Skip to content

Commit a2b14c2

Browse files
committed
Update set up article
1 parent f88e058 commit a2b14c2

File tree

7 files changed

+16
-16
lines changed

7 files changed

+16
-16
lines changed

articles/app-service/app-service-ip-restrictions.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: madsd
66
ms.assetid: 3be1f4bd-8a81-4565-8a56-528c037b24bd
77
ms.topic: article
88
ms.custom: devx-track-azurepowershell, devx-track-azurecli
9-
ms.date: 10/05/2022
9+
ms.date: 01/25/2024
1010
ms.author: madsd
1111
---
1212
# Set up Azure App Service access restrictions
@@ -19,7 +19,7 @@ When a request is made to your app, the FROM address is evaluated against the ru
1919

2020
The access restriction capability is implemented in the App Service front-end roles, which are upstream of the worker hosts where your code runs. Therefore, access restrictions are effectively network access-control lists (ACLs).
2121

22-
The ability to restrict access to your web app from an Azure virtual network is enabled by [service endpoints][serviceendpoints]. With service endpoints, you can restrict access to a multi-tenant service from selected subnets. It doesn't work to restrict traffic to apps that are hosted in an App Service Environment. If you're in an App Service Environment, you can control access to your app by applying IP address rules.
22+
The ability to restrict access to your web app from an Azure virtual network uses [service endpoints][serviceendpoints]. With service endpoints, you can restrict access to a multitenant service from selected subnets. It doesn't work to restrict traffic to apps that are hosted in an App Service Environment. If you're in an App Service Environment, you can control access to your app by applying IP address rules.
2323

2424
> [!NOTE]
2525
> The service endpoints must be enabled both on the networking side and for the Azure service that they're being enabled with. For a list of Azure services that support service endpoints, see [Virtual Network service endpoints](../virtual-network/virtual-network-service-endpoints-overview.md).
@@ -29,7 +29,7 @@ The ability to restrict access to your web app from an Azure virtual network is
2929

3030
## Manage access restriction rules in the portal
3131

32-
To add an access restriction rule to your app, do the following:
32+
To add an access restriction rule to your app, do the following steps:
3333

3434
1. Sign in to the Azure portal.
3535

@@ -60,9 +60,9 @@ You must have at least the following Role-based access control permissions on th
6060

6161
**only required when adding a virtual network (service endpoint) rule.*
6262

63-
***only required if you are updating access restrictions through Azure portal.*
63+
***only required if you're updating access restrictions through Azure portal.*
6464

65-
If you're adding a service endpoint-based rule and the virtual network is in a different subscription than the app, you must ensure that the subscription with the virtual network is registered for the Microsoft.Web resource provider. You can explicitly register the provider [by following this documentation](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider), but it will also automatically be registered when creating the first web app in a subscription.
65+
If you're adding a service endpoint-based rule and the virtual network is in a different subscription than the app, you must ensure that the subscription with the virtual network is registered for the Microsoft.Web resource provider. You can explicitly register the provider [by following this documentation](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider), but it is also automatically registered when creating the first web app in a subscription.
6666

6767
### Add an access restriction rule
6868

@@ -79,7 +79,7 @@ On the **Add Access Restriction** pane, when you create a rule, do the following
7979
1. Optionally, enter a name and description of the rule.
8080
1. In the **Priority** box, enter a priority value.
8181
1. In the **Type** drop-down list, select the type of rule. The different types of rules are described in the following sections.
82-
1. After typing in the rule specific input select **Save** to save the changes.
82+
1. Select **Save** after typing in the rule specific input to save the changes.
8383

8484
> [!NOTE]
8585
> - There is a limit of 512 access restriction rules. If you require more than 512 access restriction rules, we suggest that you consider installing a standalone security product, such as Azure Front Door, Azure App Gateway, or an alternative WAF.
@@ -102,9 +102,9 @@ Specify the **IP Address Block** in Classless Inter-Domain Routing (CIDR) notati
102102

103103
Specify the **Subscription**, **Virtual Network**, and **Subnet** drop-down lists, matching what you want to restrict access to.
104104

105-
By using service endpoints, you can restrict access to selected Azure virtual network subnets. If service endpoints aren't already enabled with Microsoft.Web for the subnet that you selected, they'll be automatically enabled unless you select the **Ignore missing Microsoft.Web service endpoints** check box. The scenario where you might want to enable service endpoints on the app but not the subnet depends mainly on whether you have the permissions to enable them on the subnet.
105+
By using service endpoints, you can restrict access to selected Azure virtual network subnets. If service endpoints aren't already enabled with Microsoft.Web for the subnet that you selected, they are automatically enabled unless you select the **Ignore missing Microsoft.Web service endpoints** check box. The scenario where you might want to enable service endpoints on the app but not the subnet depends mainly on whether you have the permissions to enable them on the subnet.
106106

107-
If you need someone else to enable service endpoints on the subnet, select the **Ignore missing Microsoft.Web service endpoints** check box. Your app will be configured for service endpoints in anticipation of having them enabled later on the subnet.
107+
If you need someone else to enable service endpoints on the subnet, select the **Ignore missing Microsoft.Web service endpoints** check box. Your app is configured for service endpoints in anticipation of having them enabled later on the subnet.
108108

109109
You can't use service endpoints to restrict access to apps that run in an App Service Environment. When your app is in an App Service Environment, you can control access to it by applying IP access rules.
110110

@@ -157,7 +157,7 @@ For each header name, you can add up to eight values separated by comma. The htt
157157

158158
### Multi-source rules
159159

160-
Multi-source rules allow you to combine up to eight IP ranges or eight Service Tags in a single rule. You might use this if you've more than 512 IP ranges or you want to create logical rules where multiple IP ranges are combined with a single http header filter.
160+
Multi-source rules allow you to combine up to eight IP ranges or eight Service Tags in a single rule. You might use this if you have more than 512 IP ranges or you want to create logical rules where multiple IP ranges are combined with a single http header filter.
161161

162162
Multi-source rules are defined the same way you define single-source rules, but with each range separated with comma.
163163

@@ -177,12 +177,12 @@ For a scenario where you want to explicitly block a single IP address or a block
177177

178178
### Restrict access to an SCM site
179179

180-
In addition to being able to control access to your app, you can restrict access to the SCM (Advanced tool) site that's used by your app. The SCM site is both the web deploy endpoint and the Kudu console. You can assign access restrictions to the SCM site from the app separately or use the same set of restrictions for both the app and the SCM site. When you select the **Use main site rules** check box, the rules list will be hidden, and it will use the rules from the main site. If you clear the check box, your SCM site settings will appear again.
180+
In addition to being able to control access to your app, you can restrict access to the SCM (Advanced tool) site that's used by your app. The SCM site is both the web deploy endpoint and the Kudu console. You can assign access restrictions to the SCM site from the app separately or use the same set of restrictions for both the app and the SCM site. When you select the **Use main site rules** check box, the rules list is hidden, and it uses the rules from the main site. If you clear the check box, your SCM site settings appear again.
181181

182182
:::image type="content" source="media/app-service-ip-restrictions/access-restrictions-advancedtools-browse.png" alt-text="Screenshot of the 'Access Restrictions' page in the Azure portal, showing that no access restrictions are set for the SCM site or the app.":::
183183

184184
### Restrict access to a specific Azure Front Door instance
185-
Traffic from Azure Front Door to your application originates from a well known set of IP ranges defined in the AzureFrontDoor.Backend service tag. Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from your specific instance, you'll need to further filter the incoming requests based on the unique http header that Azure Front Door sends.
185+
Traffic from Azure Front Door to your application originates from a well known set of IP ranges defined in the AzureFrontDoor.Backend service tag. Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from your specific instance, you need to further filter the incoming requests based on the unique http header that Azure Front Door sends.
186186

187187
:::image type="content" source="media/app-service-ip-restrictions/access-restrictions-frontdoor.png?v2" alt-text="Screenshot of the 'Access Restrictions' page in the Azure portal, showing how to add Azure Front Door restriction.":::
188188

@@ -230,7 +230,7 @@ You can run the following command in the [Cloud Shell](https://shell.azure.com).
230230
-HttpHeader @{'x-azure-fdid'='xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx'}
231231
```
232232

233-
### [ARM](#tab/arm)
233+
### [Azure Resource Manager](#tab/arm)
234234

235235
For ARM templates, modify the `ipSecurityRestrictions` block. A sample ARM template snippet is provided for you.
236236

@@ -336,7 +336,7 @@ You can run the following command in the [Cloud Shell](https://shell.azure.com).
336336
-Name "Ip example rule" -Priority 100 -Action Allow -IpAddress 122.133.144.0/24 -TargetScmSite
337337
```
338338

339-
### [ARM](#tab/arm)
339+
### [Azure Resource Manager](#tab/arm)
340340

341341
For ARM templates, modify the `scmIpSecurityRestrictions` block. A sample ARM template snippet is provided for you.
342342

@@ -418,7 +418,7 @@ You can run the following command in the [Cloud Shell](https://shell.azure.com).
418418
$Resource | Set-AzResource -Force
419419
```
420420

421-
### [ARM](#tab/arm)
421+
### [Azure Resource Manager](#tab/arm)
422422

423423
For ARM templates, modify the property `ipSecurityRestrictionsDefaultAction`. Accepted values for `ipSecurityRestrictionsDefaultAction` are `Allow` or `Deny`. A sample ARM template snippet is provided for you.
424424

@@ -485,7 +485,7 @@ You can run the following command in the [Cloud Shell](https://shell.azure.com).
485485
$Resource | Set-AzResource -Force
486486
```
487487

488-
### [ARM](#tab/arm)
488+
### [Azure Resource Manager](#tab/arm)
489489

490490
For ARM templates, modify the property `scmIpSecurityRestrictionsDefaultAction`. Accepted values for `scmIpSecurityRestrictionsDefaultAction` are `Allow` or `Deny`. A sample ARM template snippet is provided for you.
491491

9.74 KB
Loading
13.2 KB
Loading
2.07 KB
Loading
-36.2 KB
Loading
5.24 KB
Loading

articles/app-service/overview-access-restrictions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: App Service Access restrictions
33
description: This article provides an overview of the access restriction features in App Service
44
author: madsd
55
ms.topic: overview
6-
ms.date: 01/03/2024
6+
ms.date: 01/25/2024
77
ms.author: madsd
88
ms.custom: UpdateFrequency3
99
---

0 commit comments

Comments
 (0)