Skip to content

Commit ccd5979

Browse files
origin auth
1 parent c1853b4 commit ccd5979

File tree

6 files changed

+107
-3
lines changed

6 files changed

+107
-3
lines changed

articles/frontdoor/managed-identity.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,6 @@ ms.date: 11/12/2024
1313

1414
Managed identities provided by Microsoft Entra ID enable your Azure Front Door instance to securely access other Microsoft Entra protected resources, such as Azure Key Vault, without the need to manage credentials. For more information, see [What are managed identities for Azure resources?](../active-directory/managed-identities-azure-resources/overview.md).
1515

16-
> [!NOTE]
17-
> Managed identity support in Azure Front Door is limited to accessing Azure Key Vault. It can't be used to authenticate from Front Door to origins such as Blob Storage or Web Apps.
18-
1916
After you enable managed identity for Azure Front Door and granting the necessary permissions to your Azure Key Vault, Front Door will use the managed identity to access certificates. Without these permissions, custom certificate autorotation and adding new certificates fail. If managed identity is disabled, Azure Front Door will revert to using the original configured Microsoft Entra App, which isn't recommended and will be deprecated in the future.
2017

2118
Azure Front Door supports two types of managed identities:
18.8 KB
Loading
59.4 KB
Loading
186 KB
Loading
141 KB
Loading
Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
---
2+
title: Use managed identities to authenticate to origins (preview)
3+
titleSuffix: Azure Front Door
4+
description: This article shows you how to set up managed identities with Azure Front Door to authnticate to origins.
5+
author: halkazwini
6+
ms.author: halkazwini
7+
ms.service: azure-frontdoor
8+
ms.topic: concept-article
9+
ms.date: 05/12/2025
10+
---
11+
12+
# Use managed identities to to authenticate to origins (preview)
13+
14+
Managed identities provided by Microsoft Entra ID enables your Azure Front Door Standard/Premium instance to securely access other Microsoft Entra protected resources, such as Azure Blob Storage, without the need to manage credentials. For more information, see [What are managed identities for Azure resources?](../active-directory/managed-identities-azure-resources/overview.md).
15+
16+
After you enable managed identity for Azure Front Door and granting the managed identity necessary permissions to your origin, Front Door will use the managed identity to obtain an access token from Microsoft Entra ID for accessing the specified resource. After successfully obtaining the token, the policy will set the value of the token in the Authorization header using the Bearer scheme. Front Door caches the token until it expires.
17+
18+
> [!Note]
19+
> This feature is not currently supported for private link enabled origins within Front Door.
20+
21+
Azure Front Door supports two types of managed identities:
22+
23+
* **System-assigned identity**: This identity is tied to your service and is deleted if the service is deleted. Each service can have only one system-assigned identity.
24+
* **User-assigned identity**: This is a standalone Azure resource that can be assigned to your service. Each service can have multiple user-assigned identities.
25+
26+
Managed identities are specific to the Microsoft Entra tenant where your Azure subscription is hosted. If a subscription is moved to a different directory, you need to recreate and reconfigure the identity.
27+
28+
## Prerequisites
29+
30+
Before setting up managed identity for Azure Front Door, ensure you have an Azure Front Door Standard or Premium profile. To create a new profile, see [create an Azure Front Door](create-front-door-portal.md).
31+
32+
## Enable managed identity
33+
34+
1. Navigate to your existing Azure Front Door profile. Select **Identity** under *Security* in the left menu.
35+
36+
1. Choose either a **System assigned** or **User assigned** managed identity.
37+
38+
* **[System assigned](#system-assigned)** - A managed identity tied to the Azure Front Door profile lifecycle, used to access Azure Key Vault.
39+
40+
* **[User assigned](#user-assigned)** - A standalone managed identity resource with its own lifecycle, used to authenticate to Azure Key Vault.
41+
42+
### System assigned
43+
44+
1. Toggle the *Status* to **On** and select **Save**.
45+
46+
:::image type="content" source="./media/managed-identity/system-assigned.png" alt-text="Screenshot of the system assigned managed identity configuration page.":::
47+
48+
1. Confirm the creation of a system managed identity for your Front Door profile by selecting **Yes** when prompted.
49+
50+
1. Once created and registered with Microsoft Entra ID, use the **Object (principal) ID** to grant Azure Front Door access to your Azure Key Vault.
51+
52+
:::image type="content" source="./media/managed-identity/system-assigned-created.png" alt-text="Screenshot of the system assigned managed identity registered with Microsoft Entra ID.":::
53+
54+
### User assigned
55+
56+
To use a user-assigned managed identity, you must have one already created. For instructions on creating a new identity, see [create a user-assigned managed identity](../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md).
57+
58+
1. In the **User assigned** tab, select **+ Add** to add a user-assigned managed identity.
59+
60+
1. Search for and select the user-assigned managed identity. Then select **Add** to attach it to the Azure Front Door profile.
61+
62+
1. The name of the selected user-assigned managed identity appears in the Azure Front Door profile.
63+
64+
:::image type="content" source="./media/managed-identity/user-assigned-configured.png" alt-text="Screenshot of the user-assigned managed identity added to the Front Door profile.":::
65+
66+
---
67+
68+
## Associating the identity to an Origin Group
69+
70+
> [!Note]
71+
> The association will not work if the origin group contains any origins with private link enabled and/or the forwarding/accepted/health probe protocol is set to HTTP.
72+
73+
1. Navigate to your existing Azure Front Door profile and open origin groups.
74+
2. Select an existing origin group which has origins already configured.
75+
3. Scroll down to the **Authentication** section.
76+
4. Enable **Origin authentication**.
77+
5. Choose between system assigned or user assigned managed identity.
78+
6. Enter the correct [scope](https://learn.microsoft.com/en-us/entra/identity-platform/scopes-oidc) within the **Scope** field.
79+
7. Click on **Update**.
80+
81+
:::image type="content" source="./media/managed-identity/origin-auth.png" alt-text="Screenshot of associating the identity to an origin group.":::
82+
83+
84+
85+
## Providing access at the origin resource
86+
1. Navigate to the management page of your origin resource. For example, if the origin is an Azure Blob Storage, go to that Storage Account management page.
87+
88+
> [!Note]
89+
> Below steps assume that your origin is an Azure Blob Storage. If you are using a different resource type as your origin, make sure that you choose an appropriate 'Job function role' during role assignment. Apart from that, the steps will remain same for all resource types.
90+
91+
2. Go to the **Access Control (IAM)** section and click on **Add**. Choose **Add role assignment** from the dropdown menu.
92+
:::image type="content" source="./media/managed-identity/add-role-assignment-menu.png" alt-text="Screenshot of access control settings.":::
93+
3. Under **Job function roles** in the **Roles** tab, select an appropriate role (for example, Storage Blob Data Reader or Storage Blob Data Contributor) from the list and then select **Next**.
94+
:::image type="content" source="./media/managed-identity/storage-job-function-roles.png" alt-text="Screenshot of Roles tab under Add role assignment.":::
95+
4. In the **Members** tab, under the **Assign access to**, choose **Managed identity** and then click on **Select members**.
96+
:::image type="content" source="./media/managed-identity/members.png" alt-text="Screenshot of Members tab under Add role assignment.":::
97+
5. The **Select managed identities** window opens. Choose the subscription where your Front Door is located and under **Managed identity** dropdown, choose **Front Door and CDN profiles**. Under the **Select** dropdown, choose the managed identity created for your Front Door. Click on the **Select** button in the bottom.
98+
6. Select **Review and assign** and then select **Review and assign** once more after the validation is complete.
99+
100+
101+
## Common Troubleshooting Tips
102+
* Error during origin group configuration.
103+
* Ensure that health probe protocol is set to HTTPS.
104+
* Ensure that forwarding protocol and accepted protocols within route settings are HTTPS.
105+
* Ensure that there are no private link enabled origins within the origin group.
106+
* Access Denied: Verify that the Managed Identity has the appropriate role assigned to access the origin resource.
107+
* Transition from SAS Tokens for Storage: If transitioning from SAS tokens to Managed Identities, follow a step-wise approach to avoid downtime. Enable Managed Identity, associate it with the origin, and then stop using SAS tokens.

0 commit comments

Comments
 (0)