Skip to content

Commit d4302ff

Browse files
Merge pull request #220057 from jlichwa/patch-36
Update overview-vnet-service-endpoints.md
2 parents e8ac1f7 + 82a7b30 commit d4302ff

File tree

1 file changed

+13
-1
lines changed

1 file changed

+13
-1
lines changed

articles/key-vault/general/overview-vnet-service-endpoints.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,19 @@ Here are some examples of how you might use service endpoints:
2828
* You want to lock down access to your key vault so that only your application, or a short list of designated hosts, can connect to your key vault.
2929
* You have an application running in your Azure virtual network, and this virtual network is locked down for all inbound and outbound traffic. Your application still needs to connect to Key Vault to fetch secrets or certificates, or use cryptographic keys.
3030

31-
## Trusted services
31+
32+
## Grant access to trusted Azure services
33+
34+
You can grant access to trusted Azure services to the key vault, while maintaining network rules for other apps. These trusted services will then use strong authentication to securely connect to your key vault.
35+
36+
You can grant access to trusted Azure services by configuring networking settings. For step-by-step guidance, see the [networking configuration options](how-to-azure-key-vault-network-security.md) of this article.
37+
38+
When you grant access to trusted Azure services, you grant the following types of access:
39+
* Trusted access for select operations to resources that are registered in your subscription.
40+
* Trusted access to resources based on a managed identity.
41+
* Trusted access across tenants using a Federated Identity Credential
42+
43+
### Trusted services
3244

3345
Here's a list of trusted services that are allowed to access a key vault if the **Allow trusted services** option is enabled.
3446

0 commit comments

Comments
 (0)