Skip to content

Commit ed46862

Browse files
authored
Merge pull request #216685 from duongau/managedidentity
Azure Front Door - Set up managed identity with Front Door
2 parents e209028 + 7701fed commit ed46862

18 files changed

+112
-0
lines changed

articles/frontdoor/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -249,6 +249,8 @@
249249
href: how-to-configure-endpoints.md
250250
- name: Origins in origin group
251251
href: how-to-configure-origin.md
252+
- name: Set up managed identity
253+
href: managed-identity.md
252254
- name: Add a custom domain
253255
href: standard-premium/how-to-add-custom-domain.md
254256
- name: Add a root or apex domain
Lines changed: 110 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,110 @@
1+
---
2+
title: Use managed identities with Azure Front Door Standard/Premium (Preview)
3+
description: This article will show you how to set up managed identities to use with your Azure Front Door Standard or Premium profile.
4+
services: frontdoor
5+
author: duongau
6+
ms.service: frontdoor
7+
ms.topic: conceptual
8+
ms.date: 11/02/2022
9+
ms.author: duau
10+
---
11+
12+
# Use managed identities with Azure Front Door Standard/Premium (Preview)
13+
14+
Azure Front Door also supports using managed identities to access Key Vault certificate. A managed identity generated by Azure Active Directory (Azure AD) allows your Azure Front Door instance to easily and securely access other Azure AD-protected resources, such as Azure Key Vault. Azure manages this identity, so you don't have to create or rotate any secrets. For more information about managed identities, see [What are managed identities for Azure resources?](../active-directory/managed-identities-azure-resources/overview.md).
15+
16+
> [!NOTE]
17+
> Once you enable managed identities in Azure Front Door and grant proper permissions to access Key Vault, Azure Front Door will always use managed identities to access Key Vault for customer certificate.
18+
>
19+
> You can grant two types of identities to an Azure Front Door profile:
20+
> * A **system-assigned** identity is tied to your service and is deleted if your service is deleted. The service can have only **one** system-assigned identity.
21+
> * A **user-assigned** identity is a standalone Azure resource that can be assigned to your service. The service can have **multiple** user-assigned identities.
22+
>
23+
> Managed identities are specific to the Azure AD tenant where your Azure subscription is hosted. They don't get updated if a subscription gets moved to a different directory. If a subscription gets moved, you'll need to recreate and configure the identities.
24+
25+
## Prerequisites
26+
27+
Before you can set up managed identities for Front Door, you must have a Front Door Standard or Premium profile. To create an Azure Front Door profile, see [create an Azure Front Door](create-front-door-portal.md).
28+
29+
## Enable managed identity
30+
31+
1. Go to an existing Azure Front Door Standard or Premium profile. Select **Identity (preview)** under *Settings*.
32+
33+
:::image type="content" source="./media/managed-identity/overview.png" alt-text="Screenshot of the identity button under settings for a Front Door profile.":::
34+
35+
1. Select either **System assigned** or **User assigned**.
36+
37+
* **System assigned** - a managed identity is created for the Azure Front Door profile lifecycle and is used to access a Key Vault.
38+
39+
* **User assigned** - a standalone managed identity resource used to authenticate to a Key Vault and has its own lifecycle.
40+
41+
### System assigned
42+
43+
1. Toggle the *Status* to **On** and then select **Save**.
44+
45+
:::image type="content" source="./media/managed-identity/system-assigned.png" alt-text="Screenshot of the system assigned managed identity configuration page.":::
46+
47+
1. You'll be prompted with a message to confirm you would like to create a system managed identity for the Front Door profile. Select **Yes** to confirm.
48+
49+
:::image type="content" source="./media/managed-identity/system-assigned-confirm.png" alt-text="Screenshot of the system assigned managed identity confirmation message.":::
50+
51+
1. Once the system assigned managed identity has been created and registered with Azure AD, you can use the **Object (principal) ID** to allow Azure Front Door access to your Key Vault.
52+
53+
:::image type="content" source="./media/managed-identity/system-assigned-created.png" alt-text="Screenshot of the system assigned managed identity registered with Azure Active Directory.":::
54+
55+
### User assigned
56+
57+
1. You must have a user managed identity already created. For more information, see [create a user assigned managed identity](../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md).
58+
59+
1. Select the **User assigned** tab and then select **+ Add**.
60+
61+
:::image type="content" source="./media/managed-identity/user-assigned.png" alt-text="Screenshot of the user assigned managed identity configuration page.":::
62+
63+
1. Search and select the user assigned manage identity. Then select **Add** to add the user managed identity to the Azure Front Door profile.
64+
65+
:::image type="content" source="./media/managed-identity/add-user-managed-identity.png" alt-text="Screenshot of the add user assigned managed identity page.":::
66+
67+
1. You'll now see the name of the user assigned managed identity you've selected show in the Azure Front Door profile.
68+
69+
:::image type="content" source="./media/managed-identity/user-assigned-configured.png" alt-text="Screenshot of the add user assigned managed identity added to Front Door profile.":::
70+
71+
## Configure Key Vault access policy
72+
73+
1. Navigate to your Azure Key Vault.
74+
75+
:::image type="content" source="./media/managed-identity/key-vault-list.png" alt-text="Screenshot of the Key Vault resource list.":::
76+
77+
1. Select **Access policies** from under *Settings* and then select **+ Create**.
78+
79+
:::image type="content" source="./media/managed-identity/access-policies.png" alt-text="Screenshot of the access policies page for a Key Vault.":::
80+
81+
1. On the **Permissions** tab of the *Create an access policy* page, select **List** and **Get** under *Secret permissions*. Then select **Next** to configure the next tab.
82+
83+
:::image type="content" source="./media/managed-identity/permissions.png" alt-text="Screenshot of the permissions tab for the Key Vault access policy.":::
84+
85+
1. On the *Principal* tab, paste the **object (principal) ID** if you're using a system managed identity or enter a **name** if you're using a user assigned manged identity. Then select **Next** to configure the next tab.
86+
87+
:::image type="content" source="./media/managed-identity/system-principal.png" alt-text="Screenshot of the principal tab for the Key Vault access policy.":::
88+
89+
1. On the *Application* tab, the application has already been selected for you. Select **Next** to go to the *Review + create* tab.
90+
91+
:::image type="content" source="./media/managed-identity/application.png" alt-text="Screenshot of the application tab for the Key Vault access policy.":::
92+
93+
1. Review the access policy settings and then select **Create** to set up the access policy.
94+
95+
:::image type="content" source="./media/managed-identity/create.png" alt-text="Screenshot of the review and create tab for the Key Vault access policy.":::
96+
97+
## Verify access
98+
99+
1. Go to the Azure Front Door profile you enabled managed identity and select **Secret** from under *Settings*.
100+
101+
:::image type="content" source="./media/managed-identity/secrets.png" alt-text="Screenshot of accessing secrets from under settings of a Front Door profile.":::
102+
103+
1. Confirm **Managed identity** appears under the *Access role* column for the certificate used in Front Door.
104+
105+
:::image type="content" source="./media/managed-identity/confirm-set-up.png" alt-text="Screenshot of Azure Front Door using managed identity to access certificate in Key Vault.":::
106+
107+
## Next steps
108+
109+
* Learn how to [configure HTTPS on an Azure Front Door custom domain](standard-premium/how-to-configure-https-custom-domain.md).
110+
* Learn more about [End-to-end TLS encryption](end-to-end-tls.md).
48.1 KB
Loading
21.7 KB
Loading
23.2 KB
Loading
40.9 KB
Loading
47.4 KB
Loading
29.9 KB
Loading
67.2 KB
Loading
67.4 KB
Loading

0 commit comments

Comments
 (0)