Skip to content

Commit c0c2b63

Browse files
authored
Merge pull request #124363 from Chris-Hailes/main
Update to enterprise ca certificate requirements for Azure Premium Firewall
2 parents ac5b64d + 8d8ac41 commit c0c2b63

File tree

2 files changed

+17
-1
lines changed

2 files changed

+17
-1
lines changed
9.6 KB
Loading

articles/firewall/premium-deploy-certificates-enterprise-ca.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,28 @@ To use an Enterprise CA to generate a certificate to use with Azure Firewall Pre
2828
- an [Azure Key Vault](premium-certificates.md#azure-key-vault)
2929
- a Managed Identity with Read permissions to **Certificates and Secrets** defined in the Key Vault Access Policy
3030

31+
## Create a new Subordinate Certificate Template
32+
33+
1. Run `certtmpl.msc` to open the Certificate Template Console.
34+
2. Find the **Subordinate Certification Authority** template in the console.
35+
3. Right-click on the **Subordinate Certification Authority** template and select **Duplicate Template**.
36+
4. In the **Properties of New Template** window, go to the **Compatibility** tab and set the appropriate compatibility settings or leave them as default.
37+
5. Go to the **General** tab, set the **Template Display Name** (for example: `My Subordinate CA`), and adjust the validity period if necessary. Optionally, select the **Publish certificate in Active Directory** checkbox.
38+
6. In the **Settings** tab, ensure the required users and groups have read and `enroll` permissions.
39+
7. Navigate to the **Extensions** tab, select **Key Usage**, and select **Edit**.
40+
- Ensure that the **Digital signature**, **Certificate signing**, and **CRL signing** checkboxes are selected.
41+
- Select the **Make this extension critical** checkbox and select **OK**.
42+
43+
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/certificate-template-key-usage-extension.png" alt-text="Screenshot of certificate template key usage extensions.":::
44+
8. Select **OK** to save the new certificate template.
45+
9. Ensure the new template is enabled so it can be used to issue certificates.
46+
3147
## Request and export a certificate
3248

3349
1. Access the web enrollment site on the Root CA, usually `https://<servername>/certsrv` and select **Request a Certificate**.
3450
1. Select **Advanced Certificate Request**.
3551
1. Select **Create and Submit a Request to this CA**.
36-
1. Fill out the form using the Subordinate Certification Authority template.
52+
1. Fill out the form using the Subordinate Certification Authority template created in the previous section.
3753
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/advanced-certificate-request.png" alt-text="Screenshot of advanced certificate request":::
3854
1. Submit the request and install the certificate.
3955
1. Assuming this request is made from a Windows Server using Internet Explorer, open **Internet Options**.

0 commit comments

Comments
 (0)