Muokkaa

Jaa


Tutorial: Configure certificates for your Azure Stack Edge Pro 2

This tutorial describes how you can configure certificates for your Azure Stack Edge Pro 2 by using the local web UI.

The time taken for this step can vary depending on the specific option you choose and how the certificate flow is established in your environment.

In this tutorial, you learn about:

  • Prerequisites
  • Configure certificates for the physical device
  • Configure encryption-at-rest

Prerequisites

Before you configure and set up your Azure Stack Edge Pro 2 device, make sure that:

  • You've installed the physical device as detailed in Install Azure Stack Edge Pro 2.

  • If you plan to bring your own certificates:

    • You should have your certificates ready in the appropriate format including the signing chain certificate.
    • If your device is deployed in Azure Government and not deployed in Azure public cloud, a signing chain certificate is required before you can activate your device.

    For details on certificates, go to Prepare certificates to upload on your Azure Stack Edge device.

Configure certificates for device

  1. Open the Certificates page in the local web UI of your device. This page will display the certificates available on your device. The device is shipped with self-signed certificates, also referred to as the device certificates. You can also bring your own certificates.

  2. Follow this step only if you didn't change the device name or DNS domain when you configured device settings earlier, and you don't want to use your own certificates.

    You don't need to perform any configuration on this page. You just need to verify that the status of all the certificates shows as valid on this page.

    Screenshot of the Certificates page in the local web UI of Azure Stack Edge. The Certificates menu item is highlighted.

    You're ready to configure Encryption-at-rest with the existing device certificates.

  3. Follow the remaining steps only if you've changed the device name or the DNS domain for your device. In these instances, the status of your device certificates will be Not valid. That's because the device name and DNS domain in the certificates' subject name and subject alternative settings are out of date.

    You can select a certificate to view status details.

    Screenshot of Certificate Details for a certificate on the Certificates page in the local web UI of an Azure Stack Edge device. The selected certificate and certificate details are highlighted.

  4. If you've changed the device name or DNS domain of your device, and you don't provide new certificates, activation of the device will be blocked.To use a new set of certificates on your device, choose one of the following options:

    • Generate all the device certificates. Select this option, and then complete the steps in Generate device certificates, if you plan to use automatically generated device certificates and need to generate new device certificates. You should only use these device certificates for testing, not with production workloads.

    • Bring your own certificates. Select this option, and then do the steps in Bring your own certificates, if you want to use your own signed endpoint certificates and the corresponding signing chains. We recommend that you always bring your own certificates for production workloads.

    • You can choose to bring some of your own certificates and generate some device certificates. The Generate all the device certificates option only regenerates the device certificates.

  5. When you have a full set of valid certificates for your device, select < Back to Get started. You can now proceed to configure Encryption-at-rest.

Generate device certificates

Follow these steps to generate device certificates.

Use these steps to regenerate and download the Azure Stack Edge Pro 2 device certificates:

  1. In the local UI of your device, go to Configuration > Certificates. Select Generate certificates.

    Screenshot of the Certificates page in the local web UI of an Azure Stack Edge device. The Generate Certificates button is highlighted.

  2. In the Generate device certificates, select Generate.

    Screenshot of the Generate Certificates pane for an Azure Stack Edge device. The Generate button is highlighted.

    The device certificates are now generated and applied. It takes a few minutes to generate and apply the certificates.

    Important

    While the certificate generation operation is in progress, do not bring your own certificates and try to add those via the + Add certificate option.

    You're notified when the operation is successfully completed. To avoid any potential cache issues, restart your browser.

    Screenshot showing the notification that certificates were successfully generated on an Azure Stack Edge device.

  3. After the certificates are generated:

    • Make sure that the status of all the certificates is shown as Valid.

      Screenshot of newly generated certificates on the Certificates page of an Azure Stack Edge device. Certificates with Valid state are highlighted.

    • You can select a specific certificate name, and view the certificate details.

      Screenshot of Local web UI certificate details highlighted on the Certificates page of an Azure Stack Edge device.

    • The Download column is now populated. This column has links to download the regenerated certificates.

      Screenshot of the Certificates page on an Azure Stack Edge device. The download links for generated certificates are highlighted.

  4. Select the download link for a certificate and when prompted, save the certificate.

    Screenshot of the Certificates page on an Azure Stack Edge device. A download link has been selected. The link and the download options are highlighted.

  5. Repeat this process for all the certificates that you wish to download.

    Screenshot showing downloaded certificates in Windows File Explorer. Certificates for an Azure Stack Edge device are highlighted.

    The device generated certificates are saved as DER certificates with the following name format:

    <Device name>_<Endpoint name>.cer. These certificates contain the public key for the corresponding certificates installed on the device.

You'll need to install these certificates on the client system that you're using to access the endpoints on the Azure Stack Edge device. These certificates establish trust between the client and the device.

To import and install these certificates on the client that you're using to access the device, follow the steps in Import certificates on the clients accessing your Azure Stack Edge Pro GPU device.

If using Azure Storage Explorer, you'll need to install certificates on your client in PEM format and you'll need to convert the device generated certificates into PEM format.

Important

  • The download link is only available for the device generated certificates and not if you bring your own certificates.
  • You can decide to have a mix of device generated certificates and bring your own certificates as long as other certificate requirements are met. For more information, go to Certificate requirements.

Bring your own certificates

You can bring your own certificates.

Follow these steps to upload your own certificates including the signing chain.

  1. To upload certificate, on the Certificate page, select + Add certificate.

    Screenshot of the Add Certificate pane in the local web UI of an Azure Stack Edge device. The Certificates menu item, Plus Add Certificate button, and Add Certificate pane are highlighted.

  2. You can skip this step if you included all certificates in the certificate path when you exported certificates in .pfx format. If you didn't include all certificates in your export, upload the signing chain, and then select Validate & add. You need to do this before you upload your other certificates.

    In some cases, you may want to bring a signing chain alone for other purposes - for example, to connect to your update server for Windows Server Update Services (WSUS).

    Screenshot of the Add Certificate pane for a Signing Chain certificate in the local web UI of an Azure Stack Edge device. The certificate type, certificate entries, and Validate And Add button are highlighted.

  3. Upload other certificates. For example, you can upload the Azure Resource Manager and Blob storage endpoint certificates.

    Screenshot of the Add Certificate pane for endpoints for an Azure Stack Edge device. The certificate type and certificate entries are highlighted.

    You can also upload the local web UI certificate. After you upload this certificate, you'll be required to start your browser and clear the cache. You'll then need to connect to the device local web UI.

    Local web UI "Certificates" page 7

    You can also upload the node certificate.

    Screenshot of the Add Certificate pane for the Local Web UI certificate for an Azure Stack Edge device. The certificate type and certificate entries highlighted.

    The certificate page should update to reflect the newly added certificates. At any time, you can select a certificate and view the details to ensure that these match with the certificate that you uploaded.

    Screenshot of the Add Certificate pane for a node certificate for an Azure Stack Edge device. The certificate type and certificate entries highlighted.

    Note

    Except for Azure public cloud, signing chain certificates are needed to be brought in before activation for all cloud configurations (Azure Government or Azure Stack).

Configure encryption-at-rest

  1. On the Security tile, select Configure for encryption-at-rest.

    Note

    This is a required setting and until this is successfully configured, you can't activate the device.

    At the factory, once the devices are imaged, the volume level BitLocker encryption is enabled. After you receive the device, you need to configure the encryption-at-rest. The storage pool and volumes are recreated and you can provide BitLocker keys to enable encryption-at-rest and thus create a second layer of encryption for your data-at-rest.

  2. In the Encryption-at-rest pane, provide a 32 character long Base-64 encoded key. This is a one-time configuration and this key is used to protect the actual encryption key. You can choose to automatically generate this key.

    Screenshot of the local web UI "Encryption at rest" pane wit system generated key.

    You can also enter your own Base-64 encoded ASE-256 bit encryption key.

    Screenshot of the local web UI "Encryption at rest" pane with bring your own key.

    The key is saved in a key file on the Cloud details page after the device is activated.

  3. Select Apply. This operation takes several minutes and the status of operation is displayed.

    Screenshot of the "Double encryption at rest" notification.

  4. After the status shows as Completed, your device is now ready to be activated. Select < Back to Get started.

Next steps

In this tutorial, you learn about:

  • Prerequisites
  • Configure certificates for the physical device
  • Configure encryption-at-rest

To learn how to activate your Azure Stack Edge Pro 2 device, see: