, select *Add* (if creating) or *Save* (if editing) to apply the referenced Key Vault certificate to the listener.

0 commit comments

Comments
 (0)