Import SSL certificates
Import SSL certs to establish secure access to the DuploCloud Portal
Last updated
Import SSL certs to establish secure access to the DuploCloud Portal
Last updated
© DuploCloud, Inc. All rights reserved. DuploCloud trademarks used herein are registered trademarks of DuploCloud and affiliates
Establish secure access to the DuploCloud portal by importing SSL certificates, and creating and configuring the certificates in DuploCloud.
If you haven't already done so, contact the DuploCloud support staff via email or by using your private Slack channel. They will provide you with everything you need to accomplish this task and assist you with other needed prerequisites to set up DuploCloud for Azure.
Contact the DuploCloud support staff via email or by using your private Slack channel to request the following for SSL certificate setup and configuration:
Security Certificate (.crt
) file
Certificate Private Key
Certificate Bundle (.crt
) containing the Intermediate and Root Certificates. You can download the Certificate Bundle from https://support.globalsign.com/ca-certificates/intermediate-certificates/alphassl-intermediate-certificates.
Because Azure supports only PFX files for SSL certificates, you must convert the CRT file that DuploCloud provides you to PFX format.
To do this, enter the following using the command line:
When running this command, you will be asked for a password to protect the PFX file. Note this password and store it in a secure place as you will need to provide it when importing the certificate to Azure KeyVault.
After you generate the PFX file, sign in to the Azure Portal and access Azure Key Vault.
Select the respective Azure Key Vault for your environment (for example, production versus test) to import the PFX file as shown below.
In Azure Key Vault, navigate to Objects -> Certificates and click Generate/Import.
When you click Generate/Import, the Create a Certificate form displays. In the Method of Certificate Creation field, select Import.
Name the Certificate, using the Certificate Name field.
Browse for a file to upload, using the Upload Certificate File field.
In the Password field, enter the password you set when you generated the PFX file.
Click Create. Even though the certificate is created, notice that the certificate is not yet successfully imported into the vault, as indicated by the No certificates available message, as shown below. To import the certificate, you must obtain the Secret Identifier ARN of this certificate and then configure it in DuploCloud.
On the Certificates page, select the certificate from the list, and open the CURRENT VERSION of the certificate, as shown below, to obtain the Secret Identifier.
You will paste the ARN when you configure the certificate in DuploCloud.
With the Secret Identifier in your Clipboard, you are now ready to configure the certificate in the DuploCloud Portal and
In the DuploCloud Portal, navigate to Administrator -> Plans.
Select the Plan to which you want to add the certificate from the Name column. The Plans page displays.
Click the Certificates tab.
Click Add. The Add a Certificate pane displays.
Enter a Name for the certificate.
Paste the Secret Identifier that you obtained from the Azure Portal (it should be in your Clipboard) into the Certificate ARN field.
Click Create.
Before attaching certificates with K8S Ingress in the DuploCloud Portal, create and configure an azure-application-gateway.
If you use Kubernetes Ingress, you can attach the certificate to the appropriate DuploCloud service in the DuploCloud portal by using the Kubernetes -> Ingress option.
In the DuploCloud Portal, navigate to Kubernetes -> Ingress.
On the Ingress page, select the Ingress instance for the azure- application-gateway.
Click the Ingress Rules tab.
From the Actions menu, select Edit.
On the Edit Kubernetes Ingress page, select the certificate that you want to attach from the Certificate ARN list box.
Click Update.
The certificate is attached to the Ingress application gateway and is available to the service.
In the Certificate Version form, copy the Secret Identifier using the Copy Icon ().