Hi @GP ,
Thanks for reaching out!
I believe this is a limitation of IIS Application Request Routing (ARR).
From my understanding, ARR does not support selecting or loading a client certificate from the Windows Certificate Store when proxying requests to a backend over HTTPS.
When ARR is configured to use a client certificate, it only allows specifying a certificate file path and password, which means it can only use file-based certificates that include the private key (for example, a PFX file).
Because of this, ARR cannot use certificates that must remain in the Windows Certificate Store or certificates with non-exportable private keys.
Perhaps you could try these suggestions:
- Export the certificate (with private key) to a PFX file and configure ARR to use it.
- Use a different reverse proxy that supports loading client certificates from the Windows Certificate Store.
- Terminate mutual TLS before ARR (for example, at a gateway or load balancer) and forward requests to ARR over standard HTTPS.
I also found a post regarding this issue, maybe you could find some useful information in it:
Disclaimer: This is a non-Microsoft website. The page appears to be providing accurate, safe information. Watch out for ads on the site that may advertise products frequently classifies as a PUP (Potentially Unwanted Products). Thoroughly research any product advertised on the site before you decide to download and install it.
Hope this helps!