Skip to content

Commit c642aac

Browse files
Merge pull request #210097 from jennyhunter-msft/patch-3
Update Bastion support details
2 parents 4499c85 + e51cac5 commit c642aac

File tree

1 file changed

+2
-3
lines changed

1 file changed

+2
-3
lines changed

includes/resource-manager-create-rmpl.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,11 @@ Private links enable you to access Azure services over a private endpoint in you
1111
Private link provides the following security benefits:
1212

1313
* **Private Access** - users can manage resources from a private network via a private endpoint.
14-
* **Data exfiltration** - users are denied access to resources not included in the scope.
1514

1615
> [!NOTE]
1716
> Azure Kubernetes Service (AKS) currently doesn't support the ARM private endpoint implementation.
1817
>
19-
> Azure Bastion doesn't support private DNS zones, which are a recommended configuration for your private endpoint. Enabling a private DNS zone will cause your Bastion instance to stop working.
18+
> Azure Bastion doesn't support private links. It is recommended to use a private DNS zone for your resource management private link private endpoint configuration, but due to the overlap with the management.azure.com name, your Bastion instance will stop working. For more information, view [Azure Bastion FAQ](../articles/bastion/bastion-faq.md#dns).
2019
2120
## Understand architecture
2221

@@ -56,4 +55,4 @@ To set up the private link for resource management, you need the following acces
5655

5756
* Owner on the subscription. This access is needed to create resource management private link resource.
5857
* Owner or Contributor at the root management group. This access is needed to create the private link association resource.
59-
* The Global Administrator for the Azure Active Directory doesn't automatically have permission to assign roles at the root management group. To enable creating resource management private links, the Global Administrator must have permission to read root management group and [elevate access](../articles/role-based-access-control/elevate-access-global-admin.md) to have User Access Administrator permission on all subscriptions and management groups in the tenant. After you get the User Access Administrator permission, the Global Administrator must grant Owner or Contributor permission at the root management group to the user creating the private link association.
58+
* The Global Administrator for the Azure Active Directory doesn't automatically have permission to assign roles at the root management group. To enable creating resource management private links, the Global Administrator must have permission to read root management group and [elevate access](../articles/role-based-access-control/elevate-access-global-admin.md) to have User Access Administrator permission on all subscriptions and management groups in the tenant. After you get the User Access Administrator permission, the Global Administrator must grant Owner or Contributor permission at the root management group to the user creating the private link association.

0 commit comments

Comments
 (0)