Skip to content

Commit 037cf7b

Browse files
Merge pull request #261596 from darkoa-msft/master
Added Device Update for IoT Hub to the list of services supporting private endpoint.
2 parents fac7627 + 9067a8e commit 037cf7b

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

articles/private-link/private-endpoint-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,7 @@ A private-link resource is the destination target of a specified private endpoin
118118
| Azure Synapse Analytics | Microsoft.Synapse/workspaces | Sql, SqlOnDemand, Dev |
119119
| Azure Virtual Desktop - host pools | Microsoft.DesktopVirtualization/hostpools | connection |
120120
| Azure Virtual Desktop - workspaces | Microsoft.DesktopVirtualization/workspaces | feed<br />global |
121+
| Device Update for IoT Hub | Microsoft.DeviceUpdate/accounts | DeviceUpdate |
121122
| Microsoft Purview | Microsoft.Purview/accounts | account |
122123
| Microsoft Purview | Microsoft.Purview/accounts | portal |
123124
| Power BI | Microsoft.PowerBI/privateLinkServicesForPowerBI | Power BI |
@@ -129,7 +130,7 @@ A private-link resource is the destination target of a specified private endpoin
129130
130131
## Network security of private endpoints
131132

132-
When you use private endpoints, traffic is secured to a private-link resource. The platform validates network connections, allowing only those that reach the specified private-link resource. To access more subresources within the same Azure service, more private endpoints with corresponding targets are required. In the case of Azure Storage, for instance, you would need separate private endpoints to access the _file_ and _blob_ subresources.
133+
When you use private endpoints, traffic is secured to a private-link resource. The platform validates network connections, allowing only those that reach the specified private-link resource. To access more subresources within the same Azure service, more private endpoints with corresponding targets are required. In the case of Azure Storage, for instance, you would need separate private endpoints to access the *file* and *blob* subresources.
133134

134135
Private endpoints provide a privately accessible IP address for the Azure service, but do not necessarily restrict public network access to it. All other Azure services require additional [access controls](../event-hubs/event-hubs-ip-filtering.md), however. These controls provide an extra network security layer to your resources, providing protection that helps prevent access to the Azure service associated with the private-link resource.
135136

0 commit comments

Comments
 (0)