Skip to content

Commit 9cc402d

Browse files
Merge pull request #303267 from Harikrishnan-M-B/patch-55
new tip
2 parents c319710 + ef53448 commit 9cc402d

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

articles/frontdoor/origin-authentication-with-managed-identities.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -109,3 +109,4 @@ Managed identities are specific to the Microsoft Entra tenant where your Azure s
109109
* After you enable origin authentication in origin group settings, you should not directly disable/delete the identities from the Identity settings under Front Door portal, nor directly delete the user-assigned managed identity under the Managed Identity portal. Doing so will cause origin authentication to fail immediately. Instead, if you want to stop using the origin authentication feature or want to delete/disable the identities, first disable the access restrictions under the Access Control (IAM) section of the origin resource so that the origin is accessible without the need of a managed identity or Entra ID token. Then disable origin authentication under Front Door origin group settings. Wait for some time for the configuration to be updated and then delete/disable the identity if required.
110110
* If your clients are already sending their own tokens under the Authorization header, the token value will be overwritten by AFD with the origin authentication token. If you want AFD to send the client token to the origin, you can configure an AFD rule using the server variable {http_req_header_Authorization} to send the token under a separate header.
111111
:::image type="content" source="media/managed-identity/rules-engine.png" alt-text="Screenshot of the rule for sending the client token to origin via a different header.":::
112+
* It is recommended that you use different managed identities for origin authentication and for AFD to Azure Key Vault authentication.

0 commit comments

Comments
 (0)