An Azure service that provides a cloud content delivery network with threat protection.
Hello,
I'm experiencing the exact same issue as Mattia with Azure Front Door Premium (not Classic). I have a Sectigo wildcard certificate with a cross-signed chain for backward compatibility with legacy devices, but AFD is serving the modern self-signed root instead of the cross-signed path I uploaded.
My setup:
- Azure Front Door Premium (SKU: Premium_AzureFrontDoor)
- Certificate stored in Azure Key Vault as PFX
- PFX contains the complete cross-signed chain:
- Leaf: *.domain.com
- Intermediate: Sectigo Public Server Authentication CA DV R36
- Cross-signed Root: Sectigo Public Server Authentication Root R46 (issued by AAA Certificate Services)
- Old Root: AAA Certificate Services
What I see:
When I download the PFX from Key Vault and inspect it with openssl pkcs12 -info, it shows the correct cross-signed chain with AAA Certificate Services as the final issuer.
However, when I test with openssl s_client -connect login.domain.com:443 -showcerts, AFD is serving only 3 certificates ending with the self-signed Sectigo Root R46, completely ignoring the cross-signed path.
I need the cross-signed chain for compatibility with legacy systems that only trust the older AAA Certificate Services root (2004), not the newer Sectigo Root R46 (2021). The same certificate bundle works perfectly on nginx, serving all 4 certificates including the cross-signed root.
My question:
Mattia solved this by migrating from Front Door Classic to Front Door Standard. However, I'm already using Front Door Premium which should have even more features than Standard.
Does AFD Premium support serving custom certificate chains as uploaded, or does it automatically optimize/rebuild the chain like Classic did? If not, what are my options?
I've been working with Microsoft Support (case #2512040050001300) but haven't received a definitive answer yet on whether this is a service limitation or a configuration issue.
The documentation states "The certificate must have a complete certificate chain with leaf and intermediate certificates" but doesn't clarify whether AFD respects cross-signed certificate paths or automatically selects the "optimal" chain.
Additional context:
- Custom domain provisioning state: Succeeded
- Certificate type: CustomerCertificate
- Same PFX works correctly on nginx with full cross-signed chain
- Testing shows AFD serves the modern chain (3 certs) instead of the cross-signed chain (4 certs)
Any guidance on whether this is supported in AFD Premium is advised.
Thank you!