Hello @Elbert ,
Welcome to Microsoft Q&A Platform. Thank you for reaching out & hope you are doing well.
I understand that you would like to know how to properly setup Azure Application Gateway with end-to-end SSL and multi-site listener for private access only.
Application Gateway v2 currently supports private IP frontend configuration only (no public IP) via public preview.
However, Preview features are not recommended for production.
For current general availability support, Application Gateway v2 supports the following combinations:
- Private IP and public IP
- Public IP only
And looks like you are using the first method of both Private IP and public IP with no listeners for the public frontend IP address and this is the correct configuration setup.
https://learn.microsoft.com/en-us/azure/application-gateway/configuration-frontend-ip
Now, coming to the end-to-end SSL configuration, I would like to share some points below:
- Certificates signed by well-known CA authorities whose CN matches the host name in the HTTP backend settings don't require any additional step for end-to-end TLS to work.
- In addition to the root certificate match, Application Gateway v2 also validates if the Host setting specified in the backend http setting matches that of the common name (CN) presented by the backend server’s TLS/SSL certificate. When trying to establish a TLS connection to the backend, Application Gateway v2 sets the Server Name Indication (SNI) extension to the Host specified in the backend http setting.
For more information, refer: https://learn.microsoft.com/en-us/answers/questions/1166561/azure-application-gateway-502-bad-gateway-error
Looking at your configuration, I see you have set "Override with new hostname" in the backend setting and are using the FQDN of the Application Gateway. In this case, the certificate should have a common name (CN) as the FQDN of the Application Gateway.
May I know what is the FQDN of the Application gateway that you are using? Is it a custom domain that you are using?
Also, what do you see in your Application gateway backend health?
Now that we are configuring SAML Authentication with Azure AD. My question is, should all the SAML URLs for saml configuration like Identifier, Reply URL, Sign on URL should now use the FQDN of the Application Gateway?
I believe so, though I'm not 100% sure about your setup and don't have expertise on Qlik Sense authentication configuration. I'm sharing a few docs that might help here:
https://learn.microsoft.com/en-us/entra/identity/app-proxy/application-proxy-application-gateway-waf
https://learn.microsoft.com/en-us/entra/identity/saas-apps/qliksense-enterprise-tutorial
Kindly let us know if the above helps or you need further assistance on this issue.
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.