Using Manifest Certification Authorization
Go Up to Install and Configure Team Server and Repository
Certificate-based authentication is recommended due to the security restrictions of password-based authentication. For this reason, Team Server allows you to enable the ability to authenticate to Azure SQL Database using service principal with manifest certificates.
You first must create the certificate before uploading it to the Azure portal.
To create a certificate
- Generate a private key using:
- openssl genrsa -out private.key 2048
- Generate a certificate signing request (CSR) using:
- openssl req -new -key private.key -out request.csr
- Self-sign the certificate, which is valid for one year:
- openssl x509 -req -in -request.csr -signkey private.key -out certificate.pem -days 365
To upload your certificate to Azure
- Go to Azure Active Directory and open App registrations.
- Open your service principal (app).
- Select Certificates & secrets > Certificates.
- Click Upload certificate, and then upload your certificate.pem file.
To convert a .pem file to .pfx, use openssl pkcs12 -export -out jdbc-certificate.pfx -inkey private.key -in certificate.pem -passout pass
- The .pfx certificate must not have a password lock.
- Establishing a connection using a certificate may take some time for validation checks. In cases where invalid credentials or certificates are provided, the connection time may be significantly longer compared to a standard connection using a service principal. This is because the system must perform additional verification steps and the server may take longer to return an error response. Overall wait time varies depending on the server's responsiveness and processing speed.
- We recommend that you set Access Token Lifetime expiry to a minimum of 7 days and a maximum preferably, but not limited to, 90 days.