Skip to content

Commit 2df3fed

Browse files
committed
Clarify app access for ILB ASE
1 parent 932bc58 commit 2df3fed

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

articles/app-service/overview-access-restrictions.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,8 @@ App access allows you to configure if access is available through the default (p
2626

2727
:::image type="content" source="media/overview-access-restrictions/app-access-portal.png" alt-text="Screenshot of app access option in Azure portal.":::
2828

29+
In the Azure Resource Manager API, app access is called `publicNetworkAccess`. In the case of ILB App Service Environment, the default entry point for apps is always internal to the virtual network. Enabling app access (`publicNetworkAccess`) does not grant direct public access to the web application; instead, it allows access from the default entry point, which corresponds to the internal IP address of the App Service Environment. If you disable app access on an ILB App Service Environment, you can only access the apps through private endpoints added to the individual apps.
30+
2931
## Site access
3032

3133
Site access restrictions let you filter the incoming requests. Site access restrictions allow you to build a list of allow and deny rules that are evaluated in priority order. It's similar to the network security group (NSG) feature in Azure networking.

0 commit comments

Comments
 (0)