Skip to content

Commit c184c81

Browse files
committed
minor wording change
1 parent 6659fa8 commit c184c81

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/storage/common/storage-network-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ By default, storage accounts accept connections from clients on any network. You
125125
126126
## Grant access from a virtual network
127127
128-
You can configure storage accounts to allow access only from specific subnets. The allowed subnets may belong to a VNet in the same subscription or a different subscription, including those belonging to a different Azure Active Directory tenant. With global service endpoints, the allowed subnets can also be in different regions from the storage account.
128+
You can configure storage accounts to allow access only from specific subnets. The allowed subnets may belong to a VNet in the same subscription or a different subscription, including those belonging to a different Azure Active Directory tenant. With [global service endpoints](#azure-storage-global-service-endpoints), the allowed subnets can also be in different regions from the storage account.
129129
130130
You can enable a [Service endpoint](../../virtual-network/virtual-network-service-endpoints-overview.md) for Azure Storage within the VNet. The service endpoint routes traffic from the VNet through an optimal path to the Azure Storage service. The identities of the subnet and the virtual network are also transmitted with each request. Administrators can then configure network rules for the storage account that allow requests to be received from specific subnets in a VNet. Clients granted access via these network rules must continue to meet the authorization requirements of the storage account to access the data.
131131

0 commit comments

Comments
 (0)