Skip to content

Commit 4adf164

Browse files
authored
Merge pull request #290934 from MicrosoftDocs/main
Publish to live, Friday 4 AM PST, 11/22
2 parents c6842a4 + 612a5d8 commit 4adf164

File tree

10 files changed

+72
-22
lines changed

10 files changed

+72
-22
lines changed

articles/app-service/networking-features.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,8 +118,14 @@ Some use cases for this feature:
118118
* Expose your app on a private IP in your virtual network.
119119
* Protect your app with a WAF.
120120

121-
Private endpoints prevent data exfiltration because the only thing you can reach across the private endpoint is the app with which it's configured.
122-
121+
Private endpoints prevent data exfiltration because the only thing you can reach across the private endpoint is the app with which it's configured.
122+
123+
### Network Security Perimeter
124+
125+
Azure [Network Security Perimeter](../private-link/network-security-perimeter-concepts.md) (NSP) is a service that provides a secure perimeter for communication of Platform as a Service (PaaS) services. These PaaS services can communicate with each other within the perimeter, and can also communicate with resources outside the perimeter using public inbound and outbound access rules.
126+
127+
NSP rule enforcement is primarily using identity-based security which cannot be fully enforced in platform services like App Services and Functions that allow you to deploy your own code and use the identity to represent the platform. If you need to communicate with PaaS services that are part of an NSP you will need to add virtual network integration to you App Service or Functions instances and communicate with the PaaS resources using private endpoints.
128+
123129
### Hybrid Connections
124130

125131
App Service Hybrid Connections enables your apps to make *outbound* calls to specified TCP endpoints. The endpoint can be on-premises, in a virtual network, or anywhere that allows outbound traffic to Azure on port 443. To use the feature, you need to install a relay agent called Hybrid Connection Manager on a Windows Server 2012 or newer host. Hybrid Connection Manager needs to be able to reach Azure Relay at port 443. You can download Hybrid Connection Manager from the App Service Hybrid Connections UI in the portal.

articles/backup/encryption-at-rest-with-cmk-for-backup-vault.md

Lines changed: 64 additions & 20 deletions
Large diffs are not rendered by default.
-68.9 KB
Loading
60.5 KB
Loading
106 KB
Loading
-41.6 KB
Loading
90.6 KB
Loading
196 KB
Loading
97.2 KB
Loading
22.2 KB
Loading

0 commit comments

Comments
 (0)