An Azure service that provides a platform-managed, scalable, and highly available application delivery controller as a service.
Hi @ Rune Gulbrandsen,
Welcome to Microsoft Q&A Platform.
Application Gateway cannot retrieve certificates from Azure Key Vault through a private endpoint. The supported configuration is to allow trusted Microsoft services to bypass the Key Vault firewall.
According to the Key Vault networking documentation, enabling “Allow trusted Microsoft services to bypass this firewall” allows specific Azure services to bypass the network restrictions applied to the Key Vault.
Please refer Allow trusted Microsoft services to bypass Key Vault firewall
As of March 15, 2021, Azure Key Vault recognizes Application Gateway as a trusted service by leveraging User-Assigned Managed Identities for authentication to Azure Key Vault. When combined with service endpoints and enabling the trusted services option in the Key Vault firewall settings, Application Gateway can successfully access certificates stored in Key Vault., Refer : Verify Firewall Permissions to Key Vault
As Jack Stromberg mentioned here: Azure Application Gateways do not resolve Private Endpoints of Keyvault
If Key Vault is being used as a backend target (part of your backend pool), specify the <yourvault>.privatelink.vaultcore.azure.net address as the fqdn for the backend target. Within your corresponding backend HTTP Setting, configure Override with new host name with the value of yes and check Override with specific domain name for Host name override. For the hostname to override, use the FQDN provided by keyvault (i.e. <yourvault>.vault.azure.net).
Please
and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.