Azure Key Vault
Multicloud Defense integrates with many secret management systems offered by public cloud providers to store the private keys corresponding to the certificates to be used in TLS decryption. In this section, you can view the steps to retrieve a stored private key in Azure Key Vault for a certificate. Multicloud Defense supports retrieval of private keys through Azure Key Vault secrets.
Create Azure Key Vault and User-assigned Managed Identities
Multicloud Defense uses a user-assigned managed identity to access the Azure Key Vault secret. The following steps show how to create the Key Vault and how to grant the managed identity the necessary permissions to access the secret:
Procedure
Step 1 |
Create a new User-assigned Managed Identity. |
Step 2 |
Create a new Key Vault, for example, |
Step 3 |
In the newly created Key Vault, go to Access Policies. |
Step 4 |
Select Add Access Policy. |
Step 5 |
Assign Secret permissions: |
Step 6 |
Select Principal. |
Step 7 |
Select the Managed Identity. |
Step 8 |
Staying on the Key Vault configuration, navigate to . |
Step 9 |
Select Reader Role. |
Step 10 |
Search for the Managed Identity in the Select field and select it. |
Step 11 |
Click Save. |
Store Private Keys into Azure Key Vault Secrets
Import your private key for your secret into the secrets folder of the Azure Key Vault that you have created. Since the private key is a multi-line string, this can be imported via the Azure Cloud Shell.
Start the Azure Cloud Shell and run the following command:
az keyvault secret set --file <privatekey file> --encoding ascii --vault-name <key vault name> --name <secret name>
The key file is created by simply creating a new file with a text editor (vi) in Azure Cloud Shell, pasting the contents of the private key and saving it.
Configure Gateway with User-assigned Managed Identity
Before you begin
You need to ensure that the Multicloud Defense Gateway deployed in Azure is configured with the user-managed identity as specified in Azure Key Vault and User-assigned Managed Identities.
Procedure
Step 1 |
Copy the Resource ID of the User-assigned Managed Identity that you created. |
Step 2 |
Navigate to Managed Identities. |
Step 3 |
Click on the Managed Identity created for the Multicloud Defense Gateway. |
Step 4 |
Select Property. |
Step 5 |
Select the icon on the right side of the Resource ID field to copy the ID. |
Step 6 |
Paste this Resource ID in the Multicloud Defense Gateway configuration for your Azure Gateway under the User Assigned Identity ID field. |
Configure Multicloud Defense to Retrieve Private Key
Before you begin, ensure that the Multicloud Defense Gateway deployed in Azure is configured with the user- managed identity as specified in Azure Key Vault and User-assigned Managed Identities.
Paste the certificate body into the field associated with the private key in the Azure Key Vault secret
Once you have created the Multicloud Defense certificate, it can be used with a Decryption Profile when defining services in Multicloud Defense Controller.