Letsencrypt is a free automated service which provides you SSL certificates for free. Although the certificates are only valid for 3 months, this shouldn’t be a bottleneck as you can fully automate the certificate request and renewal. Letsencrypt comes with a python client which you can use to make a certificate request. Letsencrypt can be ran from a Linux OS.
In this blogpost I will show you how to use the Letsencrypt Vagrant box (Ubuntu vm) to authorize the certification request for your Azure website. To make this work we will setup a reverse proxy for the specific urls Letsencrypt requires for authorizing your certificate request.
For the impatient ones you can go directly to the summary.
First lets have a look on how to configure the reverse proxy on our Azure website to handle request ment for Letsencrypt. As we need to be able to have Letsencrypt access the Vagrant box from which we will invoke the certificate request I created a reverse proxy on my Azure website.
Make sure you have the file applicationHost.xtd on your Azure website in the following folder
/site. This folder also contains the folder
Make sure you have following config in your web.config, which can be found in the folder
This rewrite rule will redirect all traffic which is trying to access the path
/.well-known/acme-challenge/ to my home ip address on port 9999. In my router I have forwarded this port to the IP address of my laptop. So when I now make a request to
https://marcofranssen.nl/.well-known/acme-challenge/ it will actually go to my Letsencrypt Vagrant box which is running on my laptop (well actually not yet, keep on reading ;-)).
To make sure we can access the Vagrant box later on, we will also need to create a port forwarding rule in our router. Make sure you forward all traffic on port
9999 to port
9999 on your laptop/pc.
- external port:
- external ip:
- local port:
- local ip:
So now all requests will end up on your laptop/pc on port
So now we will make sure we have the Letsencrypt client running on this port. In order to have the Letsencrypt client we will first clone the Letsencrypt repository from github.
First thing we want to do is add the following line to the
Vagrantfile to have a port-forwarding rule so all the traffic to our host will be forwarded to the VM. Letsencrypt will try to access some files on this port later on when we do the certificate request.
Now we can simply run the command
vagrant up from the
letsencrypt folder in your bash/Powershell. This will bootup the VM. Once booted you can do
vagrant ssh to enter the VM. In the vm we will change the directory to
/vagrant, so we can access the client
The above command will create a request for a SSL certificate for the domain
marcofranssen.nl. You can find the certificate files in the following folder
As we require an
.pfx file for Azure we have to do one more step to create the
.pfx certificate file. We also want to be able to get our hands on the
pfx later on so we can upload it to Windows Azure. Therefore I add the files in the
/vagrant folder so we can grab them from our host inside the
letsencrypt folder. (The
letsencrypt folder on our host is mapped to the
/vagrant folder on our vm)
Now we have the
pfx we can upload it to Azure to put our certificate in place.
To summarize we can put all commands in a bash script so we can easily invoke it for all our Azure websites, where we put the reverse proxy in place. Place the file in your letsencrypt folder.
Unfortunately I didn’t find a way to automatically upload the certificate to Azure. Otherwise we also could have added this using curl to the script.
So basically your workflow to renew your certificates will be.
Now you can find your certificates in:
c:\letsencrypt\certificates (assuming you cloned the letsencrypt repository in
c:\). Upload them to your Azure website and you are done…
For Apache, Nginx and HAProxy you can simply put the fullchain.pem in place. I would like to challenge you to add the bash commands in place to copy paste the fullchain.pem to your webserver (Apache, Nginx, HAProxy) and reboot the webserver using the appropriate command, once you put the files in place. So for those kind of webservers you can actually have it fully automated without the need to run Letsencrypt on those servers.