简体   繁体   中英

Azure Self hosted Gateway with client certificates

how to protect the APIs on a self hosted gateway from unauthorized use with client certificates?

The documentation on this topic is too unclear for me:

https://learn.microsoft.com/en-us/azure/api-management/api-management-howto-ca-certificates#create-custom-ca-for-self-hosted-gateway

Thanks.

  • You can validate certificates presented by the connecting client and check certificate properties against desired values using policy expressions.
  • For information about securing access to the back-end service of an API using client certificates, refer How to secure back-end services using client certificate authentication
  • To receive and verify client certificates over HTTP/2 in the Developer, Basic, Standard, or Premium tiers you must turn on the "Negotiate client certificate" setting on the "Custom domains" blade.

在此处输入图片说明

  • To receive and verify client certificates in the Consumption tier you must turn on the "Request client certificate" setting on the "Custom domains" blade.

在此处输入图片说明

the solution is to give the right common name/dns name during the creation of the certificate. After that a gateway hostname must be created inside the gatewaypanel of the self hosted gateway and the uploaded certificate addded and check the checkbox negotiate clientcertificates.

The technical post webpages of this site follow the CC BY-SA 4.0 protocol. If you need to reprint, please indicate the site URL or the original address.Any question please contact:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM