You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/mariadb/concepts-data-access-security-private-link.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,12 +5,12 @@ author: kummanish
5
5
ms.author: manishku
6
6
ms.service: mariadb
7
7
ms.topic: conceptual
8
-
ms.date: 01/05/2020
8
+
ms.date: 01/09/2020
9
9
---
10
10
11
11
# Private Link for Azure Database for MariaDB (Preview)
12
12
13
-
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. Azure Private Link essentially brings Azure services inside the customer’s private VNet. The PaaS resources can be accessed using the private IP address just like any other resource in the VNet. This significantly simplifies the network configuration by keeping access rules private.
13
+
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. Azure Private Link essentially brings Azure services inside the customer’s private VNet. The PaaS resources can be accessed using the private IP address just like any other resource in the VNet.
14
14
15
15
For a list to PaaS services that support Private Link functionality, go to the [Private Link Documentation page](https://docs.microsoft.com/azure/private-link/index). A private endpoint is a private IP address within a specific [VNet](https://docs.microsoft.com/azure/virtual-network/virtual-networks-overview) and Subnet.
16
16
@@ -19,15 +19,16 @@ For a list to PaaS services that support Private Link functionality, go to the [
19
19
20
20
## Data exfiltration prevention
21
21
22
-
Data ex-filtration in Azure Database for MariaDB is when an authorized user, such as a database admin is able extract data from one system and move it another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.
22
+
Data ex-filtration in Azure Database for MariaDB is when an authorized user, such as a database admin is able to extract data from one system and move it to another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.
23
23
24
24
Consider a scenario with a user running MariaDB workbench inside an Azure VM connecting to an Azure Database for MariaDB instance. This MariaDB instance is in the West US data center. The example below shows how to limit access with public endpoints on Azure Database for MariaDB using network access controls.
25
25
26
26
* Disable all Azure service traffic to Azure Database for MariaDB via the public endpoint by setting Allow Azure Services to OFF. Ensure no IP addresses are allowed in the server either via [firewall rules](https://docs.microsoft.com/azure/mariadb/concepts-firewall-rules) or [virtual network service endpoints](https://docs.microsoft.com/azure/mariadb/concepts-data-access-and-security-vnet).
27
27
28
-
* Only allow traffic to the Azure Database for MariaDB using the Private IP address of the VM. For more information, see the articles on Service Endpoint and VNet firewall rules.
28
+
* Only allow traffic to the Azure Database for MariaDB using the Private IP address of the VM. For more information, see the articles on [Service Endpoint](concepts-data-access-security-vnet.md) and [VNet firewall rules](howto-manage-vnet-portal.md).
29
+
30
+
* On the Azure VM, narrow down the scope of outgoing connection by using Network Security Groups (NSGs) and Service Tags as follows:
29
31
30
-
* On the Azure VM, narrow down the scope of outgoing connection by using Network Security Groups (NSGs) and Service Tags as follows
31
32
* Specify an NSG rule to allow traffic for Service Tag = SQL.WestUs - only allowing connection to Azure Database for MariaDB in West US
32
33
* Specify an NSG rule (with a higher priority) to deny traffic for Service Tag = SQL - denying connections to MariaDB Database in all regions</br></br>
33
34
@@ -41,7 +42,7 @@ When customers connect to the public endpoint from on-premises machines, their I
41
42
42
43
With Private Link, customers can enable cross-premises access to the private endpoint using ExpressRoute, private peering, or VPN tunneling. Customers can then disable all access via the public endpoint and not use the IP-based firewall to allow any IP addresses.
43
44
44
-
With Private Link, customers can enable cross-premises access to the private endpoint using Express Route (ER) private peering or VPN tunnel. They can subsequently disable all access via public endpoint and not use the IP-based firewall.
45
+
With Private Link, customers can enable cross-premises access to the private endpoint using [Express Route](https://azure.microsoft.com/services/expressroute/) (ER), private peering or [VPN tunnel](https://docs.microsoft.com/azure/vpn-gateway/). They can subsequently disable all access via public endpoint and not use the IP-based firewall.
45
46
46
47
## How to set up Private Link for Azure Database for MariaDB
Copy file name to clipboardExpand all lines: articles/mysql/concepts-data-access-security-private-link.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,12 +5,12 @@ author: kummanish
5
5
ms.author: manishku
6
6
ms.service: mysql
7
7
ms.topic: conceptual
8
-
ms.date: 01/05/2020
8
+
ms.date: 01/09/2020
9
9
---
10
10
11
11
# Private Link for Azure Database for MySQL (Preview)
12
12
13
-
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. Azure Private Link essentially brings Azure services inside the customer’s private VNet. The PaaS resources can be accessed using the private IP address just like any other resource in the VNet. This significantly simplifies the network configuration by keeping access rules private.
13
+
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. Azure Private Link essentially brings Azure services inside the customer’s private VNet. The PaaS resources can be accessed using the private IP address just like any other resource in the VNet.
14
14
15
15
For a list to PaaS services that support Private Link functionality, go to the [Private Link Documentation page](https://docs.microsoft.com/azure/private-link/index). A private endpoint is a private IP address within a specific [VNet](https://docs.microsoft.com/azure/virtual-network/virtual-networks-overview) and Subnet.
16
16
@@ -19,29 +19,30 @@ For a list to PaaS services that support Private Link functionality, go to the [
19
19
20
20
## Data exfiltration prevention
21
21
22
-
Data ex-filtration in Azure Database for MySQL is when an authorized user, such as a database admin is able extract data from one system and move it another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.
22
+
Data ex-filtration in Azure Database for MySQL is when an authorized user, such as a database admin is able to extract data from one system and move it to another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.
23
23
24
24
Consider a scenario with a user running MySQL workbench inside an Azure VM connecting to an Azure Database for MySQL. This MySQL instance is in the West US data center. The example below shows how to limit access with public endpoints on Azure Database for MySQL using network access controls.
25
25
26
26
* Disable all Azure service traffic to Azure Database for MySQL via the public endpoint by setting Allow Azure Services to OFF. Ensure no IP addresses are allowed in the server either via [firewall rules](https://docs.microsoft.com/azure/mysql/concepts-firewall-rules) or [virtual network service endpoints](https://docs.microsoft.com/azure/mysql/concepts-data-access-and-security-vnet).
27
27
28
-
* Only allow traffic to the Azure Database for MySQL using the Private IP address of the VM. For more information, see the articles on Service Endpoint and VNet firewall rules.
28
+
* Only allow traffic to the Azure Database for MySQL using the Private IP address of the VM. For more information, see the articles on [Service Endpoint](concepts-data-access-and-security-vnet.md) and [VNet firewall rules](howto-manage-vnet-using-portal.md).
29
+
30
+
* On the Azure VM, narrow down the scope of outgoing connection by using Network Security Groups (NSGs) and Service Tags as follows
29
31
30
-
* On the Azure VM, narrow down the scope of outgoing connection by using Network Security Groups (NSGs) and Service Tags as follows
31
32
* Specify an NSG rule to allow traffic for Service Tag = SQL.WestUs - only allowing connection to Azure Database for MySQL in West US
32
33
* Specify an NSG rule (with a higher priority) to deny traffic for Service Tag = SQL - denying connections to MySQL Database in all regions</br></br>
33
34
34
-
At the end of this setup, the Azure VM can connect only to Azure Database for MySQL in the West US region. However, the connectivity isn't restricted to a single Azure Database for MySQL Single server. The VM can still connect to any Azure Database for MySQL in the West US region, including the databases that aren't part of the subscription. While we've reduced the scope of data exfiltration in the above scenario to a specific region, we haven't eliminated it altogether.</br>
35
+
At the end of this setup, the Azure VM can connect only to Azure Database for MySQL in the West US region. However, the connectivity isn't restricted to a single Azure Database for MySQL. The VM can still connect to any Azure Database for MySQL in the West US region, including the databases that aren't part of the subscription. While we've reduced the scope of data exfiltration in the above scenario to a specific region, we haven't eliminated it altogether.</br>
35
36
36
-
With Private Link, customers can now set up network access controls like NSGs to restrict access to the private endpoint. Individual Azure PaaS resources are then mapped to specific private endpoints. A malicious insider can only access the mapped PaaS resource (for example an Azure Database for MySQL Single server) and no other resource.
37
+
With Private Link, customers can now set up network access controls like NSGs to restrict access to the private endpoint. Individual Azure PaaS resources are then mapped to specific private endpoints. A malicious insider can only access the mapped PaaS resource (for example an Azure Database for MySQL) and no other resource.
37
38
38
39
## On-premises connectivity over private peering
39
40
40
41
When customers connect to the public endpoint from on-premises machines, their IP address needs to be added to the IP-based firewall using a Server-level firewall rule. While this model works well for allowing access to individual machines for dev or test workloads, it's difficult to manage in a production environment.
41
42
42
43
With Private Link, customers can enable cross-premises access to the private endpoint using ExpressRoute, private peering, or VPN tunneling. Customers can then disable all access via the public endpoint and not use the IP-based firewall to allow any IP addresses.
43
44
44
-
With Private Link, customers can enable cross-premises access to the private endpoint using Express Route (ER) private peering or VPN tunnel. They can subsequently disable all access via public endpoint and not use the IP-based firewall.
45
+
With Private Link, customers can enable cross-premises access to the private endpoint using [Express Route](https://azure.microsoft.com/services/expressroute/) (ER), private peering or [VPN tunnel](https://docs.microsoft.com/azure/vpn-gateway/). They can subsequently disable all access via public endpoint and not use the IP-based firewall.
45
46
46
47
## How to set up Private Link for Azure Database for MySQL
Copy file name to clipboardExpand all lines: articles/postgresql/concepts-data-access-and-security-private-link.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,12 +5,12 @@ author: kummanish
5
5
ms.author: manishku
6
6
ms.service: postgresql
7
7
ms.topic: conceptual
8
-
ms.date: 12/23/2019
8
+
ms.date: 01/09/2020
9
9
---
10
10
11
11
# Private Link for Azure Database for PostgreSQL-Single server (Preview)
12
12
13
-
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. Azure Private Link essentially brings Azure services inside the customer’s private VNet. The PaaS resources can be accessed using the private IP address just like any other resource in the VNet. This significantly simplifies the network configuration by keeping access rules private.
13
+
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. Azure Private Link essentially brings Azure services inside the customer’s private VNet. The PaaS resources can be accessed using the private IP address just like any other resource in the VNet.
14
14
15
15
For a list to PaaS services that support Private Link functionality, go to the [Private Link Documentation page](https://docs.microsoft.com/azure/private-link/index). A private endpoint is a private IP address within a specific [VNet](https://docs.microsoft.com/azure/virtual-network/virtual-networks-overview) and Subnet.
16
16
@@ -19,15 +19,16 @@ For a list to PaaS services that support Private Link functionality, go to the [
19
19
20
20
## Data exfiltration prevention
21
21
22
-
Data ex-filtration in Azure Database for PostgreSQL Single server is when an authorized user, such as a database admin is able extract data from one system and move it another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.
22
+
Data ex-filtration in Azure Database for PostgreSQL Single server is when an authorized user, such as a database admin is able to extract data from one system and move it to another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.
23
23
24
24
Consider a scenario with a user running PostgreSQL Single server workbench inside an Azure VM connecting to an Azure Database for PostgreSQL Single server instance. This PostgreSQL Single server instance is in the West US data center. The example below shows how to limit access with public endpoints on Azure Database for PostgreSQL Single server using network access controls.
25
25
26
26
* Disable all Azure service traffic to Azure Database for PostgreSQL Single server via the public endpoint by setting Allow Azure Services to OFF. Ensure no IP addresses are allowed in the server either via [firewall rules](https://docs.microsoft.com/azure/postgresql/concepts-firewall-rules) or [virtual network service endpoints](https://docs.microsoft.com/azure/postgresql/concepts-data-access-and-security-vnet).
27
27
28
-
* Only allow traffic to the Azure Database for PostgreSQL Single server using the Private IP address of the VM. For more information, see the articles on Service Endpoint and VNet firewall rules.
28
+
* Only allow traffic to the Azure Database for PostgreSQL Single server using the Private IP address of the VM. For more information, see the articles on [Service Endpoint](concepts-data-access-and-security-vnet.md) and [VNet firewall rules.](howto-manage-vnet-using-portal.md)
29
+
30
+
* On the Azure VM, narrow down the scope of outgoing connection by using Network Security Groups (NSGs) and Service Tags as follows
29
31
30
-
* On the Azure VM, narrow down the scope of outgoing connection by using Network Security Groups (NSGs) and Service Tags as follows
31
32
* Specify an NSG rule to allow traffic for Service Tag = SQL.WestUs - only allowing connection to Azure Database for PostgreSQL Single server in West US
32
33
* Specify an NSG rule (with a higher priority) to deny traffic for Service Tag = SQL - denying connections to PostgreSQL Database in all regions</br></br>
33
34
@@ -39,7 +40,8 @@ With Private Link, customers can now set up network access controls like NSGs to
39
40
40
41
When customers connect to the public endpoint from on-premises machines, their IP address needs to be added to the IP-based firewall using a Server-level firewall rule. While this model works well for allowing access to individual machines for dev or test workloads, it's difficult to manage in a production environment.
41
42
42
-
With Private Link, customers can enable cross-premises access to the private endpoint using ExpressRoute, private peering, or VPN tunneling. Customers can then disable all access via the public endpoint and not use the IP-based firewall to allow any IP addresses.
43
+
With Private Link, customers can enable cross-premises access to the private endpoint using [Express Route](https://azure.microsoft.com/services/expressroute/) (ER), private peering or [VPN tunnel](https://docs.microsoft.com/azure/vpn-gateway/). They can subsequently disable all access via public endpoint and not use the IP-based firewall.
44
+
43
45
44
46
With Private Link, customers can enable cross-premises access to the private endpoint using Express Route (ER) private peering or VPN tunnel. They can subsequently disable all access via public endpoint and not use the IP-based firewall.
0 commit comments