Skip to content

Commit d021c70

Browse files
committed
Azure Relay: Freshness review of the first set of articles
1 parent 8868521 commit d021c70

16 files changed

+53
-51
lines changed

articles/azure-relay/authenticate-application.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Authenticate from an application - Azure Relay
33
description: This article provides information about authenticating an application with Microsoft Entra ID to access Azure Relay resources.
44
ms.topic: article
5-
ms.date: 08/10/2023
5+
ms.date: 12/10/2024
66
---
77

88
# Authenticate and authorize an application with Microsoft Entra ID to access Azure Relay entities
@@ -111,7 +111,7 @@ Here's the code from the sample that shows how to use Microsoft Entra authentica
111111
- [Add or remove Azure role assignments using the REST API](../role-based-access-control/role-assignments-rest.md)
112112
- [Add or remove Azure role assignments using Azure Resource Manager Templates](../role-based-access-control/role-assignments-template.md)
113113

114-
To learn more about Azure Relay, see the following topics.
114+
To learn more about Azure Relay, see the following articles.
115115
- [What is Relay?](relay-what-is-it.md)
116116
- [Get started with Azure Relay Hybrid connections WebSockets](relay-hybrid-connections-dotnet-get-started.md)
117117
- [Get stated with Azure Relay Hybrid connections HTTP requests](relay-hybrid-connections-http-requests-dotnet-get-started.md)

articles/azure-relay/includes/relay-create-namespace-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: spelluru
33
ms.service: azure-relay
44
ms.topic: include
5-
ms.date: 01/04/2024
5+
ms.date: 12/04/2024
66
ms.author: spelluru
77
---
88
1. Sign in to the [Azure portal].
@@ -24,7 +24,7 @@ ms.author: spelluru
2424

2525
### Get management credentials
2626

27-
1. On the **Relay** page, select **Shared access policies** on the left menu. `
27+
1. On the **Relay** page, select **Shared access policies** on the left menu.
2828
1. On the **Shared access policies** page, select **RootManageSharedAccessKey**.
2929
1. Under **SAS Policy: RootManageSharedAccessKey**, select the **Copy** button next to **Primary Connection String**. This action copies the connection string to your clipboard for later use. Paste this value into Notepad or some other temporary location.
3030
1. Repeat the preceding step to copy and paste the value of **Primary key** to a temporary location for later use.

articles/azure-relay/includes/relay-hybrid-connections-dotnet-get-started-client.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: clemensv
33
ms.service: azure-relay
44
ms.topic: include
5-
ms.date: 08/10/2023
5+
ms.date: 12/10/2024
66
ms.author: samurp
77
---
88
### Create a console application

articles/azure-relay/includes/relay-hybrid-connections-dotnet-get-started-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: clemensv
33
ms.service: azure-relay
44
ms.topic: include
5-
ms.date: 01/04/2024
5+
ms.date: 12/10/2024
66
ms.author: samurp
77
---
88

articles/azure-relay/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.topic: landing-page
1111
author: spelluru
1212
ms.author: spelluru
13-
ms.date: 08/10/2023
13+
ms.date: 12/10/2024
1414

1515
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | whats-new
1616

articles/azure-relay/ip-firewall-virtual-networks.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Configure IP firewall for Azure Relay namespace
33
description: This article describes how to Use firewall rules to allow connections from specific IP addresses to Azure Relay namespaces.
4-
ms.topic: article
5-
ms.date: 02/15/2023
4+
ms.topic: how-to
5+
ms.date: 12/10/2024
6+
# Customer intent: As an Azure Relay user, I want to know how to restrict access to an Azure Relay namespace to certain IP addresses or ranges.
67
---
78

89
# Configure IP firewall for an Azure Relay namespace
@@ -12,7 +13,7 @@ This feature is helpful in scenarios in which Azure Relay should be only accessi
1213

1314

1415
## Enable IP firewall rules
15-
The IP firewall rules are applied at the namespace level. Therefore, the rules apply to all connections from clients using any supported protocol. Any connection attempt from an IP address that does not match an allowed IP rule on the namespace is rejected as unauthorized. The response does not mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
16+
The IP firewall rules are applied at the namespace level. Therefore, the rules apply to all connections from clients using any supported protocol. Any connection attempt from an IP address that doesn't match an allowed IP rule on the namespace is rejected as unauthorized. The response doesn't mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
1617

1718
### Use Azure portal
1819
This section shows you how to use the Azure portal to create IP firewall rules for a namespace.
@@ -123,7 +124,7 @@ To deploy the template, follow the instructions for [Azure Resource Manager](../
123124

124125
[!INCLUDE [trusted-services](./includes/trusted-services.md)]
125126

126-
## Next steps
127+
## Related content
127128
To learn about other network security-related features, see [Network security](network-security.md).
128129

129130

articles/azure-relay/move-across-regions.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,16 @@
22
title: Move an Azure Relay namespace to another region
33
description: This article shows you how to move an Azure Relay namespace from the current region to another region.
44
ms.topic: how-to
5-
ms.date: 08/10/2023
5+
ms.date: 12/10/2024
66
ms.custom: subject-moving-resources
7+
# Customer intent: As an Azure Relay user, I want to know how to move a Relay namespace from one region to another region.
78
---
89

910
# Move an Azure Relay namespace to another region
1011
This article shows you how to move an Azure Relay namespace from one region to another region. Here are the high-level steps:
1112

1213
1. **Export** the Relay namespace to an Azure Resource Manager template.
13-
1. **Update location (region)** for resources in the template. Also, delete any **dynamic** WCF relays from the template.
14+
1. **Update location (region)** for resources in the template. Also, delete any **dynamic** Windows Communication Foundation (WCF) relays from the template.
1415

1516
WCF relays have two modes. In the first mode, the WCF relay is explicitly created using the Azure portal or Azure Resource Manager template. On the **WCF Relays** page of the Azure portal, you see the **isDynamic** property set to **false** for a relay in this mode.
1617

@@ -88,7 +89,7 @@ To delete an Azure Relay namespace (source or target) by using the Azure portal:
8889
![Delete namespace - button](./media/move-across-regions/delete-namespace-button.png)
8990
3. On the **Delete Namespace** page, type the name of the Azure Relay namespace to confirm the deletion, and then select **Delete**.
9091

91-
## Next steps
92+
## Related content
9293
In this tutorial, you moved an Azure Relay namespace from one region to another region. To learn more about moving resources between regions and disaster recovery in Azure, refer to:
9394

9495
- [Move resources to a new resource group or subscription](../azure-resource-manager/management/move-resource-group-and-subscription.md)

articles/azure-relay/network-security.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Network security for Azure Relay
3-
description: This article describes how to use IP firewall rules and private endpoints with Azure Relay.
4-
ms.topic: conceptual
5-
ms.date: 08/10/2023
3+
description: This article describes how to use security features - IP firewall rules and private endpoints - supported by Azure Relay.
4+
ms.topic: concept-article
5+
ms.date: 12/10/2024
6+
# Customer intent: As an Azure Relay user, I want to know what security features are available in Azure Relay.
67
---
78

89
# Network security for Azure Relay
@@ -28,12 +29,12 @@ For more information, see [How to configure IP firewall for a Relay namespace](i
2829

2930
Azure **Private Link Service** enables you to access Azure services (for example, Azure Relay, Azure Service Bus, Azure Event Hubs, Azure Storage, and Azure Cosmos DB) and Azure hosted customer/partner services over a private endpoint in your virtual network. For more information, see [What is Azure Private Link?](../private-link/private-link-overview.md)
3031

31-
A **private endpoint** is a network interface that allows your workloads running in a virtual network to connect privately and securely to a service that has a **private link resource** (for example, a Relay namespace). The private endpoint uses a private IP address from your VNet, effectively bringing the service into your VNet. All traffic to the service can be routed through the private endpoint, so no gateways, NAT devices, ExpressRoute, VPN connections, or public IP addresses are needed. Traffic between your virtual network and the service traverses over the Microsoft backbone network eliminating exposure from the public Internet. You can provide a level of granularity in access control by allowing connections to specific Azure Relay namespaces.
32+
A **private endpoint** is a network interface that allows your workloads running in a virtual network to connect privately and securely to a service that has a **private link resource** (for example, a Relay namespace). The private endpoint uses a private IP address from your virtual network, effectively bringing the service into your virtual network. All traffic to the service can be routed through the private endpoint, so no gateways, NAT devices, ExpressRoute, VPN connections, or public IP addresses are needed. Traffic between your virtual network and the service traverses over the Microsoft backbone network eliminating exposure from the public Internet. You can provide a level of granularity in access control by allowing connections to specific Azure Relay namespaces.
3233

3334
For more information, see [How to configure private endpoints](private-link-service.md)
3435

3536

36-
## Next steps
37+
## Related content
3738
See the following articles:
3839

3940
- [How to configure IP firewall](ip-firewall-virtual-networks.md)

articles/azure-relay/private-link-service.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,29 @@
11
---
22
title: Integrate Azure Relay with Azure Private Link Service
3-
description: Learn how to integrate Azure Relay with Azure Private Link Service
4-
ms.date: 02/15/2023
5-
ms.topic: article
3+
description: This article describes how to integrate Azure Relay with Azure Private Link Service to secure access to Azure Relay resources only from a private network.
4+
ms.date: 12/10/2024
5+
ms.topic: how-to
66
ms.custom: devx-track-azurepowershell
7+
# Customer intent: As an Azure Relay user, I want to learn how to integrate Azure Relay with Azure Private Link service.
78
---
89

910
# Integrate Azure Relay with Azure Private Link
1011
Azure **Private Link Service** enables you to access Azure services (for example, Azure Relay, Azure Service Bus, Azure Event Hubs, Azure Storage, and Azure Cosmos DB) and Azure hosted customer/partner services over a private endpoint in your virtual network. For more information, see [What is Azure Private Link?](../private-link/private-link-overview.md)
1112

12-
A **private endpoint** is a network interface that allows your workloads running in a virtual network to connect privately and securely to a service that has a **private link resource** (for example, a Relay namespace). The private endpoint uses a private IP address from your VNet, effectively bringing the service into your VNet. All traffic to the service can be routed through the private endpoint, so no gateways, NAT devices, ExpressRoute, VPN connections, or public IP addresses are needed. Traffic between your virtual network and the service traverses over the Microsoft backbone network, eliminating exposure from the public Internet. You can provide a level of granularity in access control by allowing connections to specific Azure Relay namespaces.
13+
A **private endpoint** is a network interface that allows your workloads running in a virtual network to connect privately and securely to a service that has a **private link resource** (for example, a Relay namespace). The private endpoint uses a private IP address from your virtual network, effectively bringing the service into your virtual network. All traffic to the service can be routed through the private endpoint, so no gateways, NAT devices, ExpressRoute, VPN connections, or public IP addresses are needed. Traffic between your virtual network and the service traverses over the Microsoft backbone network, eliminating exposure from the public Internet. You can provide a level of granularity in access control by allowing connections to specific Azure Relay namespaces.
1314

1415
> [!NOTE]
1516
> If you use the **relay listener** over a private link, open ports **9400-9599** for outgoing communication along with the standard relay ports. Note that you need to do this step only for the **relay listener**.
1617
17-
## Add a private endpoint using Azure portal
18-
19-
### Prerequisites
18+
## Prerequisites
2019
To integrate an Azure Relay namespace with Azure Private Link, you need the following entities or permissions:
2120

2221
- An Azure Relay namespace.
2322
- An Azure virtual network.
2423
- A subnet in the virtual network.
2524
- Owner or contributor permissions on the virtual network.
2625

26+
## Add a private endpoint using Azure portal
2727
Your private endpoint and virtual network must be in the same region. When you select a region for the private endpoint using the portal, it will automatically filter only virtual networks that are in that region. Your namespace can be in a different region.
2828

2929
Your private endpoint uses a private IP address in your virtual network.
@@ -151,7 +151,7 @@ There are four provisioning states:
151151
| None | Pending | Connection is created manually and is pending approval from the Azure Relay namespace owner. |
152152
| Approve | Approved | Connection was automatically or manually approved and is ready to be used. |
153153
| Reject | Rejected | Connection was rejected by the Azure Relay namespace owner. |
154-
| Remove | Disconnected | Connection was removed by the Azure Relay namespace owner, the private endpoint becomes informative and should be deleted for cleanup. |
154+
| Remove | Disconnected | Connection was removed by the Azure Relay namespace owner. The private endpoint becomes informative and should be deleted for cleanup. |
155155

156156
### Approve, reject, or remove a private endpoint connection
157157

@@ -233,7 +233,7 @@ Aliases: <namespace-name>.servicebus.windows.net
233233

234234
[!INCLUDE [trusted-services](./includes/trusted-services.md)]
235235

236-
## Next Steps
236+
## Related content
237237

238238
- Learn more about [Azure Private Link](../private-link/private-link-service-overview.md)
239239
- Learn more about [Azure Relay](relay-what-is-it.md)

articles/azure-relay/relay-api-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Relay API overview | Microsoft Docs
33
description: This article provides an overview of available Azure Relay APIs (.NET Standard, .NET Framework, Node.js, etc.)
44
ms.topic: article
55
ms.custom: devx-track-dotnet
6-
ms.date: 08/10/2023
6+
ms.date: 12/10/2024
77
---
88

99
# Available Relay APIs
@@ -17,7 +17,7 @@ The [additional information](#additional-information) section contains more info
1717
| Language/Platform | Available feature | Client package | Repository |
1818
| --- | --- | --- | --- |
1919
| .NET Standard | Hybrid Connections | [Microsoft.Azure.Relay](https://www.nuget.org/packages/Microsoft.Azure.Relay/) | [GitHub](https://github.com/azure/azure-relay-dotnet) |
20-
| .NET Framework | WCF Relay | [WindowsAzure.ServiceBus](https://www.nuget.org/packages/WindowsAzure.ServiceBus/) | N/A |
20+
| .NET Framework | Windows Communication Foundation (WCF) Relay | [WindowsAzure.ServiceBus](https://www.nuget.org/packages/WindowsAzure.ServiceBus/) | N/A |
2121
| Node | Hybrid Connections | [WebSockets: `hyco-ws`](https://www.npmjs.com/package/hyco-ws)<br/>[WebSockets: `hyco-websocket`](https://www.npmjs.com/package/hyco-websocket)<br/>[HTTP Requests: `hyco-https`](https://www.npmjs.com/package/hyco-https) | [GitHub](https://github.com/Azure/azure-relay-node) |
2222

2323
### Additional information

0 commit comments

Comments
 (0)