You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -19,7 +19,7 @@ When a request is made to your app, the FROM address is evaluated against the ru
19
19
20
20
The access restriction capability is implemented in the App Service front-end roles, which are upstream of the worker hosts where your code runs. Therefore, access restrictions are effectively network access-control lists (ACLs).
21
21
22
-
The ability to restrict access to your web app from an Azure virtual network is enabled by [service endpoints][serviceendpoints]. With service endpoints, you can restrict access to a multi-tenant service from selected subnets. It doesn't work to restrict traffic to apps that are hosted in an App Service Environment. If you're in an App Service Environment, you can control access to your app by applying IP address rules.
22
+
The ability to restrict access to your web app from an Azure virtual network uses [service endpoints][serviceendpoints]. With service endpoints, you can restrict access to a multitenant service from selected subnets. It doesn't work to restrict traffic to apps that are hosted in an App Service Environment. If you're in an App Service Environment, you can control access to your app by applying IP address rules.
23
23
24
24
> [!NOTE]
25
25
> The service endpoints must be enabled both on the networking side and for the Azure service that they're being enabled with. For a list of Azure services that support service endpoints, see [Virtual Network service endpoints](../virtual-network/virtual-network-service-endpoints-overview.md).
@@ -29,7 +29,7 @@ The ability to restrict access to your web app from an Azure virtual network is
29
29
30
30
## Manage access restriction rules in the portal
31
31
32
-
To add an access restriction rule to your app, do the following:
32
+
To add an access restriction rule to your app, do the following steps:
33
33
34
34
1. Sign in to the Azure portal.
35
35
@@ -60,9 +60,9 @@ You must have at least the following Role-based access control permissions on th
60
60
61
61
**only required when adding a virtual network (service endpoint) rule.*
62
62
63
-
***only required if you are updating access restrictions through Azure portal.*
63
+
***only required if you're updating access restrictions through Azure portal.*
64
64
65
-
If you're adding a service endpoint-based rule and the virtual network is in a different subscription than the app, you must ensure that the subscription with the virtual network is registered for the Microsoft.Web resource provider. You can explicitly register the provider [by following this documentation](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider), but it will also automatically be registered when creating the first web app in a subscription.
65
+
If you're adding a service endpoint-based rule and the virtual network is in a different subscription than the app, you must ensure that the subscription with the virtual network is registered for the Microsoft.Web resource provider. You can explicitly register the provider [by following this documentation](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider), but it is also automatically registered when creating the first web app in a subscription.
66
66
67
67
### Add an access restriction rule
68
68
@@ -79,7 +79,7 @@ On the **Add Access Restriction** pane, when you create a rule, do the following
79
79
1. Optionally, enter a name and description of the rule.
80
80
1. In the **Priority** box, enter a priority value.
81
81
1. In the **Type** drop-down list, select the type of rule. The different types of rules are described in the following sections.
82
-
1.After typing in the rule specific input select **Save** to save the changes.
82
+
1.Select **Save** after typing in the rule specific input to save the changes.
83
83
84
84
> [!NOTE]
85
85
> - There is a limit of 512 access restriction rules. If you require more than 512 access restriction rules, we suggest that you consider installing a standalone security product, such as Azure Front Door, Azure App Gateway, or an alternative WAF.
@@ -102,9 +102,9 @@ Specify the **IP Address Block** in Classless Inter-Domain Routing (CIDR) notati
102
102
103
103
Specify the **Subscription**, **Virtual Network**, and **Subnet** drop-down lists, matching what you want to restrict access to.
104
104
105
-
By using service endpoints, you can restrict access to selected Azure virtual network subnets. If service endpoints aren't already enabled with Microsoft.Web for the subnet that you selected, they'll be automatically enabled unless you select the **Ignore missing Microsoft.Web service endpoints** check box. The scenario where you might want to enable service endpoints on the app but not the subnet depends mainly on whether you have the permissions to enable them on the subnet.
105
+
By using service endpoints, you can restrict access to selected Azure virtual network subnets. If service endpoints aren't already enabled with Microsoft.Web for the subnet that you selected, they are automatically enabled unless you select the **Ignore missing Microsoft.Web service endpoints** check box. The scenario where you might want to enable service endpoints on the app but not the subnet depends mainly on whether you have the permissions to enable them on the subnet.
106
106
107
-
If you need someone else to enable service endpoints on the subnet, select the **Ignore missing Microsoft.Web service endpoints** check box. Your app will be configured for service endpoints in anticipation of having them enabled later on the subnet.
107
+
If you need someone else to enable service endpoints on the subnet, select the **Ignore missing Microsoft.Web service endpoints** check box. Your app is configured for service endpoints in anticipation of having them enabled later on the subnet.
108
108
109
109
You can't use service endpoints to restrict access to apps that run in an App Service Environment. When your app is in an App Service Environment, you can control access to it by applying IP access rules.
110
110
@@ -157,7 +157,7 @@ For each header name, you can add up to eight values separated by comma. The htt
157
157
158
158
### Multi-source rules
159
159
160
-
Multi-source rules allow you to combine up to eight IP ranges or eight Service Tags in a single rule. You might use this if you've more than 512 IP ranges or you want to create logical rules where multiple IP ranges are combined with a single http header filter.
160
+
Multi-source rules allow you to combine up to eight IP ranges or eight Service Tags in a single rule. You might use this if you have more than 512 IP ranges or you want to create logical rules where multiple IP ranges are combined with a single http header filter.
161
161
162
162
Multi-source rules are defined the same way you define single-source rules, but with each range separated with comma.
163
163
@@ -177,12 +177,12 @@ For a scenario where you want to explicitly block a single IP address or a block
177
177
178
178
### Restrict access to an SCM site
179
179
180
-
In addition to being able to control access to your app, you can restrict access to the SCM (Advanced tool) site that's used by your app. The SCM site is both the web deploy endpoint and the Kudu console. You can assign access restrictions to the SCM site from the app separately or use the same set of restrictions for both the app and the SCM site. When you select the **Use main site rules** check box, the rules list will be hidden, and it will use the rules from the main site. If you clear the check box, your SCM site settings will appear again.
180
+
In addition to being able to control access to your app, you can restrict access to the SCM (Advanced tool) site that's used by your app. The SCM site is both the web deploy endpoint and the Kudu console. You can assign access restrictions to the SCM site from the app separately or use the same set of restrictions for both the app and the SCM site. When you select the **Use main site rules** check box, the rules list is hidden, and it uses the rules from the main site. If you clear the check box, your SCM site settings appear again.
181
181
182
182
:::image type="content" source="media/app-service-ip-restrictions/access-restrictions-advancedtools-browse.png" alt-text="Screenshot of the 'Access Restrictions' page in the Azure portal, showing that no access restrictions are set for the SCM site or the app.":::
183
183
184
184
### Restrict access to a specific Azure Front Door instance
185
-
Traffic from Azure Front Door to your application originates from a well known set of IP ranges defined in the AzureFrontDoor.Backend service tag. Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from your specific instance, you'll need to further filter the incoming requests based on the unique http header that Azure Front Door sends.
185
+
Traffic from Azure Front Door to your application originates from a well known set of IP ranges defined in the AzureFrontDoor.Backend service tag. Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from your specific instance, you need to further filter the incoming requests based on the unique http header that Azure Front Door sends.
186
186
187
187
:::image type="content" source="media/app-service-ip-restrictions/access-restrictions-frontdoor.png?v2" alt-text="Screenshot of the 'Access Restrictions' page in the Azure portal, showing how to add Azure Front Door restriction.":::
188
188
@@ -230,7 +230,7 @@ You can run the following command in the [Cloud Shell](https://shell.azure.com).
For ARM templates, modify the `scmIpSecurityRestrictions` block. A sample ARM template snippet is provided for you.
342
342
@@ -418,7 +418,7 @@ You can run the following command in the [Cloud Shell](https://shell.azure.com).
418
418
$Resource | Set-AzResource -Force
419
419
```
420
420
421
-
### [ARM](#tab/arm)
421
+
### [Azure Resource Manager](#tab/arm)
422
422
423
423
For ARM templates, modify the property `ipSecurityRestrictionsDefaultAction`. Accepted values for `ipSecurityRestrictionsDefaultAction` are `Allow` or `Deny`. A sample ARM template snippet is provided for you.
424
424
@@ -485,7 +485,7 @@ You can run the following command in the [Cloud Shell](https://shell.azure.com).
485
485
$Resource | Set-AzResource -Force
486
486
```
487
487
488
-
### [ARM](#tab/arm)
488
+
### [Azure Resource Manager](#tab/arm)
489
489
490
490
For ARM templates, modify the property `scmIpSecurityRestrictionsDefaultAction`. Accepted values for `scmIpSecurityRestrictionsDefaultAction` are `Allow` or `Deny`. A sample ARM template snippet is provided for you.
0 commit comments