Skip to content

Commit 4ba1a49

Browse files
authored
PE no longer blocks public access for App Services
Recent changes in Azure App Service allow Azure App Services and Azure Functions with Private Link to be publicly accessed. Documentation for that topic is in the App Service docs: https://learn.microsoft.com/en-us/azure/app-service/networking/private-endpoint#conceptual-overview Quoting from those docs: "Private endpoint and public access can co-exist on an app. For more information, see overview of access restrictions" This PR updates the Private Endpoint documentation to reflect those changes. /cc @asudbring @madsd as authors for each of the statements in the docs.
1 parent 34847aa commit 4ba1a49

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/private-link/private-endpoint-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ A private-link resource is the destination target of a specified private endpoin
125125

126126
When you use private endpoints, traffic is secured to a private-link resource. The platform validates network connections, allowing only those that reach the specified private-link resource. To access additional sub-resources within the same Azure service, additional private endpoints with corresponding targets are required. In the case of Azure Storage, for instance, you would need separate private endpoints to access the _file_ and _blob_ sub-resources.
127127

128-
Private endpoints provide a privately accessible IP address for the Azure service, but do not necessarily restrict public network access to it. [Azure App Service](tutorial-private-endpoint-webapp-portal.md) and [Azure Functions](../azure-functions/functions-create-vnet.md) become inaccessible publicly when they are associated with a private endpoint. All other Azure services require additional [access controls](../event-hubs/event-hubs-ip-filtering.md), however. These controls provide an extra network security layer to your resources, providing protection that helps prevent access to the Azure service associated with the private-link resource.
128+
Private endpoints provide a privately accessible IP address for the Azure service, but do not necessarily restrict public network access to it. All other Azure services require additional [access controls](../event-hubs/event-hubs-ip-filtering.md), however. These controls provide an extra network security layer to your resources, providing protection that helps prevent access to the Azure service associated with the private-link resource.
129129

130130
Private endpoints support network policies. Network policies enable support for Network Security Groups (NSG), User Defined Routes (UDR), and Application Security Groups (ASG). For more information about enabling network policies for a private endpoint, see [Manage network policies for private endpoints](disable-private-endpoint-network-policy.md). To use an ASG with a private endpoint, see [Configure an application security group (ASG) with a private endpoint](configure-asg-private-endpoint.md).
131131

0 commit comments

Comments
 (0)