Solution ideas
This article describes a solution idea. Your cloud architect can use this guidance to help visualize the major components for a typical implementation of this architecture. Use this article as a starting point to design a well-architected solution that aligns with your workload's specific requirements.
This article describes how to integrate Azure Kubernetes Service (AKS) and Azure API Management via mutual TLS (mTLS) in an architecture that provides end-to-end encryption.
API Management enables enhanced-security access to backend services through multiple mechanisms. At the transport (network) layer, API Management can present client certificates to the backend and verify the certificate that the backend server presents. In this mTLS authentication scenario, the system follows these steps:
API Management connects to the backend server. In this scenario, it connects to the ingress controller that runs in AKS.
The backend server, which is the ingress controller in AKS, presents the server certificate.
API Management validates the server certificate.
API Management presents the client certificate to the server.
The server validates the certificate presented by API Management.
The server grants access to the request that's proxied through API Management.
Download a Visio file of this architecture.
A user makes a request to the application endpoint from the internet.
Azure Application Gateway receives traffic as HTTPS and presents a public certificate that's previously loaded from Azure Key Vault to the user.
Application Gateway decrypts incoming traffic by using private keys, which offloads the SSL processing. It then performs web application firewall inspections on the unencrypted data and re-encrypts the traffic by using public keys, which helps ensure end-to-end encryption.
Application Gateway applies rules and backend settings based on the backend pool and sends traffic to the API Management backend pool over HTTPS.
API Management is deployed in internal virtual network mode and assigned a private IP address. This mode is only available in the Developer or Premium tier. API Management receives traffic over HTTPS, using custom domain PFX certificates.
Microsoft Entra ID provides authentication and applies API Management policies via OAuth. As an option, it can also perform client certificate validation. For more information, see How to secure APIs using client certificate authentication in API Management.
API Management sends traffic via HTTPS to an ingress controller for an AKS private cluster by using the client certificate that the AKS ingress controller trusts.
The AKS ingress controller receives the HTTPS traffic and verifies the client certificate that API Management presents. Most enterprise-level ingress controllers support mTLS. The AKS ingress controller responds to API Management with an SSL server certificate, which API Management validates.
The ingress controller processes TLS secrets, specifically Kubernetes Secrets, by using cert.pem and key.pem. The ingress controller decrypts traffic by using a private key, which is offloaded for efficiency. For enhanced-security secret management that's based on requirements, CSI driver integration with AKS is available.
The ingress controller re-encrypts traffic by using private keys and sends traffic over HTTPS to AKS pods. Depending on your requirements, you can configure AKS ingress as HTTPS backend or passthrough.
Application Gateway: Application Gateway is a web traffic load balancer that you can use to manage traffic to web applications. In this scenario, Application Gateway is the Layer 7 Well-Architected Framework that performs SSL termination and content inspection.
AKS: AKS provides fully managed Kubernetes clusters for deployment, scaling, and management of containerized applications. In this scenario, the backend logic and microservices are deployed in AKS.
Azure Container Registry: Container Registry is a managed private Docker registry service on Azure. You can use Container Registry to store private container images. These images are deployed to the cluster.
Microsoft Entra ID: In this scenario, the client requests can contain an OAuth 2.0 token, which API Management authorizes against Microsoft Entra ID by using the validate Microsoft Entra token policy.
Managed identities: Managed identities provide an automatically managed identity in Microsoft Entra ID for applications to use when they connect to resources that support Microsoft Entra authentication. In this scenario, you can use AKS managed identity to authenticate against backend systems such as Azure SQL Database and Azure Cosmos DB.
SQL Database: SQL Database is a fully managed and intelligent relational database service that's built for the cloud. You can use SQL Database to create a high-availability, high-performance data storage layer for your modern cloud applications. In this scenario, SQL Database is used as the data persistence layer for structured data.
Azure Cosmos DB: Azure Cosmos DB is a fully managed NoSQL database service for building and modernizing scalable, high-performance applications. In this scenario, Azure Cosmos DB is used as the data persistence layer for semi-structured data.
API Management: You can use API Management to publish APIs to your developers, partners, and employees. In this scenario, API Management is used to help provide secure and managed access to microservices and business logic hosted in AKS.
Azure Private Link: Private Link provides access to PaaS services that are hosted on Azure, so you can keep your data on the Microsoft network. In this scenario, the network connectivity from AKS to SQL Database, Azure Cosmos DB, and to Container Registry is through private links.
Key Vault: Key Vault can provide enhanced security for keys and other secrets. In this scenario, TLS certificates are stored in Key Vault.
Defender for Cloud: Defender for Cloud is a solution for cloud security posture management and cloud workload protection. It finds weak spots across your cloud configuration, helps strengthen the security of your environment, and can protect workloads across multicloud and hybrid environments from evolving threats. In this scenario, Microsoft Defender for containers scans container images deployed in Container Registry and AKS.
Azure Monitor: You can use Monitor to collect, analyze, and act on telemetry data from your Azure and on-premises environments. Monitor helps you maximize the performance and availability of your applications and proactively identify problems.
Log Analytics: You can use Log Analytics to edit and run log queries with data in Azure Monitor logs. In this scenario, diagnostic logs from various services, such as Application Gateway, AKS, API Management, SQL Database, and Azure Cosmos DB, can be sent to a Log Analytics workspace. This allows the logs to be analyzed according to specific requirements.
Application Insights: Application Insights is an extension of Azure Monitor. It provides application performance monitoring. To obtain and analyze application-level traces, you can integrate API Management and AKS containers with Application Insights.
Microsoft Sentinel: Microsoft Sentinel is a cloud-native security information and event manager platform (SIEM) that uses built-in AI to help you analyze large volumes of data. In this scenario, Microsoft Sentinel is used as the SIEM solution to enhance solution security.
Azure Bastion: Azure Bastion is a fully managed service that provides remote desktop protocol and SSH access to VMs without any exposure through public IP addresses. You can provision the service directly in your local or peered virtual network to get support for all VMs in that network. In this scenario, the private network resources are accessed through jump servers via Azure Bastion.
Azure Private DNS: You can use Private DNS to manage and resolve domain names in a virtual network without adding a custom DNS solution. In this scenario, private DNS zones are used for name resolution for API Management, Azure Cosmos DB, SQL Database, and Container Registry.
You can use this solution to integrate AKS and API Management via mTLS in an architecture that provides end-to-end encryption.
Scenarios that can benefit from this solution include:
AKS integration with API Management and Application Gateway via mTLS.
End-to-end mTLS between API Management and AKS.
High security deployments for organizations that need end-to-end TLS. For example, organizations in the financial sector can benefit from this solution.
You can use this approach to manage the following scenarios:
- Deploy API Management in internal mode and expose APIs by using Application Gateway.
- Configure mTLS and end-to-end encryption for high security and traffic over HTTPS.
- Connect to Azure PaaS services by using an enhanced security private endpoint.
- Implement Defender for Containers security.
For information about how to configure backend certificates on API Management, see Secure backend services using client certificate authentication in API Management.
You need to configure mTLS in the managed AKS ingress controller. The server certificate that AKS presents to API Management can be imported directly as a Kubernetes secret or accessed via a Key Vault secret. For information about how to configure the server certificate in an AKS managed ingress controller, see Set up a custom domain name and SSL certificate with the application routing add-on.
You can perform client certificate authentication in the ingress controller to validate the certificate that API Management presents. You need to provide the CA certificate to the AKS cluster to verify the client certificate that API Management presents. Annotations might need to be configured in the ingress controller to enforce client certificate validation by using the CA certificate. For more information, see the steps for client certificate authentication images deployed in Container Registry and a sample ingress YAML file with annotations.
This article is maintained by Microsoft. It was originally written by the following contributors.
Principal author:
- Saswat Mohanty | Senior Cloud Solution Architect
Other contributors:
- Mick Alberts | Technical Writer
- Arshad Azeem | Senior Cloud Solution Architect
- Raj Penchala | Principal Cloud Solution Architect
To see non-public LinkedIn profiles, sign in to LinkedIn.