Add certificates using the Azure portal
You can manage SSL/TSL certificates for F5 NGINX as a Service for Azure (NGINXaaS) using the Azure portal.
NGINXaaS natively integrates with Azure Key Vault (AKV), so you can bring your own certificates and manage them in a centralized location. You will need:
- 
AKV to store certificates that you want to add to the deployment.
 - 
A user or system assigned identity associated with your NGINXaaS deployment. Ensure that your Managed Identity (MI) has read access to secrets stored in AKV:
- 
If using Azure RBAC for AKV, ensure that your MI has Key Vault Secrets User or higher permissions.
 - 
If using Access Policies for AKV, ensure that your MI has GET secrets or higher permissions.
 
 - 
 - 
In addition to the MI permissions, if using the Azure portal to manage certificates, ensure that you have read access to list certificates inside the Key Vault:
- 
If using Azure RBAC for AKV, ensure that you have Key Vault Reader or higher permissions.
 - 
If using Access Policies for AKV, ensure that you have LIST certificates or higher permissions.
 - 
If public access is disabled on your key vault, configure Network Security Perimeter and add an inbound access rule to allow your client IP address.
 
 - 
 - 
If you’re unfamiliar with Azure Key Vault, check out the Azure Key Vault concepts documentation from Microsoft.
 
Before you begin, refer Azure documentation to Import a certificate to your Key Vault.
- 
Go to your NGINXaaS for Azure deployment.
 - 
Select NGINX certificates in the left menu.
 - 
Select Add certificate.
 - 
Provide the required information:
Field Description Name A unique name for the certificate. Certificate path This path can match one or more ssl_certificatedirective file arguments in your NGINX configuration.
The certificate path must be unique within the same deployment.Key path This path can match one or more ssl_certificate_keydirective file arguments in your NGINX configuration.
The key path must be unique within the same deployment.
The key path and certificate path can be the same within the certificate.- The Select certificate button will take you to a new screen where you will need to provide the following information:
 
Field Description Key vault Select from the available key vaults. Certificate Select the certificate you want to add from the previously selected key vault. If you need to create a new key vault or certificate, you can do so by selecting Create new key vault or Create new under the Key Vault and Certificate fields, respectively.
Note: If specifying an absolute file path as theCertificate pathorKey path, see the NGINX Filesystem Restrictions table for the allowed directories the file can be written to.Note: A certificate added to an NGINXaaS for Azure deployment using the Azure Portal refers to an unversioned Azure Key Vault (AKV) secret identifier. To add a certificate with a versioned AKV secret identifier, follow the documented steps with alternative Client tools for NGINXaaS for Azure. - 
Select Add certificate.
 - 
Repeat the same steps to add as many certificates as needed.
 - 
Now you can provide an NGINX configuration that references the certificate you just added by the path value.
 
- 
Go to your NGINXaaS for Azure deployment and select NGINX certificates in the left menu.
 - 
Select the name of the certificate from the list.
 - 
View the certificate details, including the certificate path, key path, thumbprint, and the certificate’s status. This view will also show in a red box any errors that occurred during the certificate fetch process.
 
- 
Go to your NGINXaaS for Azure deployment and select NGINX certificates in the left menu.
 - 
Select the checkbox next to the certificate you want to edit.
 - 
Select Edit.
 - 
Update the Name, Certificate path, Key path fields as needed.
 - 
Use the Select certificate option to update the Key vault, and Certificate fields as needed.
 - 
Select Update.
 
- 
Go to your NGINXaaS for Azure deployment and select NGINX certificates in the left menu.
 - 
Select the checkbox next to the certificate you want to delete.
 - 
Select Delete.
 - 
Confirm the delete action.
 
Warning Deleting a TLS/SSL certificate currently in-use by the NGINXaaS for Azure deployment will cause an error.