Skip to content

Commit d9e08b0

Browse files
Merge pull request #262677 from vhorne/fw-certs
add note about updating policy
2 parents b4658f2 + 9ebfa01 commit d9e08b0

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/firewall/premium-certificates.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,9 @@ To configure your key vault:
7171
- The provided CA certificate needs to be trusted by your Azure workload. Ensure they are deployed correctly.
7272
- Since Azure Firewall Premium is listed as Key Vault [Trusted Service](../key-vault/general/overview-vnet-service-endpoints.md#trusted-services), it allows you to bypass Key Vault internal Firewall and to eliminate any exposure of your Key Vault to the Internet.
7373

74+
> [!NOTE]
75+
> Whenever you import a new Firewall CA certificate into Azure Key Vault (either for the first time or replacing an expired CA certification), you should *explicitly* update the Azure Firewall Policy TLS setting with the new certificate.
76+
7477
You can either create or reuse an existing user-assigned managed identity, which Azure Firewall uses to retrieve certificates from Key Vault on your behalf. For more information, see [What is managed identities for Azure resources?](../active-directory/managed-identities-azure-resources/overview.md)
7578

7679
> [!NOTE]

0 commit comments

Comments
 (0)