Managed SSL Integration with Azure Key Vault
Dec 13, 2024
Managed SSL Integration with Azure Key Vault
This article shows the step-by-step process of integrating Microsoft Azure Key Vault platform with GlobalSign’s Managed SSL (MSSL) service to provision SSL certificate to be accessed and utilized through the Microsoft Azure cloud platform.
Prerequisites
How to integrate Azure Key Vault with GlobalSign’s Managed SSL (MSSL)?
- Log in to Azure portal, then click "Create" if you do not have a Key Vault setup yet or would like to create a new one.
Note: If it does not auto populate you can use the search bar and it will pop up.
- In the Basics tab, enter the name of your key vault in the Name field and choose your Subscription preferences, Resource group (new or existing), Region, Pricing tier, Recovery options. Then, click “Next” to continue to the succeeding tabs.
- Choose the settings in the Access configuration, Networking, and Tags tabs according to your use case.
- Once completed, go to the "Review + Create" tab to review the details you have entered. If you want to go back and modify the information from the previous page, click on "Previous". Otherwise, click "Create" if everything looks good.
- Once your vault is created, you will be taken to the Overview home page. To proceed, click "Go to resource".
- From the Certificates home page, create a GlobalSign Certificate Authority for the vault to access. Click "Certificates" from the left-hand side menu, and on the upper right-hand side select "Certificate Authorities".
- From the Certificate Authorities page, select "Add". Under Create a certificate authority menu, enter a Name, then on the Provider drop-down, select GlobalSign. Fill out the remaining fields with your GlobalSign GCC account information.
- Once all information are saved, you will receive a notification confirming that the certificate authority has been successfully created.
How to add a new certificate to the vault?
- Go to your Key Vault and select "Certificates" in the left-hand side of the Certificates home page. Then, click “Generate/Import”.
- Choose “Generate” as the Method of Certificate Creation, then enter an easy-to-memorize name in the Certificate Name field.
Note: This name will be referred to within the vault only and it is not the common name of the actual certificate.
- Then, select “Certificate issued by an integrated CA” from the Type of Certificate Authority (CA) drop down menu.
- Click the “Certificate Authority (CA) Not Configured” tab.
- Select the GlobalSign Certificate Authority that you created. This will take you back to the Create a certificate form.
- Fill out the “Subject” field with the common name of the certificate you are requesting (Format: CN=yourdomainname.com).
There are additional fields which are optional:
- DNS Names – Where add additional Subject Alternative Names (SANs)
- Validity Period – To select how long the certificate is valid for in month designation.
- Content Type
- PKCS#12 – Private public key pair
- PEM – Public key
- Lifetime Action Type – Set certificate renewals or renewal reminders
- Advanced Policy Configuration (by default it is Not configured) – Click on it to add additional EKUs and set advanced key features as shown in the Screenshot below and click “OK” to save it.
- Click “Create”, then a pop-up message in the right corner will confirm that the certificate is being created.
Note: You can also click on the blue information bar to monitor the generation process.
- Once the Status shows Completed, it confirms that the certificate has been issued and stored in the vault. You will now able to utilize the certificate through the Azure platform.
Note: To see the list of issued Certificates, go to Certificates.