Skip to content

Commit 76d46ad

Browse files
authored
Merge pull request #192394 from JimacoMS4/update-portal-access-with-network-options
Clarify behavior of portal with VNETs and IP filtering enabled
2 parents 016a2b7 + 4084d80 commit 76d46ad

File tree

4 files changed

+22
-8
lines changed

4 files changed

+22
-8
lines changed

articles/iot-dps/how-to-manage-enrollments.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Manage device enrollments for Azure IoT Hub Device Provisioning Service i
33
description: How to manage device enrollments for your Device Provisioning Service (DPS) in the Azure portal
44
author: kgremban
55
ms.author: kgremban
6-
ms.date: 10/25/2021
6+
ms.date: 03/21/2022
77
ms.topic: how-to
88
ms.service: iot-dps
99
services: iot-dps
@@ -19,6 +19,9 @@ The Azure IoT Device Provisioning Service supports two types of enrollments:
1919
* [Enrollment groups](concepts-service.md#enrollment-group): Used to enroll multiple related devices.
2020
* [Individual enrollments](concepts-service.md#individual-enrollment): Used to enroll a single device.
2121

22+
> [!IMPORTANT]
23+
> If you have trouble accessing enrollments from the Azure portal, it may be because you have public network access disabled or IP filtering rules configured that block access for the Azure portal. To learn more, see [Disable public network access limitations](public-network-access.md#disable-public-network-access-limitations) and [IP filter rules limitations](iot-dps-ip-filtering.md#ip-filter-rules-limitations).
24+
2225
## Create an enrollment group
2326

2427
An enrollment group is an entry for a group of devices that share a common attestation mechanism. We recommend that you use an enrollment group for a large number of devices that share an initial configuration, or for devices that go to the same tenant. Devices that use either [symmetric key](concepts-symmetric-key-attestation.md) or [X.509 certificates](concepts-x509-attestation.md) attestation are supported.

articles/iot-dps/iot-dps-ip-filtering.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,13 @@ There are two specific use-cases where it is useful to block connections to a DP
2121

2222
* You need to reject traffic from IP addresses that have been identified as suspicious by the DPS administrator.
2323

24-
>[!Note]
25-
>If IP filtering is enabled, you'll no longer be able use the Azure portal to perform service operations (i.e. managing enrollments). To perform service operations using the portal, you'll have to temporarily deactivate IP filtering, complete your work, and then re-enable the IP filtering feature. If you want to use your own clients and avoid the deactivation of the IP filter, you can choose to add your machine's IP address to the `ipFilterRules` and manage the enrollments in the DPS through CLI.
24+
## IP filter rules limitations
25+
26+
Note the following limitations if IP filtering is enabled:
27+
28+
* You might not be able to use the Azure portal to manage enrollments. If this occurs, you can add the IP address of one or more machines to the `ipFilterRules` and manage enrollments in the DPS instance from those machines with Azure CLI, PowerShell, or service APIs.
29+
30+
This scenario is most likely to happen when you want to use IP filtering to allow access only to selected IP addresses. In this case, you configure rules to enable certain addresses or address ranges and a default rule that blocks all other addresses (0.0.0.0/0). This default rule will block Azure portal from performing operations like managing enrollments on the DPS instance. For more information, see [IP filter rule evaluation](iot-dps-ip-filtering.md#ip-filter-rule-evaluation) later in this article.
2631

2732
## How filter rules are applied
2833

articles/iot-dps/public-network-access.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: kgremban
66
ms.service: iot-dps
77
services: iot-dps
88
ms.topic: conceptual
9-
ms.date: 10/18/2021
9+
ms.date: 03/21/2022
1010
---
1111

1212
# Manage public network access for your IoT Device Provisioning Service
@@ -31,9 +31,13 @@ To turn on public network access:
3131
1. Select **All networks**.
3232
2. Select **Save**.
3333

34-
## Access the DPS after disabling the public network access
34+
## Disable public network access limitations
3535

36-
After public network access is disabled, the DPS instance is accessible only through [its VNet private endpoint using Azure private link](virtual-network-support.md). This restriction includes accessing through the Azure portal.
36+
Note the following limitations when public network access is disabled:
37+
38+
- The DPS instance is accessible only through [its VNET private endpoint using Azure private link](virtual-network-support.md).
39+
40+
- You can no longer use the Azure portal to manage enrollments for the DPS instance. Instead you can manage enrollments using the Azure CLI, PowerShell, or service APIs from machines inside the virtual network(s) configured on the DPS instance. To learn more, see [Private endpoint limitations](virtual-network-support.md#private-endpoint-limitations).
3741

3842
## DPS endpoint, IP address, and ports after disabling public network access
3943

articles/iot-dps/virtual-network-support.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
ms.service: iot-dps
77
manager: lizross
88
ms.topic: conceptual
9-
ms.date: 10/06/2021
9+
ms.date: 03/21/2022
1010
ms.author: kgremban
1111
---
1212

@@ -57,7 +57,9 @@ Note the following current limitations for DPS when using private endpoints:
5757

5858
* Current DPS VNET support is for data ingress into DPS only. Data egress, which is the traffic from DPS to IoT Hub, uses an internal service-to-service mechanism rather than a dedicated VNET. Support for full VNET-based egress lockdown between DPS and IoT Hub is not currently available.
5959

60-
* The lowest latency allocation policy is used to assign a device to the IoT hub with the lowest latency. This allocation policy is not reliable in a virtual network environment.
60+
* The lowest latency allocation policy is used to assign a device to the IoT hub with the lowest latency. This allocation policy is not reliable in a virtual network environment.
61+
62+
* Enabling one or more private endpoints typically involves [disabling public access](public-network-access.md) to your DPS instance. This means that you can no longer use the Azure portal to manage enrollments. Instead you can manage enrollments using the Azure CLI, PowerShell, or service APIs from machines inside the VNET(s)/private endpoint(s) configured on the DPS instance.
6163

6264
>[!NOTE]
6365
>**Data residency consideration:**

0 commit comments

Comments
 (0)