Skip to content

Commit c21cc5a

Browse files
committed
add line
1 parent c9aab93 commit c21cc5a

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

articles/firewall/premium-certificates.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: vhorne
55
ms.service: firewall
66
services: firewall
77
ms.topic: conceptual
8-
ms.date: 12/05/2022
8+
ms.date: 12/11/2022
99
ms.author: victorh
1010
---
1111

@@ -68,6 +68,7 @@ To configure your key vault:
6868
- It's recommended to use a CA certificate import because it allows you to configure an alert based on certificate expiration date.
6969
- After you've imported a certificate or a secret, you need to define access policies in the key vault to allow the identity to be granted get access to the certificate/secret.
7070
- The provided CA certificate needs to be trusted by your Azure workload. Ensure they are deployed correctly.
71+
- Since Azure Firewall Premium is listed as Key Vault [Trusted Service](../key-vault/general/overview-vnet-service-endpoints.md#trusted-services), it allows you to bypass Key Vault internal Firewall and to eliminate any exposure of your Key Vault to the Internet.
7172

7273
You can either create or reuse an existing user-assigned managed identity, which Azure Firewall uses to retrieve certificates from Key Vault on your behalf. For more information, see [What is managed identities for Azure resources?](../active-directory/managed-identities-azure-resources/overview.md)
7374

0 commit comments

Comments
 (0)