You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/general/private-link-service.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,10 +46,10 @@ You can create a new key vault with the [Azure portal](../general/quick-create-p
46
46
47
47
After configuring the key vault basics, select the Networking tab and follow these steps:
48
48
49
-
1.Select the Private Endpoint radio button in the Networking tab.
50
-
1. Select the "+ Add" Button to add a private endpoint.
49
+
1.Disable public access by toggling off the radio button.
50
+
1. Select the "+ Create a private endpoint" Button to add a private endpoint.
51
51
52
-

52
+

53
53
54
54
1. In the "Location" field of the Create Private Endpoint Blade, select the region in which your virtual network is located.
55
55
1. In the "Name" field, create a descriptive name that will allow you to identify this private endpoint.
@@ -102,7 +102,7 @@ There are four provisioning states:
102
102
1. In the search bar, type in "key vaults"
103
103
1. Select the key vault that you want to manage.
104
104
1. Select the "Networking" tab.
105
-
1. If there are any connections that are pending, you will see a connection listed with "Pending" in the provisioning state.
105
+
1. If there are any connections that are pending, you'll see a connection listed with "Pending" in the provisioning state.
106
106
1. Select the private endpoint you wish to approve
107
107
1. Select the approve button.
108
108
1. If there are any private endpoint connections you want to reject, whether it's a pending request or existing connection, select the connection and select the "Reject" button.
@@ -199,7 +199,7 @@ Open the command line and run the following command:
199
199
nslookup <your-key-vault-name>.vault.azure.net
200
200
```
201
201
202
-
If you run the ns lookup command to resolve the IP address of a key vault over a public endpoint, you will see a result that looks like this:
202
+
If you run the ns lookup command to resolve the IP address of a key vault over a public endpoint, you'll see a result that looks like this:
1. You can check and fix this in Azure portal. Open the Key Vault resource, and select the Networking option.
229
229
2. Then select the Private endpoint connections tab.
230
230
3. Make sure connection state is Approved and provisioning state is Succeeded.
231
-
4. You may also navigate to the private endpoint resource and review same properties there, and double-check that the virtual network matches the one you are using.
231
+
4. You may also navigate to the private endpoint resource and review same properties there, and double-check that the virtual network matches the one you're using.
232
232
233
233
* Check to make sure you have a Private DNS Zone resource.
234
234
1. You must have a Private DNS Zone resource with the exact name: privatelink.vaultcore.azure.net.
235
235
2. To learn how to set this up please see the following link. [Private DNS Zones](../../dns/private-dns-privatednszone.md)
236
236
237
-
* Check to make sure the Private DNS Zone is linked to the Virtual Network. This may be the issue if you are still getting the public IP address returned.
238
-
1. If the Private Zone DNS is not linked to the virtual network, the DNS query originating from the virtual network will return the public IP address of the key vault.
237
+
* Check to make sure the Private DNS Zone is linked to the Virtual Network. This may be the issue if you're still getting the public IP address returned.
238
+
1. If the Private Zone DNS isn't linked to the virtual network, the DNS query originating from the virtual network will return the public IP address of the key vault.
239
239
2. Navigate to the Private DNS Zone resource in the Azure portal and select the virtual network links option.
240
240
4. The virtual network that will perform calls to the key vault must be listed.
241
241
5. If it's not there, add it.
242
242
6. For detailed steps, see the following document [Link Virtual Network to Private DNS Zone](../../dns/private-dns-getstarted-portal.md#link-the-virtual-network)
243
243
244
-
* Check to make sure the Private DNS Zone is not missing an A record for the key vault.
244
+
* Check to make sure the Private DNS Zone isn't missing an A record for the key vault.
245
245
1. Navigate to the Private DNS Zone page.
246
-
2. Select Overview and check if there is an A record with the simple name of your key vault (i.e. fabrikam). Do not specify any suffix.
246
+
2. Select Overview and check if there's an A record with the simple name of your key vault (i.e. fabrikam). Don't specify any suffix.
247
247
3. Make sure you check the spelling, and either create or fix the A record. You can use a TTL of 600 (10 mins).
248
248
4. Make sure you specify the correct private IP address.
4. The link will show the Overview of the NIC resource, which contains the property Private IP address.
255
255
5. Verify that this is the correct IP address that is specified in the A record.
256
256
257
-
* If you are connecting from an on-prem resource to a Key Vault, ensure you have all required conditional forwarders in the on-prem environment enabled.
258
-
1. Review [Azure Private Endpoint DNS configuration](../../private-link/private-endpoint-dns.md#azure-services-dns-zone-configuration) for the zones needed, and make sure you have conditional forwarders for both `vault.azure.net` and `vaultcore.azure.net` on your on-prem DNS.
257
+
* If you're connecting from an on-premises resource to a Key Vault, ensure you have all required conditional forwarders in the on-premises environment enabled.
258
+
1. Review [Azure Private Endpoint DNS configuration](../../private-link/private-endpoint-dns.md#azure-services-dns-zone-configuration) for the zones needed, and make sure you have conditional forwarders for both `vault.azure.net` and `vaultcore.azure.net` on your on-premises DNS.
259
259
2. Ensure that you have conditional forwarders for those zones that route to an [Azure Private DNS Resolver](../../dns/dns-private-resolver-overview.md) or some other DNS platform with access to Azure resolution.
0 commit comments