You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Prepare Azure Stack Hub PKI certificates for deployment or rotation
3
-
titleSuffix: Azure Stack Hub
4
3
description: Learn how to prepare PKI certificates for Azure Stack Hub deployment or for rotating secrets.
5
4
author: sethmanheim
6
5
ms.topic: how-to
7
-
ms.date: 10/19/2020
6
+
ms.date: 01/30/2025
8
7
ms.author: sethm
9
-
ms.reviewer: ppacent
10
8
ms.lastreviewed: 10/19/2020
11
9
12
10
# Intent: As an Azure Stack operator, I want to prepare my PKI certificates for Azure Stack deployment.
@@ -18,13 +16,14 @@ ms.lastreviewed: 10/19/2020
18
16
# Prepare Azure Stack Hub PKI certificates for deployment or rotation
19
17
20
18
> [!NOTE]
21
-
> This article pertains to the preparation of external certificates only, which are used to secure endpoints on external infrastructure and services. Internal certificates are managed separately, during the [certificate rotation process](azure-stack-rotate-secrets.md).
19
+
> This article only describes the preparation of external certificates, which are used to secure endpoints on external infrastructure and services. Internal certificates are managed separately, during the [certificate rotation process](azure-stack-rotate-secrets.md).
20
+
22
21
> [!NOTE]
23
22
> If you are installing Azure Container Registry (ACR), we recommend aligning the expiration dates of your external ACR certificates with the expiration dates of your other external Azure Stack Hub certificates. Additionally, we recommend protecting your PFX for ACR with the same password that you use to protect your other external certificate PFXs.
24
23
25
24
The certificate files [obtained from the certificate authority (CA)](azure-stack-get-pki-certs.md) must be imported and exported with properties matching Azure Stack Hub's certificate requirements.
26
25
27
-
In this article you learn how to import, package, and validate external certificates, to prepare for Azure Stack Hub deployment or secrets rotation.
26
+
In this article, you learn how to import, package, and validate external certificates, to prepare for Azure Stack Hub deployment or secrets rotation.
28
27
29
28
## Prerequisites
30
29
@@ -43,113 +42,119 @@ Use these steps to package certificates using the Azure Stack readiness checker
43
42
44
43
1. Install the Azure Stack readiness checker module from a PowerShell prompt (5.1 or above), by running the following cmdlet:
Validating east.azurestack.contoso.com-Deployment-AAD certificates in C:\Users\[*redacted*]\Documents\AzureStack\east.azurestack.contoso.com\Deployment
> For additional usage use Get-help ConvertTo-AzsPFX -Full for further usage such as disabling validation or filtering for different certificate formats.
129
-
130
-
Following a successful validation certificates can be presented for Deployment or Rotation without any additional steps.
Validating east.azurestack.contoso.com-Deployment-AAD certificates in C:\Users\[*redacted*]\Documents\AzureStack\east.azurestack.contoso.com\Deployment
> Use `Get-help ConvertTo-AzsPFX -Full` to see further options, such as disabling validation or filtering for different certificate formats.
134
+
135
+
Following a successful validation, certificates can be presented for deployment or rotation without any additional steps.
131
136
132
137
## Prepare certificates (manual steps)
133
138
134
-
Use these steps to package certificates for new Azure Stack Hub PKI certificates using manual steps.
139
+
You can use these manual steps to package certificates for new Azure Stack Hub PKI certificates.
135
140
136
141
### Import the certificate
137
142
138
-
1. Copy the original certificate versions [obtained from your CA of choice](azure-stack-get-pki-certs.md) into a directory on the deployment host.
139
-
> [!WARNING]
140
-
> Don't copy files that have already been imported, exported, or altered in any way from the files provided directly by the CA.
143
+
1. Copy the original certificate versions [obtained from your CA of choice](azure-stack-get-pki-certs.md) into a directory on the deployment host.
141
144
142
-
1. Right-click on the certificate and select **Install Certificate** or **Install PFX**, depending on how the certificate was delivered from your CA.
145
+
> [!WARNING]
146
+
> Don't copy files that were already imported, exported, or altered in any way from the files provided directly by the CA.
143
147
148
+
1. Right-click the certificate and select **Install Certificate** or **Install PFX**, depending on how the certificate was delivered from your CA.
144
149
1. In the **Certificate Import Wizard**, select **Local Machine** as the import location. Select **Next**. On the following screen, select next again.
145
150
146
-

151
+

147
152
148
-
1. Choose **Place all certificate in the following store** and then select **Enterprise Trust** as the location. Select **OK** to close the certificate store selection dialog box and then select **Next**.
153
+
1.Select**Place all certificate in the following store** and then select **Enterprise Trust** as the location. Select **OK** to close the certificate store selection dialog box and then select **Next**.
149
154
150
155

151
156
152
-
a. If you're importing a PFX, you'll be presented with an additional dialog. On the **Private key protection** page, enter the password for your certificate files and then enable the **Mark this key as exportable.** option, allowing you to back up or transport your keys later. Select **Next**.
157
+
1. If you import a PFX, you're presented with an additional dialog. On the **Private key protection** page, enter the password for your certificate files and then enable the **Mark this key as exportable.** option, allowing you to back up or transport your keys later. Select **Next**.
153
158
154
159

155
160
@@ -160,48 +165,43 @@ Use these steps to package certificates for new Azure Stack Hub PKI certificates
160
165
161
166
### Export the certificate
162
167
163
-
Open Certificate Manager MMC console and connect to the Local Machine certificate store.
168
+
Open Certificate Manager MMC console and connect to the local machine certificate store.
164
169
165
170
1. Open the Microsoft Management Console. To open the console in Windows 10, right-click on the **Start Menu**, select **Run**, then type **mmc** and press enter.
171
+
1. Select **File** > **Add/Remove Snap-In**, then select **Certificates** and select **Add**.
166
172
167
-
2. Select **File** > **Add/Remove Snap-In**, then select **Certificates** and select **Add**.
168
-
169
-

173
+

170
174
171
-
3. Select **Computer account**, then select **Next**. Select **Local computer** and then **Finish**. Select **OK** to close the Add/Remove Snap-In page.
175
+
1. Select **Computer account**, then select **Next**. Select **Local computer** and then **Finish**. Select **OK** to close the Add/Remove Snap-In page.
172
176
173
-

177
+

174
178
175
-
4. Browse to **Certificates** > **Enterprise Trust** > **Certificate location**. Verify that you see your certificate on the right.
176
-
177
-
5. From the Certificate Manager Console taskbar, select **Actions** > **All Tasks** > **Export**. Select **Next**.
179
+
1. Browse to **Certificates** > **Enterprise Trust** > **Certificate location**. Verify that you see your certificate on the right.
180
+
1. From the Certificate Manager Console taskbar, select **Actions** > **All Tasks** > **Export**. Select **Next**.
178
181
179
182
> [!NOTE]
180
-
> Depending on how many Azure Stack Hub certificates you have, you may need to complete this process more than once.
183
+
> Depending on how many Azure Stack Hub certificates you have, you might need to complete this process more than once.
181
184
182
-
6. Select **Yes, Export the Private Key**, and then select **Next**.
185
+
1. Select **Yes, Export the Private Key**, and then select **Next**.
186
+
1. In the Export File Format section:
183
187
184
-
7. In the Export File Format section:
185
-
186
188
- Select **Include all certificates in the certificate if possible**.
187
189
- Select **Export all Extended Properties**.
188
190
- Select **Enable certificate privacy**.
189
191
- Select **Next**.
190
-
191
-

192
-
193
-
8. Select **Password** and provide a password for the certificates. Create a password that meets the following password complexity requirements:
194
192
195
-
* A minimum length of eight characters.
196
-
* At least three of the following characters: uppercase letter, lowercase letter, numbers from 0-9, special characters, alphabetical character that's not uppercase or lowercase.
193
+

197
194
198
-
Make note of this password. You'll use it as a deployment parameter.
195
+
1. Select **Password** and provide a password for the certificates. Create a password that meets the following password complexity requirements:
199
196
200
-
9. Select **Next**.
197
+
- A minimum length of eight characters.
198
+
- At least three of the following characters: uppercase letter, lowercase letter, numbers from 0-9, special characters, alphabetical character that's not uppercase or lowercase.
201
199
202
-
10. Choose a file name and location for the PFX file to export. Select **Next**.
200
+
Make a note of this password. You use it later as a deployment parameter.
203
201
204
-
11. Select **Finish**.
202
+
1. Select **Next**.
203
+
1. Choose a file name and location for the PFX file to export. Select **Next**.
0 commit comments