You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/for-containers/how-to-frontend-mtls-gateway-api.md
+28-10Lines changed: 28 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: greglin
6
6
ms.service: azure-application-gateway
7
7
ms.subservice: appgw-for-containers
8
8
ms.topic: how-to
9
-
ms.date: 9/16/2024
9
+
ms.date: 9/17/2024
10
10
ms.author: greglin
11
11
---
12
12
@@ -28,7 +28,7 @@ See the following figure:
28
28
29
29
The valid client certificate flow shows a client presenting a certificate to the frontend of Application Gateway for Containers. Application Gateway for Containers determines the certificate is valid and proxies the request to the backend target. The response is ultimately returned to the client.
30
30
31
-
The revoked client certificate flow shows a client presenting a revoked certificate to the frontend of Application Gateway for Containers. Application Gateway for Containers determines the certificate is not valid and prevents the request from being proxied to the client. The client will receive an HTTP 400 bad request and corresponding reason.
31
+
The revoked client certificate flow shows a client presenting a revoked certificate to the frontend of Application Gateway for Containers. Application Gateway for Containers determines the certificate isn't valid and prevents the request from being proxied to the client. The client will receive an HTTP 400 bad request and corresponding reason.
32
32
33
33
## Prerequisites
34
34
@@ -51,7 +51,7 @@ The revoked client certificate flow shows a client presenting a revoked certific
51
51
52
52
### Generate certificate(s)
53
53
54
-
For this example, we will create a root certificate and issue a client certificate from the root. If you already have a root certificate and client certificate, you may skip these steps.
54
+
For this example, we'll create a root certificate and issue a client certificate from the root. If you already have a root certificate and client certificate, you may skip these steps.
55
55
56
56
#### Generate a private key for the root certificate
57
57
@@ -103,7 +103,7 @@ spec:
103
103
certificateRefs:
104
104
- kind : Secret
105
105
group: ""
106
-
name: contoso.com
106
+
name: listener-tls-secret
107
107
EOF
108
108
```
109
109
@@ -147,7 +147,7 @@ EOF
147
147
certificateRefs:
148
148
- kind : Secret
149
149
group: ""
150
-
name: contoso.com
150
+
name: listener-tls-secret
151
151
addresses:
152
152
- type: alb.networking.azure.io/alb-frontend
153
153
value: $FRONTEND_NAME
@@ -223,8 +223,8 @@ spec:
223
223
- name: gateway-01
224
224
rules:
225
225
- backendRefs:
226
-
- name: mtls-app
227
-
port: 443
226
+
- name: echo
227
+
port: 80
228
228
EOF
229
229
```
230
230
@@ -266,6 +266,12 @@ status:
266
266
namespace: test-infra
267
267
```
268
268
269
+
Create a Kubernetes secret using kubectl that contains the certificate chain to the client certificate.
Congratulations, you have installed ALB Controller, deployed a backend application, authenticated via client certificate, and routed traffic to the application via the gateway on Application Gateway for Containers.
346
+
Note the response is from the backend service behind Application Gateway for Containers.
347
+
348
+
Congratulations, you installed ALB Controller, deployed a backend application, authenticated via client certificate, and returned traffic from your backend service via Application Gateway for Containers.
0 commit comments