Skip to content

Commit fd612fe

Browse files
authored
public repo edit
1 parent a2dcae3 commit fd612fe

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/application-gateway/key-vault-certs.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -45,19 +45,19 @@ Application Gateway integration with Key Vault requires a three-step configurati
4545
You then either import an existing certificate or create a new one in your key vault. The certificate will be used by applications that run through the application gateway. In this step, you can also use a key vault secret that's stored as a password-less, base-64 encoded PFX file. We recommend using a certificate type because of the autorenewal capability that's available with certificate type objects in the key vault. After you've created a certificate or a secret, you define access policies in the key vault to allow the identity to be granted *get* access to the secret.
4646

4747
> [!NOTE]
48-
> If you deploy the application gateway via an ARM template, either by using the Azure CLI or PowerShell, or via an Azure Application deployed from the Azure portal, the SSL certificate is stored in the Key Vault as a base-64-encoded PFX file. You must complete the steps in [Use Azure Key Vault to pass secure parameter value during deployment](../azure-resource-manager/templates/key-vault-parameter.md). It's particularly important to set `enabledForTemplateDeployment` to `true`. The certificate may be passwordless or may have a password. In the case of a certificate with a password, the following example shows a possible configuration for the `sslCertificates` entry in the `properties` for the ARM template configuration for an App Gateway. The values of `appGatewaySSLCertificateData` and `appGatewaySSLCertificatePassword` are looked up from the Key Vault as described in the section [Reference secrets with dynamic ID](../azure-resource-manager/templates/key-vault-parameter.md#reference-secrets-with-dynamic-id). Follow the references backward from `parameters('secretName')` to see how the look up happens. If the certificate is passwordless, omit the `password` entry.
49-
50-
```
51-
"sslCertificates": [
52-
{
53-
"name": "appGwSslCertificate",
54-
"properties": {
55-
"data": "[parameters('appGatewaySSLCertificateData')]",
56-
"password": "[parameters('appGatewaySSLCertificatePassword')]"
57-
}
58-
}
59-
]
60-
```
48+
> If you deploy the application gateway via an ARM template, either by using the Azure CLI or PowerShell, or via an Azure application deployed from the Azure portal, the SSL certificate is stored in the key vault as a base64-encoded PFX file. You must complete the steps in [Use Azure Key Vault to pass secure parameter value during deployment](../azure-resource-manager/templates/key-vault-parameter.md). It's particularly important to set `enabledForTemplateDeployment` to `true`. The certificate may be passwordless or it may have a password. In the case of a certificate with a password, the following example shows a possible configuration for the `sslCertificates` entry in the `properties` for the ARM template configuration for an app gateway. The values of `appGatewaySSLCertificateData` and `appGatewaySSLCertificatePassword` are looked up from the key vault as described in the section [Reference secrets with dynamic ID](../azure-resource-manager/templates/key-vault-parameter.md#reference-secrets-with-dynamic-id). Follow the references backward from `parameters('secretName')` to see how the lookup happens. If the certificate is passwordless, omit the `password` entry.
49+
>
50+
> ```
51+
> "sslCertificates": [
52+
> {
53+
> "name": "appGwSslCertificate",
54+
> "properties": {
55+
> "data": "[parameters('appGatewaySSLCertificateData')]",
56+
> "password": "[parameters('appGatewaySSLCertificatePassword')]"
57+
> }
58+
> }
59+
> ]
60+
> ```
6161
6262
1. **Configure the application gateway**
6363

0 commit comments

Comments
 (0)