Installing CA Certificate on Azure Firewall TLS Inspection

My domain is: bravent.net

I'm trying to deploy on an Azure Firewall TLS inspection, but their requirements are to have a CA certificate with private key and 4096 bytes, so, it's possible to achieve it?

Regards,

Hello @asensionacher, welcome to the Let's Encrypt community. :slightly_smiling_face:

A great place to start debugging Let's Encrypt certificates is Let's Debug

Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.

My domain is:

I ran this command:

It produced this output:

My web server is (include version):

The operating system my web server runs on is (include version):

My hosting provider, if applicable, is:

I can login to a root shell on my machine (yes or no, or I don't know):

I'm using a control panel to manage my site (no, or provide the name and version of the control panel):

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):

Thank you for assisting us in helping YOU!

Let’s Encrypt cannot be used for TLS inspection devices.

You need to create your own Root CA, install it in the Azure firewall, and then also install that root CA in any system that you want to monitor.

That’s pretty far outside of what you’ll get help with on this forum.

6 Likes

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.