Skip to content

Commit d4f642c

Browse files
committed
Merge branch 'patch-36' of https://github.com/jessie-jyy/Jessie-azure-docs-pr into managedafd
2 parents 623bb03 + 2c286a7 commit d4f642c

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/frontdoor/managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Azure Front Door also supports using managed identities to access Key Vault cert
1818
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
1919
2020
> [!NOTE]
21-
> Once you enable managed identities in Azure Front Door and grant proper permissions to access Key Vault, Azure Front Door will always use managed identities to access Key Vault for customer certificate.
21+
> Once you enable managed identities in Azure Front Door and grant proper permissions to access Key Vault, Azure Front Door will always use managed identities to access Key Vault for customer certificate. **Please make sure that you add managed identities permissoin to access Key Vault after enabling**. If you fail to do this step, custom certificate autorotation and adding new certifcate will fail without permission to Key Vault. If you disable managed identities, AFD will fallback to use the orignal configured AAD App, but this is not recommended.
2222
>
2323
> You can grant two types of identities to an Azure Front Door profile:
2424
> * A **system-assigned** identity is tied to your service and is deleted if your service is deleted. The service can have only **one** system-assigned identity.

0 commit comments

Comments
 (0)