You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/common/storage-network-security.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ An application that accesses a storage account when network rules are in effect
26
26
27
27
Turning on firewall rules for your storage account blocks incoming requests for data by default, unless the requests originate from a service that operates within an Azure virtual network or from allowed public IP addresses. Requests that are blocked include those from other Azure services, from the Azure portal, and from logging and metrics services.
28
28
29
-
You can grant access to Azure services that operate from within a virtual network by allowing traffic from the subnet that hosts the service instance. You can also enable a limited number of scenarios through the exceptions mechanism described in this article. To access data from the storage account through the Azure portal, you need to be on a machine within the trusted boundary (either IP or virtual network) that you set up.
29
+
You can grant access to Azure services that operate from within a virtual network by allowing traffic from the subnet that hosts the service instance. You can also enable a limited number of scenarios through the exceptions mechanism that this article describes. To access data from the storage account through the Azure portal, you need to be on a machine within the trusted boundary (either IP or virtual network) that you set up.
@@ -168,7 +168,7 @@ If you want to enable access to your storage account from a virtual network or s
168
168
169
169
3. Check that you've chosen to allow access from **Selected networks**.
170
170
171
-
4. To grant access to a virtual network by using a new network rule, under **Virtual networks**, select **Add existing virtual network**, select the **Virtual networks** and **Subnets** options, and then select **Add**.
171
+
4. To grant access to a virtual network by using a new network rule, under **Virtual networks**, select **Add existing virtual network**. Select the **Virtual networks** and **Subnets** options, and then select **Add**.
172
172
173
173
To create a new virtual network and grant it access, select **Add new virtual network**. Provide the necessary information to create the new virtual network, and then select **Create**.
174
174
@@ -553,7 +553,7 @@ The following table lists services that can access your storage account data if
553
553
| Azure IoT Central |`Microsoft.IoTCentral/IoTApps`| Enables access to storage accounts. |
554
554
| Azure IoT Hub |`Microsoft.Devices/IotHubs`| Allows data from an IoT hub to be written to Blob Storage. [Learn more](../../iot-hub/virtual-network-support.md#egress-connectivity-from-iot-hub-to-other-azure-resources). |
0 commit comments