You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/howto-custom-domain.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ In addition to the default domain that the Azure Web PubSub service provides, yo
24
24
25
25
Before you can add a custom domain, add a matching custom certificate. A custom certificate is a resource of your instance of Web PubSub. It references a certificate in your key vault. For security and compliance, Web PubSub doesn't permanently store your certificate. Instead, it fetches the certificate from your key vault and keeps it in memory.
26
26
27
-
### Step 1: Grant your Web PubSub resource access to the key vault
27
+
### Grant your Web PubSub resource access to the key vault
28
28
29
29
Azure Web PubSub Service uses Managed Identity to access your Key Vault. In order to authorize, it needs to be granted permissions.
30
30
@@ -53,7 +53,7 @@ Azure Web PubSub Service uses Managed Identity to access your Key Vault. In orde
53
53
54
54
Depending on how you configure your Azure Key Vault permissions model, you might need to grant permissions at different locations in the Azure portal.
If you use a key vault built-in access policy as a key vault permissions model:
59
59
@@ -105,7 +105,7 @@ If you're using Azure role-based access control as Key Vault permission model:
105
105
106
106
-----
107
107
108
-
### Step 2: Create a custom certificate
108
+
### Create a custom certificate
109
109
110
110
1. In the Azure portal, go to your Web PubSub resource.
111
111
1. On the left menu, select **Custom domain**.
@@ -114,7 +114,7 @@ If you're using Azure role-based access control as Key Vault permission model:
114
114
:::image type="content" alt-text="Screenshot of custom certificate management." source="media\howto-custom-domain\portal-custom-certificate-management.png" :::
115
115
116
116
1. Enter a name for the custom certificate.
117
-
1.Select**Select from your Key Vault** to choose a key vault certificate. After you select a key vault, values for **Key Vault Base URI** and **Key Vault Secret Name** are automatically added. You also have to option to edit these fields manually.
117
+
1.Choose**Select from your Key Vault** to choose a key vault certificate. After you select a key vault, values for **Key Vault Base URI** and **Key Vault Secret Name** are automatically added. You also have to option to edit these fields manually.
118
118
1. (Optional) To pin the certificate to a specific version, enter a value for **Key Vault Secret Version**.
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/howto-secure-network-access-control.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.date: 08/16/2024
10
10
11
11
# Configure network access control for Azure Web PubSub
12
12
13
-
Azure Web PubSub enables you to secure and control the level of access to your service endpoint, based on the request type and subset of networks used. When network rules are configured, only applications that request data over the specified set of networks can access your Web PubSub resource.
13
+
You can configure Azure Web PubSub to secure and control the level of access to your service endpoint based on the request type and subset of networks used. When network rules are configured, only applications that request data over the specified set of networks can access your Web PubSub resource.
14
14
15
15
Azure Web PubSub has a public endpoint that is accessible through the internet. You can also create a [private endpoint for your Web PubSub resource](howto-secure-private-endpoints.md). A private endpoint assigns a private IP address from your virtual network to the Web PubSub resource. It also secures all traffic between your virtual network and the Web PubSub resource over a private link. The Web PubSub network access control provides access control for both a public endpoint and for private endpoints.
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/howto-secure-private-endpoints.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ You can manage consent requests and private endpoints for your Web PubSub resour
35
35
36
36
### Connect to a private endpoint
37
37
38
-
Clients on a VNet that uses a private endpoint should use the same connection string for the Web PubSub resource that clients that connect via a public endpoint use. We rely on Domain Naming Service (DNS) resolution to automatically route the connections from the VNet to Web PubSub over a private link.
38
+
Clients on a VNet that uses a private endpoint should use the same connection string for the Web PubSub resource that clients that connect via a public endpoint use. We rely on Domain Naming System (DNS) resolution to automatically route the connections from the VNet to Web PubSub over a private link.
39
39
40
40
> [!IMPORTANT]
41
41
> Use the same connection string to connect to Web PubSub by using private endpoints as you would use for a public endpoint. Don't connect to Web PubSub by using its `privatelink` subdomain URL.
@@ -48,25 +48,25 @@ When you create a private endpoint, the DNS CNAME resource record for your Web P
48
48
49
49
When you resolve your Web PubSub resource domain name from outside the VNet with the private endpoint, it resolves to the public endpoint of the Web PubSub resource. When resolved from the VNet hosting the private endpoint, the domain name resolves to the private endpoint's IP address.
50
50
51
-
For the preceding illustrated example, the DNS resource records for the Web PubSub resource `foobar` when it's resolved from outside the VNet hosting the private endpoint:
51
+
For the preceding illustrated example, the DNS resource records for the Web PubSub resource `sample` when it's resolved from outside the VNet hosting the private endpoint:
|`sample.privatelink.webpubsub.azure.com`| A | 10.1.1.5 |
66
66
67
67
This approach gives access to Web PubSub *by using the same connection string* for clients on the VNet that hosts the private endpoints and to clients outside the VNet.
68
68
69
-
If you use a custom DNS server on your network, clients must be able to resolve the fully qualified domain name (FQDN) for the Web PubSub resource endpoint to the private endpoint IP address. You should configure your DNS server to delegate your private link subdomain to the private DNS zone for the VNet or configure the A records for `foobar.privatelink.webpubsub.azure.com`with the private endpoint IP address.
69
+
If you use a custom DNS server on your network, clients must be able to resolve the fully qualified domain name (FQDN) for the Web PubSub resource endpoint to the private endpoint IP address. You should configure your DNS server to delegate your private link subdomain to the private DNS zone for the VNet or configure the A records for `sample.privatelink.webpubsub.azure.com`to use the private endpoint IP address.
70
70
71
71
> [!TIP]
72
72
> If you use a custom or on-premises DNS server, you should configure your DNS server to resolve the Web PubSub resource name in the `privatelink` subdomain to the private endpoint IP address. You can do this by delegating the `privatelink` subdomain to the private DNS zone of the VNet or by configuring the DNS zone on your DNS server and then adding the DNS A records.
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/howto-secure-shared-private-endpoints-key-vault.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -163,7 +163,7 @@ It takes a few minutes for the approval to be propagated to Azure Web PubSub Ser
163
163
az rest --method get --uri https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.SignalRService/webpubsub/contoso-webpubsub/sharedPrivateLinkResources/func-pe?api-version=2022-08-01-preview
164
164
```
165
165
166
-
This command returns JSON. The connection state is indicated as`status` under `properties`.
166
+
This command returns JSON. The connection state is indicated in`status` under `properties`.
167
167
168
168
```json
169
169
{
@@ -185,7 +185,7 @@ When `properties.provisioningState` is `Succeeded` and `properties.status` (conn
185
185
186
186
Now you can configure features like a custom domain as you typically would. You don't have to use a special domain for your key vault. Web PubSub automatically handles Domain Name System (DNS) resolution.
187
187
188
-
## Related conte
188
+
## Related content
189
189
190
190
*[What is a private endpoint?](../private-link/private-endpoint-overview.md)
191
191
*[Configure a custom domain](howto-custom-domain.md)
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/howto-secure-shared-private-endpoints.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,7 +115,7 @@ When the shared private endpoint connection has a **Pending** status, you must a
115
115
1. On the left menu, select **Networking**.
116
116
1. Under **Inbound Traffic**, select **Private endpoints**.
117
117
1. Select the pending connection that you created in your Web PubSub resource.
118
-
1. Select **Approve** and then select **Yes** to confirm.
118
+
1. Select **Approve**, and then select **Yes** to confirm.
119
119
120
120
:::image type="content" alt-text="Screenshot of approving a private endpoint connection." source="media\howto-secure-shared-private-endpoints\portal-function-approve-private-endpoint.png" lightbox="media\howto-secure-shared-private-endpoints\portal-function-approve-private-endpoint.png" :::
121
121
@@ -172,7 +172,7 @@ It takes a few minutes for the approval to be reflected in Web PubSub. You can c
172
172
az rest --method get --uri https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.SignalRService/webPubSub/contoso-webpubsub/sharedPrivateLinkResources/func-pe?api-version=2021-06-01-preview
173
173
```
174
174
175
-
This command returns JSON. The connection state is indicated as`status` under `properties`.
175
+
This command returns JSON. The connection state is indicated in`status` under `properties`.
176
176
177
177
```json
178
178
{
@@ -196,7 +196,7 @@ At this point, the private endpoint between Azure Web PubSub and Azure Functions
196
196
197
197
## Verify that upstream calls are from a private IP
198
198
199
-
When the private endpoint is set up, you can verify that incoming calls are from a private IP address by checking the `X-Forwarded-For` header fornetwork traffic.
199
+
When the private endpoint is set up, you can verify that incoming calls are from a private IP address by checking the `X-Forwarded-For` header forupstream calls.
200
200
201
201
:::image type="content" alt-text="Screenshot of the Azure portal, showing that incoming requests are from a private IP." source="media\howto-secure-shared-private-endpoints\portal-function-log.png" :::
> Azure Web PubSub is a shared service. By allowing the `AzureWebPubSub` service tag or its associated IP address prefixes, you also allow traffic from other resources, even if they belong to other customers. Make sure that you implement appropriate authentication on your endpoints.
86
86
87
-
### Event handler endpoints of Azure Functions
87
+
### Event handler endpoints for Azure Functions
88
88
89
89
You can configure a [service tag-based rule](../app-service/app-service-ip-restrictions.md#set-a-service-tag-based-rule).
90
90
91
-
Alternatively, you can use [shared private endpoints](howto-secure-shared-private-endpoints.md) for better security. Shared private endpoints are dedicated to your resources. No traffic from other resources can access your endpoints.
91
+
Alternatively, you can use [shared private endpoints](howto-secure-shared-private-endpoints.md) for increased security. Shared private endpoints are dedicated to your resources. No traffic from other resources can access your endpoints.
92
92
93
-
### Event Hubs and Key Vault access
93
+
### Azure Event Hubs and Azure Key Vault access
94
94
95
95
We recommend that you use [shared private endpoints](howto-secure-shared-private-endpoints-key-vault.md) to help you maintain the best security.
0 commit comments