Azure Stack Hub Multi Stamp Management
Cloud Assert HomeDocs Home
2008.1
2008.1
  • Introduction
  • Release Notes
  • Key Concepts
    • ADMIN
      • Manage Stamps
      • Updates
      • Images and Marketplace
      • Usage and Billing
      • Capacity and Infrastructure Management
      • Alerts
      • Diagnostics
      • Tenant Services
      • Email Reports
      • Offline Marketplace Download
  • INSTALLATION
    • Prerequisites
      • PKI Certificate Requirements
      • AzureStack Certification Authority certificate
      • Create SQL Server VM and necessary databases in a tenant subscription
    • Deployment
      • Install VConnect RP
      • License Activation
        • Offline Activation
      • Update Billing Resource Provider Details
      • Remove VConnect RP
      • Version Update
  • Configuration
    • Configure SMTP Settings
    • Configure Automated Emails
    • Configure Remote Machine for PowerShell Access
    • Configure Offline Marketplace Download
    • Configure a new Azure Stack Hub Stamp
      • Configure an Azure AD Stamp
      • Configure an ADFS Stamp
Powered by GitBook
On this page
  • Certificate Requirements
  • Generate Certificate Signing Request (CSR)
  • More Information
  • Additional Reference

Was this helpful?

  1. INSTALLATION
  2. Prerequisites

PKI Certificate Requirements

PreviousPrerequisitesNextAzureStack Certification Authority certificate

Last updated 4 years ago

Was this helpful?

For multi-node integrated Azure Stack Hub systems, the Cloud Assert Resource Providers (RP) need their own PKI certificate during deployment with the appropriate DNS name.

Certificate Requirements

The following list describes the certificate requirements that are needed to deploy Cloud Assert Resource Providers for Azure Stack Hub:

  • Certificates must be issued from either an internal certificate authority or a public certificate authority. If a public certificate authority is used, it must be included in the base operating system image as part of the Microsoft Trusted Root Authority Program. For the full list, see .

  • Your Azure Stack Hub infrastructure must have network access to the certificate authority's Certificate Revocation List (CRL) location published in the certificate. This CRL must be an http endpoint.

  • The use of self-signed certificates aren't supported.

  • For deployment and rotation, you can either use a Wildcard SSL certificate or a SAN certificate.

  • The certificate's PFX Encryption should be 3DES.

  • The certificate signature algorithm shouldn't be SHA1.

  • The certificate format must be PFX, as both the public and private keys are required for Cloud Assert RP installation. The private key must have the local machine key attribute set.

  • The PFX encryption must be 3DES (this encryption is default when exporting from a Windows 10 client or Windows Server 2016 certificate store).

  • The certificate pfx files must have a value "Digital Signature" and "KeyEncipherment" in its "Key Usage" field.

  • The certificate pfx files must have the values "Server Authentication (1.3.6.1.5.5.7.3.1)" and "Client Authentication (1.3.6.1.5.5.7.3.2)" in the "Enhanced Key Usage" field.

  • The certificate's "Issued to:" field must not be the same as its "Issued by:" field.

  • Password to the certificate pfx has to be a complex password. Make note of this password because you'll use it as a deployment parameter. The password must meet the following password complexity requirements:

    • A minimum length of eight characters.

    • At least three of the following characters: uppercase letter, lowercase letter, numbers from 0-9, alphabetical character that's not uppercase or lowercase, special characters except: ^ ` ~ & % *

  • Ensure that the subject names and subject alternative names in the subject alternative name extension (x509v3_config) match. The subject alternative name field lets you specify additional host names (websites, IP addresses, common names) to be protected by a single SSL certificate.

  • Certificate with the appropriate DNS name is required. Each Cloud Assert RP endpoint's DNS name is expressed in the format: <prefix>.<region>.<fqdn>

  • For your deployment, the [region] and [externalfqdn] values must match the region and external domain names that you chose for your Azure Stack Hub system. As an example, if the region name was Redmond and the external domain name was contoso.com, the DNS names would have the format <prefix>.redmond.contoso.com.

  • The required certificate subject and subject alternative names (SAN) for the Cloud Assert RPs is: *.cloudassert.<region>.<fqdn>

Self-signed certificates aren't supported.

When deploying the Cloud Assert RP in an Azure Stack Hub stamp setup in disconnected mode it is recommended to use certificates issued by an enterprise certificate authority. This is important because clients accessing Cloud Assert RP endpoints must be able to contact the certificate revocation list (CRL).

The presence of Intermediary Certificate Authorities in a certificate's chain-of-trusts is supported.

Generate Certificate Signing Request (CSR)

  • Prerequisite Certificate Attributes

    • Region name

    • External fully qualified domain name (FQDN)

    • Subject (in the format below)

  • Generate the CSR in a machine with Windows 10 or Windows Server 2016 or later

  • Create a request .INF file with the requisite certificate signing request information.

    • If you are generating a Wildcard SSL certificate, update the Subject attribute in the sample INF file by replacing the placeholder text.

    • If you are generating a SAN certificate, update the Subject and szOID_SUBJECT_ALT_NAME2 attributes in the sample INF file by replacing the placeholder text.

  • Use the certreq utility to generate the CSR by following the command below. Ensure that you specify the output CSR request file (.REQ)

    certreq -New "<Path to input CSR INF file>" "<Path to output CSR REQ file>"

More Information

Additional Reference

"E=<email address>, C=<>, O=<Organization Name>, L=<Location>, S=<State>, OU=<Organization Unit>, CN=*.cloudassert.<Azure Stack Hub External FQDN>"

Sample INF files are available . For a Wildcard SSL certificate, refer to “CSR Template - Wildcard.inf”. For a SAN certificate, refer to “CSR Template - SAN.inf”.

Review the output CSR Request file by using an online CSR decoding utility (e.g., )

Submit the .REQ file generated to your CA (either internal or public). Be sure that your CA generates certificates using your generated request that meet the described section above

For more information on PKI certificate requirements for Azure Stack Hub, refer to on the Microsoft Azure Stack Hub documentation website.

Microsoft Trusted Root Certificate Program: Participants
two-letter ISO country code
https://www.sslshopper.com/csr-decoder.html
https://docs.microsoft.com/en-us/azure-stack/operator/azure-stack-pki-certs
here
Certificate Requirements
2KB
CSR Templates.zip
archive
Sample CSR Templates