You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can configure rules to allow or deny specified request types for both the public network and each [private endpoint](howto-private-endpoints.md).
93
93
94
-
For example, [Server Connections](signalr-concept-internals.md#application-server-connections) are typically high-privileged. To enhance security, you may want to restrict their origin. You can configure rules to block all Server Connections from public network, and only allow they originate from a specifiec virtual network.
94
+
For example, [Server Connections](signalr-concept-internals.md#application-server-connections) are typically high-privileged. To enhance security, you may want to restrict their origin. You can configure rules to block all Server Connections from public network, and only allow they originate from a specific virtual network.
95
95
96
96
If no rule matches, the default action is applied.
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/howto-secure-network-access-control.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,28 +14,28 @@ Azure Web PubSub allows you to secure and manage access to your service endpoint
14
14
15
15
You can configure Azure Web PubSub to secure and control the level of access to your service endpoint based on the request type and subset of networks used. When network rules are configured, only applications that request data over the specified set of networks can access your Web PubSub resource.
We offer a single, unified switch to simplify the configuration of public network access. The switch has following options:
23
23
24
24
* Disabled: Completely blocks public network access. All other network access control rules are ignored for public networks.
25
25
* Enabled: Allows public network access, which is further regulated by additional network access control rules.
26
26
27
-
### [Configure Public Network Access via Portal](#tab/azure-portal)
27
+
### [Configure public network access via portal](#tab/azure-portal)
28
28
29
29
1. Go to the Azure Web PubSub instance you want to secure.
30
30
1. Select **Networking** from the left side menu. Select **Public access** tab:
31
31
32
-
:::image type="content" alt-text="Screenshot showing how to configure public network access." source="media\howto-secure-network-access-control\portal-public-network-access.png" :::
32
+
:::image type="content" alt-text="Screenshot showing how to configure public network access." source="media\howto-secure-network-access-control\portal-public-network-access.png" :::
33
33
34
34
1. Select **Disabled** or **Enabled**.
35
35
36
36
1. Select **Save** to apply your changes.
37
37
38
-
### [Configure Public Network Access via Bicep](#tab/bicep)
38
+
### [Configure public network access via bicep](#tab/bicep)
39
39
40
40
The following template disables public network access:
You can configure rules to allow or deny specified request types for both the public network and each [private endpoint](howto-secure-private-endpoints.md).
90
90
91
-
For example, [REST API calls](reference-rest-api-data-plane.md) are typically high-privileged. To enhance security, you may want to restrict their origin. You can configure rules to block all REST API calls from public network, and only allow they originate from a specifiec virtual network.
91
+
For example, [REST API calls](reference-rest-api-data-plane.md) are typically high-privileged. To enhance security, you may want to restrict their origin. You can configure rules to block all REST API calls from public network, and only allow they originate from a specific virtual network.
92
92
93
93
If no rule matches, the default action is applied.
94
94
95
-
### [Configure Request Type Rules via Portal](#tab/azure-portal)
95
+
### [Configure request type rules via portal](#tab/azure-portal)
96
96
97
97
1. Go to the Azure Web PubSub instance you want to secure.
98
98
1. Select **Network access control** from the left side menu.
99
99
100
-

100
+
:::image type="content" alt-text="Screenshot showing request type rules on portal." source="media/howto-secure-network-access-control/portal-request-type-rules.png" :::
101
101
102
102
1. To edit public network rule, select allowed types of requests under **Public network**.
103
103
104
-

104
+
:::image type="content" alt-text="Screenshot of selecting allowed request types for public network on portal." source="media/howto-secure-network-access-control/portal-public-network.png" :::
105
105
106
106
1. To edit private endpoint network rules, select allowed types of requests in each row under **Private endpoint connections**.
107
107
108
-

108
+
:::image type="content" alt-text="Screenshot of selecting allowed request types for private endpoints on portal." source="media/howto-secure-network-access-control/portal-private-endpoint.png" :::
109
109
110
110
1. Select **Save** to apply your changes.
111
111
112
-
### [Configure Request Type Rules via Bicep](#tab/bicep)
112
+
### [Configure request type rules via bicep](#tab/bicep)
113
113
114
114
The following template denies all requests from the public network except Client Connections. Additionally, it allows only REST API calls, and Trace calls from a specific private endpoint.
IP rules allow you to grant or deny access to specific public internet IP address ranges. These rules can be used to permit access for certain internet-based services and on-premises networks or to block general internet traffic.
144
144
@@ -149,7 +149,7 @@ The following restrictions apply:
149
149
* IP rules are evaluated in the order they are defined. If no rule matches, the default action is applied.
150
150
* IP rules apply only to public traffic and cannot block traffic from private endpoints.
151
151
152
-
### [Configure IP Rules via Portal](#tab/azure-portal)
152
+
### [Configure IP rules via portal](#tab/azure-portal)
153
153
154
154
1. Go to the Azure Web PubSub instance you want to secure.
155
155
1. Select **Networking** from the left side menu. Select **Access control rules** tab:
@@ -160,7 +160,7 @@ The following restrictions apply:
0 commit comments