Hi Mattia,
Thanks for your detailed question on Microsoft Q&A!
"You can use your own certificate through an integration with Azure Key Vault. Ensure your certificate is from a Microsoft Trusted CA List and has a complete certificate chain."
"The certificate must have a complete certificate chain with leaf and intermediate certificates, and root CA must be part of the Microsoft Trusted CA list."
This means that when you upload your certificate to Azure Key Vault for use by Azure Front Door:
- Your .pfx file must contain the complete chain, which includes the leaf certificate and the intermediate certificates.
- The root CA certificate should be from a Microsoft Trusted CA List, meaning it must be an officially trusted root by clients and Microsoft’s platform.
However, crucially for Azure Front Door (Classic):
- Azure Front Door Classic does not serve the root certificate from your uploaded chain.
- Azure Front Door Classic automatically rebuilds the certificate trust chain on its side based on the leaf certificate and uses the root certificates trusted and distributed by Microsoft’s global network.
- This means even if you upload a PFX with an older or custom root certificate, Front Door will ignore it and serve the root it trusts internally.
- This behavior ensures chain consistency and security across Azure’s edge nodes but restricts control over which root certificate is actually presented to clients.
If you want explicit control over the entire certificate chain, including root:
- Consider migrating from Azure Front Door Classic to Azure Front Door Standard or Premium, which support custom certificate chains with full Key Vault integration, allowing you to serve exactly the chain you upload.
I hope this helps to resolve the issue.
Thanks!