Skip to content

Commit 956dca7

Browse files
Add firewall explanation about azurecr.io for TLS handshake
1 parent 3827e28 commit 956dca7

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/container-registry/container-registry-firewall-access-rules.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ To pull or push images or other artifacts to an Azure container registry, a clie
1919

2020
* **Registry REST API endpoint** - Authentication and registry management operations are handled through the registry's public REST API endpoint. This endpoint is the login server name of the registry. Example: `myregistry.azurecr.io`
2121

22+
* **Registry REST API endpoint for certificates** - Azure container registry uses a wildcard SSL certificate for all subdomains. When connecting to the Azure container registry using SSL, the client must be able to download the certificate for the TLS handshake. In such case `azurecr.io` must also be accessible.
23+
2224
* **Storage (data) endpoint** - Azure [allocates blob storage](container-registry-storage.md) in Azure Storage accounts on behalf of each registry to manage the data for container images and other artifacts. When a client accesses image layers in an Azure container registry, it makes requests using a storage account endpoint provided by the registry.
2325

2426
If your registry is [geo-replicated](container-registry-geo-replication.md), a client might need to interact with the data endpoint in a specific region or in multiple replicated regions.
@@ -204,4 +206,4 @@ If you need to access Microsoft Container Registry (MCR) from behind a firewall,
204206
<!-- LINKS - Internal -->
205207

206208
[az-acr-update]: /cli/azure/acr#az_acr_update
207-
[az-acr-show-endpoints]: /cli/azure/acr#az_acr_show_endpoints
209+
[az-acr-show-endpoints]: /cli/azure/acr#az_acr_show_endpoints

0 commit comments

Comments
 (0)