You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/common/storage-network-security-resource-instances.md
+7-13Lines changed: 7 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Grant Access to Azure Storage from Resource Instances
2
+
title: Create an resource instance network rule for Azure Storage
3
3
description: Configure the Azure Storage firewall to accept requests from from resource instances.
4
4
services: storage
5
5
author: normesta
@@ -11,17 +11,13 @@ ms.author: normesta
11
11
12
12
---
13
13
14
-
# Configure Azure Storage to accept requests from resource instances
14
+
# Create an resource instance network rule for Azure Storage
15
15
16
-
Put something here.
16
+
You can enable traffic from specific Azure resource instances by creating a *resource instance network rule*.
17
17
18
-
<aid="grant-access-specific-instances"></a>
18
+
Resource instance network rules can be added together with other network rules to control traffic to the storage account. To learn more, see [Azure Storage firewall and virtual network rules](storage-network-security.md).
19
19
20
-
## Grant access from Azure resource instances
21
-
22
-
In some cases, an application might depend on Azure resources that can't be isolated through a virtual network or an IP address rule. But you still want to secure and restrict storage account access to only your application's Azure resources. You can configure storage accounts to allow access to specific resource instances of trusted Azure services by creating a resource instance rule.
23
-
24
-
The Azure role assignments of the resource instance determine the types of operations that a resource instance can perform on storage account data. Resource instances must be from the same tenant as your storage account, but they can belong to any subscription in the tenant.
20
+
## Create a resource instance network rule
25
21
26
22
### [Portal](#tab/azure-portal)
27
23
@@ -147,8 +143,6 @@ az storage account network-rule list \
147
143
148
144
---
149
145
146
+
## See also
150
147
151
-
## Next steps
152
-
153
-
- Learn more about [Azure network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
154
-
- Dig deeper into [security recommendations for Azure Blob storage](../blobs/security-recommendations.md).
148
+
-[Azure Storage firewall and virtual network rules](storage-network-security.md)
Copy file name to clipboardExpand all lines: articles/storage/common/storage-network-security.md
+13-8Lines changed: 13 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Configure Azure Storage firewalls and virtual networks
2
+
title: Azure Storage firewall and virtual network rules
3
3
description: Configure layered network security for your storage account by using the Azure Storage firewall.
4
4
services: storage
5
5
author: normesta
@@ -11,7 +11,7 @@ ms.author: normesta
11
11
12
12
---
13
13
14
-
# Configure Azure Storage firewalls and virtual networks
14
+
# Azure Storage firewall and virtual network rules
15
15
16
16
You can disable public network access to your storage account, and permit traffic only if it originates from sources that you specify. Sources can include [Azure Virtual Network](../../virtual-network/virtual-networks-overview.md) subnets, public IP address ranges, specific Azure resource instances or traffic from trusted Azure services. Clients that make requests from allowed sources must also meet the authorization requirements of the storage account. To learn more about account authorization, see [Authorize access to data in Azure Storage](../common/authorize-data-access.md).
17
17
@@ -72,9 +72,9 @@ To allow access to your service resources, you must allow these public IP addres
72
72
73
73
## Azure resource instances
74
74
75
-
Some Azure resources can't be isolated through a virtual network or IP address rule. You can enable traffic from those resources by creating a *resource instance rule*. The Azure role assignments of the resource instance determine the types of operations that a resource instance can perform on storage account data. Resource instances must be from the same tenant as your storage account, but they can belong to any subscription in the tenant.
75
+
Some Azure resources can't be isolated through a virtual network or IP address rule. You can enable traffic from those resources by creating a *resource instance network rule*. The Azure role assignments of the resource instance determine the types of operations that a resource instance can perform on storage account data. Resource instances must be from the same tenant as your storage account, but they can belong to any subscription in the tenant.
76
76
77
-
To learn how to configure a resource instance rule, see [Configure Azure Storage to accept requests from resource instances](storage-network-security-resource-instances.md).
77
+
To learn how to configure a resource instance rule, see [Create an resource instance network rule for Azure Storage](storage-network-security-resource-instances.md).
@@ -88,15 +88,20 @@ To learn how to configure a resource instance rule, see [Configure Azure Storage
88
88
89
89
If you need to enable traffic from an Azure service outside of the network boundary, you can add a *network security exception*. This can be useful in cases where an Azure service operates from a network that you can't include in your virtual network or IP network rules. For example, some services might need to read resource logs and metrics in your account. You can allow read access for the log files, metrics tables, or both by creating a network rule exception. These services connect to your storage account by using strong authentication.
90
90
91
-
To learn more about how to add a network security exception, see [Manage Network security exceptions](storage-network-security-manage-exceptions.md).
91
+
To learn more about how to add a network security exception, see [Manage network security exceptions](storage-network-security-manage-exceptions.md).
92
92
93
93
For a complete list of Azure services you can enable traffic for, see [Trusted Azure services](storage-network-security-trusted-azure-services.md).
94
94
95
95
## Restrictions and considerations
96
96
97
97
Before implementing network security for your storage accounts, make sure to review all restrictions and considerations. For a complete list, see [Restrictions and limitations for Azure Storage firewall and virtual network configuration](storage-network-security-limitations.md).
98
98
99
-
## Next steps
99
+
## See also
100
100
101
-
- Learn more about [Azure network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
102
-
- Dig deeper into [security recommendations for Azure Blob storage](../blobs/security-recommendations.md).
0 commit comments