This FAQ explains how TLS and mTLS are implemented in the RC system architecture using Azure Cross-Region Load Balancer (CR‑LB) and Standard LBs. It covers certificate placement, sample commands, renewal flow, and how the FQDN maps to the certificates.
No.
Azure Cross‑Region Load Balancer (CR‑LB) and Standard Load Balancer operate strictly at Layer 4 (TCP). They do not support:
Encrypted traffic simply passes through to the Broker unchanged.
TLS/mTLS terminates ONLY on the Broker instance.
Each Broker has its own unique server certificate matching its FQDN:
Types of certificates needed:
| Certificate | Used By | Purpose |
|---|---|---|
| Server Certificate | Broker | Authenticates Broker to Controller/Target |
| Client Certificate | Controller & Target | Authenticates clients to Broker (mTLS) |
| CA Certificate / Intermediate CA | All | Trust validation for mTLS |
CN/SAN must match the Broker hostname.
Each Broker VM/Pod retrieves from the local-region Key Vault:
Controller/Target opens outbound TCP 443 → CR‑LB → Standard LB → Broker.
Client validates:
Broker validates:
LBs do not inspect the packets.
No.
LBs are transparent TCP routers.
az keyvault certificate import --vault-name kv-us --name broker-us-1-cert --file broker-us-1.pfx --password "<pfx-password>"
az vmss identity assign --resource-group rg-us --name vmss-b1-us
az keyvault set-policy --name kv-us --object-id <MSI_OBJECT_ID> --certificate-permissions get list
az keyvault certificate import --vault-name kv-us --name broker-us-1-cert --file new-cert.pfx
Broker loads new cert on restart or via signal.
az vmss update-instances --instance-ids <ids> --resource-group rg-us --name vmss-b1-us
No.
TLS validation uses the hostname used by the client. CR‑LB IP is internal routing only.
Example:
Client connects to: broker-us-1.company.com
LB forwards traffic → Broker B1
Broker presents cert for broker-us-1.company.com
No IP-based SAN needed.
Yes.
Each Broker exposes its own hostname → each requires a certificate:
No. 100% unnecessary.
Both are TCP pass‑through devices.
Only the Broker handles TLS.
For broker-in-3.company.com:
Subject CN = broker-in-3.company.com
SAN = DNS:broker-in-3.company.com
Issuer = Your Private CA
Extended Key Usage = Server Authentication
Key Size = 2048 or 4096
LBs simply route TCP packets.