Skip to content

Commit 2a30b4b

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into vnet-old-review
2 parents 77b3f38 + 327cd20 commit 2a30b4b

34 files changed

+1342
-1058
lines changed

articles/active-directory/develop/multi-service-web-app-access-storage.md

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: app-service
88
ms.topic: tutorial
99
ms.workload: identity
10-
ms.date: 04/25/2021
10+
ms.date: 03/24/2023
1111
ms.author: ryanwi
1212
ms.reviewer: stsoneff
1313
ms.devlang: csharp, javascript
@@ -64,7 +64,7 @@ To create a general-purpose v2 storage account in the Azure portal, follow these
6464

6565
1. On the Azure portal menu, select **All services**. In the list of resources, enter **Storage Accounts**. As you begin typing, the list filters based on your input. Select **Storage Accounts**.
6666

67-
1. In the **Storage Accounts** window that appears, select **Add**.
67+
1. In the **Storage Accounts** window that appears, select **Create**.
6868

6969
1. Select the subscription in which to create the storage account.
7070

@@ -74,33 +74,27 @@ To create a general-purpose v2 storage account in the Azure portal, follow these
7474

7575
1. Select a location for your storage account, or use the default location.
7676

77-
1. Leave these fields set to their default values:
77+
1. For **Performance**, select the **Standard** option.
7878

79-
|Field|Value|
80-
|--|--|
81-
|Deployment model|Resource Manager|
82-
|Performance|Standard|
83-
|Account kind|StorageV2 (general-purpose v2)|
84-
|Replication|Read-access geo-redundant storage (RA-GRS)|
85-
|Access tier|Hot|
79+
1. For **Redundancy**, select the **Locally-redundant storage (LRS)** option from the dropdown.
8680

87-
1. Select **Review + Create** to review your storage account settings and create the account.
81+
1. Select **Review** to review your storage account settings and create the account.
8882

8983
1. Select **Create**.
9084

9185
To create a Blob Storage container in Azure Storage, follow these steps.
9286

9387
1. Go to your new storage account in the Azure portal.
9488

95-
1. In the left menu for the storage account, scroll to the **Blob service** section, and then select **Containers**.
89+
1. In the left menu for the storage account, scroll to the **Data storage** section, and then select **Containers**.
9690

9791
1. Select the **+ Container** button.
9892

9993
1. Type a name for your new container. The container name must be lowercase, must start with a letter or number, and can include only letters, numbers, and the dash (-) character.
10094

10195
1. Set the level of public access to the container. The default level is **Private (no anonymous access)**.
10296

103-
1. Select **OK** to create the container.
97+
1. Select **Create** to create the container.
10498

10599
# [PowerShell](#tab/azure-powershell)
106100

@@ -172,7 +166,15 @@ You need to grant your web app access to the storage account before you can crea
172166

173167
In the [Azure portal](https://portal.azure.com), go into your storage account to grant your web app access. Select **Access control (IAM)** in the left pane, and then select **Role assignments**. You'll see a list of who has access to the storage account. Now you want to add a role assignment to a robot, the app service that needs access to the storage account. Select **Add** > **Add role assignment** to open the **Add role assignment** page.
174168

175-
Assign the **Storage Blob Data Contributor** role to the **App Service** at subscription scope. For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
169+
1. In the **Assignment type** tab, select **Job function type** and then **Next**.
170+
171+
1. In the **Role** tab, select **Storage Blob Data Contributor** role from the dropdown and then select **Next**.
172+
173+
1. In the **Members** tab, select **Assign access to** -> **Managed identity** and then select **Members** -> **Select members**. In the **Select managed identities** window, find and select the managed identity created for your App Service in the **Managed identity** dropdown. Select the **Select** button.
174+
175+
1. Select **Review and assign** and then select **Review and assign** once more.
176+
177+
For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
176178

177179
Your web app now has access to your storage account.
178180

articles/active-directory/hybrid/how-to-connect-install-prerequisites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ To read more about securing your Active Directory environment, see [Best practic
5757

5858
#### Installation prerequisites
5959

60-
- Azure AD Connect must be installed on a domain-joined Windows Server 2016 or later - **note that Windows Server 2022 is not yet supported**. You can deploy Azure AD Connect on Windows Server 2016 but since Windows Server 2016 is in extended support, you may require [a paid support program](/lifecycle/policies/fixed#extended-support) if you require support for this configuration. We recommend the usage of domain joined Windows Server 2019.
60+
- Azure AD Connect must be installed on a domain-joined Windows Server 2016 or later. You can deploy Azure AD Connect on Windows Server 2016 but since Windows Server 2016 is in extended support, you may require [a paid support program](/lifecycle/policies/fixed#extended-support) if you require support for this configuration. We recommend the usage of domain joined Windows Server 2022.
6161
- The minimum .NET Framework version required is 4.6.2, and newer versions of .Net are also supported.
6262
- Azure AD Connect can't be installed on Small Business Server or Windows Server Essentials before 2019 (Windows Server Essentials 2019 is supported). The server must be using Windows Server standard or better.
6363
- The Azure AD Connect server must have a full GUI installed. Installing Azure AD Connect on Windows Server Core isn't supported.

articles/aks/load-balancer-standard.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,11 +26,9 @@ This article covers integration with a public load balancer on AKS. For internal
2626

2727
## Before you begin
2828

29-
Azure Load Balancer is available in two SKUs: *Basic* and *Standard*. The *Standard* SKU is used by default when you create an AKS cluster. The *Standard* SKU gives you access to added functionality, such as a larger backend pool, [multiple node pools](use-multiple-node-pools.md), [Availability Zones](availability-zones.md), and is [secure by default][azure-lb]. It's the recommended load balancer SKU for AKS.
30-
31-
For more information on the *Basic* and *Standard* SKUs, see [Azure Load Balancer SKU comparison][azure-lb-comparison].
32-
33-
This article assumes you have an AKS cluster with the *Standard* SKU Azure Load Balancer. If you need an AKS cluster, you can create one [using Azure CLI][aks-quickstart-cli], [Azure PowerShell][aks-quickstart-powershell], or [the Azure portal][aks-quickstart-portal].
29+
* Azure Load Balancer is available in two SKUs: *Basic* and *Standard*. The *Standard* SKU is used by default when you create an AKS cluster. The *Standard* SKU gives you access to added functionality, such as a larger backend pool, [multiple node pools](use-multiple-node-pools.md), [Availability Zones](availability-zones.md), and is [secure by default][azure-lb]. It's the recommended load balancer SKU for AKS. For more information on the *Basic* and *Standard* SKUs, see [Azure Load Balancer SKU comparison][azure-lb-comparison].
30+
* This article assumes you have an AKS cluster with the *Standard* SKU Azure Load Balancer. If you need an AKS cluster, you can create one [using Azure CLI][aks-quickstart-cli], [Azure PowerShell][aks-quickstart-powershell], or [the Azure portal][aks-quickstart-portal].
31+
* AKS manages the lifecycle and operations of agent nodes. Modifying the IaaS resources associated with the agent nodes isn't supported. An example of an unsupported operation is making manual changes to the load balancer resource group.
3432

3533
> [!IMPORTANT]
3634
> If you'd prefer to use your own gateway, firewall, or proxy to provide outbound connection, you can skip the creation of the load balancer outbound pool and respective frontend IP by using [**outbound type as UserDefinedRouting (UDR)**](egress-outboundtype.md). The outbound type defines the egress method for a cluster and defaults to type `LoadBalancer`.

articles/api-management/api-management-features.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: api-management
99
ms.topic: article
10-
ms.date: 02/07/2022
10+
ms.date: 02/06/2023
1111
ms.author: danlep
1212
---
1313

@@ -22,6 +22,7 @@ Each API Management [pricing tier](https://aka.ms/apimpricing) offers a distinct
2222
| -------------------------------------------------------------------------------------------- | ----------- | --------- | ----- | -------- | ------- |
2323
| Azure AD integration<sup>1</sup> | No | Yes | No | Yes | Yes |
2424
| Virtual Network (VNet) support | No | Yes | No | No | Yes |
25+
| Private endpoint support for inbound connections | No | Yes | Yes | Yes | Yes |
2526
| Multi-region deployment | No | No | No | No | Yes |
2627
| Availability zones | No | No | No | No | Yes |
2728
| Multiple custom domain names | No | Yes | No | No | Yes |
@@ -45,5 +46,5 @@ Each API Management [pricing tier](https://aka.ms/apimpricing) offers a distinct
4546
<sup>1</sup> Enables the use of Azure AD (and Azure AD B2C) as an identity provider for user sign in on the developer portal.<br/>
4647
<sup>2</sup> Including related functionality such as users, groups, issues, applications, and email templates and notifications.<br/>
4748
<sup>3</sup> See [Gateway overview](api-management-gateways-overview.md#feature-comparison-managed-versus-self-hosted-gateways) for a feature comparison of managed versus self-hosted gateways. In the Developer tier self-hosted gateways are limited to a single gateway node. <br/>
48-
<sup>4</sup> The following policies aren't available in the Consumption tier: rate limit by key and quota by key. <br/>
49+
<sup>4</sup> See [Gateway overview](api-management-gateways-overview.md#policies) for differences in policy support in the dedicated, consumption, and self-hosted gateways. <br/>
4950
<sup>5</sup> GraphQL subscriptions aren't supported in the Consumption tier.

articles/api-management/api-management-gateways-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: api-management
99
ms.topic: conceptual
10-
ms.date: 08/04/2022
10+
ms.date: 02/06/2023
1111
ms.author: danlep
1212
---
1313

51.5 KB
Loading

articles/api-management/private-endpoint.md

Lines changed: 35 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -1,35 +1,25 @@
11
---
2-
title: Set up private endpoint for Azure API Management Preview
3-
description: Learn how to restrict access to an Azure API Management instance by using an Azure private endpoint and Azure Private Link.
2+
title: Set up inbound private endpoint for Azure API Management
3+
description: Learn how to restrict inbound access to an Azure API Management instance by using an Azure private endpoint and Azure Private Link.
44
ms.service: api-management
55
author: dlepow
66
ms.author: danlep
77
ms.topic: how-to
8-
ms.date: 03/31/2022
8+
ms.date: 03/20/2023
99

1010
---
1111

12-
# Connect privately to API Management using a private endpoint
12+
# Connect privately to API Management using an inbound private endpoint
1313

14-
You can configure a [private endpoint](../private-link/private-endpoint-overview.md) for your API Management instance to allow clients in your private network to securely access the instance over [Azure Private Link](../private-link/private-link-overview.md).
14+
You can configure an inbound [private endpoint](../private-link/private-endpoint-overview.md) for your API Management instance to allow clients in your private network to securely access the instance over [Azure Private Link](../private-link/private-link-overview.md).
1515

16-
* The private endpoint uses an IP address from your Azure VNet address space.
16+
* The private endpoint uses an IP address from an Azure VNet in which it's hosted.
1717

1818
* Network traffic between a client on your private network and API Management traverses over the VNet and a Private Link on the Microsoft backbone network, eliminating exposure from the public internet.
1919

2020
* Configure custom DNS settings or an Azure DNS private zone to map the API Management hostname to the endpoint's private IP address.
2121

22-
:::image type="content" source="media/private-endpoint/api-management-private-endpoint.png" alt-text="Diagram that shows a secure connection to API Management using private endpoint.":::
23-
24-
With a private endpoint and Private Link, you can:
25-
26-
- Create multiple Private Link connections to an API Management instance.
27-
28-
- Use the private endpoint to send inbound traffic on a secure connection.
29-
30-
- Use policy to distinguish traffic that comes from the private endpoint.
31-
32-
- Limit incoming traffic only to private endpoints, preventing data exfiltration.
22+
:::image type="content" source="media/private-endpoint/api-management-private-endpoint.png" alt-text="Diagram that shows a secure inbound connection to API Management using private endpoint.":::
3323

3424
[!INCLUDE [api-management-private-endpoint](../../includes/api-management-private-endpoint.md)]
3525

@@ -38,9 +28,9 @@ With a private endpoint and Private Link, you can:
3828

3929
## Limitations
4030

41-
* Only the API Management instance's Gateway endpoint currently supports Private Link connections.
42-
* Each API Management instance currently supports at most 100 Private Link connections.
43-
* Connections are not supported on the [self-hosted gateway](self-hosted-gateway-overview.md).
31+
* Only the API Management instance's Gateway endpoint supports inbound Private Link connections.
32+
* Each API Management instance supports at most 100 Private Link connections.
33+
* Connections aren't supported on the [self-hosted gateway](self-hosted-gateway-overview.md).
4434

4535
## Prerequisites
4636

@@ -108,7 +98,7 @@ When you use the Azure portal to create a private endpoint, as shown in the next
10898

10999
1. In the left-hand menu, select **Network**.
110100

111-
1. Select **Private endpoint connections** > **+ Add endpoint**.
101+
1. Select **Inbound private endpoint connections** > **+ Add endpoint**.
112102

113103
:::image type="content" source="media/private-endpoint/add-endpoint-from-instance.png" alt-text="Add a private endpoint using Azure portal":::
114104

@@ -120,7 +110,8 @@ When you use the Azure portal to create a private endpoint, as shown in the next
120110
| Subscription | Select your subscription. |
121111
| Resource group | Select an existing resource group, or create a new one. It must be in the same region as your virtual network.|
122112
| **Instance details** | |
123-
| Name | Enter a name for the endpoint such as **myPrivateEndpoint**. |
113+
| Name | Enter a name for the endpoint such as *myPrivateEndpoint*. |
114+
| Network Interface Name | Enter a name for the network interface, such as *myInterface* |
124115
| Region | Select a location for the private endpoint. It must be in the same region as your virtual network. It may differ from the region where your API Management instance is hosted. |
125116

126117
1. Select the **Resource** tab or the **Next: Resource** button at the bottom of the page. The following information about your API Management instance is already populated:
@@ -132,28 +123,37 @@ When you use the Azure portal to create a private endpoint, as shown in the next
132123

133124
:::image type="content" source="media/private-endpoint/create-private-endpoint.png" alt-text="Create a private endpoint in Azure portal":::
134125

135-
1. Select the **Configuration** tab or the **Next: Configuration** button at the bottom of the screen.
126+
1. Select the **Virtual Network** tab or the **Next: Virtual Network** button at the bottom of the screen.
136127

137-
1. In **Configuration**, enter or select this information:
128+
1. In **Networking**, enter or select this information:
138129

139130
| Setting | Value |
140131
| ------- | ----- |
141-
| **Networking** | |
142132
| Virtual network | Select your virtual network. |
143133
| Subnet | Select your subnet. |
144-
| **Private DNS integration** | |
134+
| Private IP configuration | In most cases, select **Dynamically allocate IP address.** |
135+
| Application security group | Optionally select an [application security group](../virtual-network/application-security-groups.md). |
136+
137+
1. Select the **DNS** tab or the **Next: DNS** button at the bottom of the screen.
138+
139+
1. In **Private DNS integration**, enter or select this information:
140+
141+
| Setting | Value |
142+
| ------- | ----- |
145143
| Integrate with private DNS zone | Leave the default of **Yes**. |
146144
| Subscription | Select your subscription. |
147145
| Resource group | Select your resource group. |
148-
| Private DNS zones | Leave the default of **(new) privatelink.azure-api.net**.
146+
| Private DNS zones | The default value is displayed: **(new) privatelink.azure-api.net**.
149147

150-
1. Select **Review + create**.
148+
1. Select the **Tags** tab or the **Next: Tabs** button at the bottom of the screen. If you desire, enter tags to organize your Azure resources.
149+
150+
1. Select **Review + create**.
151151

152152
1. Select **Create**.
153153

154154
### List private endpoint connections to the instance
155155

156-
After the private endpoint is created, it appears in the list on the API Management instance's **Private endpoint connections** page in the portal.
156+
After the private endpoint is created, it appears in the list on the API Management instance's **Inbound private endpoint connections** page in the portal.
157157

158158
You can also use the [Private Endpoint Connection - List By Service](/rest/api/apimanagement/current-ga/private-endpoint-connection/list-by-service) REST API to list private endpoint connections to the service instance.
159159

@@ -200,9 +200,12 @@ Use the following JSON body:
200200

201201
After the private endpoint is created, confirm its DNS settings in the portal:
202202

203-
1. In the portal, navigate to the **Private Link Center**.
204-
1. Select **Private endpoints** and select the private endpoint you created.
203+
1. Navigate to your API Management service in the [Azure portal](https://portal.azure.com/).
204+
205+
1. In the left-hand menu, select **Network** > **Inbound private endpoint connections**, and select the private endpoint you created.
206+
205207
1. In the left-hand navigation, select **DNS configuration**.
208+
206209
1. Review the DNS records and IP address of the private endpoint. The IP address is a private address in the address space of the subnet where the private endpoint is configured.
207210

208211
### Test in virtual network
@@ -232,7 +235,7 @@ To connect to 'Microsoft.ApiManagement/service/my-apim-service', please use the
232235
## Next steps
233236

234237
* Use [policy expressions](api-management-policy-expressions.md#ref-context-request) with the `context.request` variable to identify traffic from the private endpoint.
235-
* Learn more about [private endpoints](../private-link/private-endpoint-overview.md) and [Private Link](../private-link/private-link-overview.md).
238+
* Learn more about [private endpoints](../private-link/private-endpoint-overview.md) and [Private Link](../private-link/private-link-overview.md), including [Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
236239
* Learn more about [managing private endpoint connections](../private-link/manage-private-endpoint.md).
237240
* [Troubleshoot Azure private endpoint connectivity problems](../private-link/troubleshoot-private-endpoint-connectivity.md).
238241
* Use a [Resource Manager template](https://azure.microsoft.com/resources/templates/api-management-private-endpoint/) to create an API Management instance and a private endpoint with private DNS integration.

0 commit comments

Comments
 (0)