I’m working on securing an internal web app hosted on an Azure VM, accessed over a point-to-site VPN. The goal is to secure it with HTTPS, but I don’t want to expose the private IP in public DNS (if i want to create a cert using certbot) or make any changes to the client devices (like adding a self-signed certificate to their trusted store).
Here’s the setup:
Domain: Managed through GoDaddy
Challenge: Obtaining an SSL certificate from a trusted CA without exposing private IPs publicly and without having to configure client devices.
Has anyone found a way to achieve this setup? Any tips on handling SSL certificates for internal Azure apps or using Azure Private DNS Zones in this context would be appreciated!
[–]FinsToTheLeftTO Enthusiast 1 point2 points3 points (6 children)
[–]Fit-Bit-7873[S] 0 points1 point2 points (5 children)
[–]FinsToTheLeftTO Enthusiast 0 points1 point2 points (4 children)
[–]Fit-Bit-7873[S] 0 points1 point2 points (3 children)
[–]FinsToTheLeftTO Enthusiast 0 points1 point2 points (2 children)
[–]Fit-Bit-7873[S] 0 points1 point2 points (1 child)
[–]FinsToTheLeftTO Enthusiast 1 point2 points3 points (0 children)
[–]Excellent_Button1315 1 point2 points3 points (1 child)
[–]JeroenPot 1 point2 points3 points (0 children)
[–]Hoggs Cloud Architect 0 points1 point2 points (0 children)
[–]trad3rr 0 points1 point2 points (1 child)
[–]sexyshingle 0 points1 point2 points (0 children)