Skip to content

Commit d6b2f65

Browse files
authored
Merge pull request #263786 from madsd/accrestr-update
Update with new UX
2 parents e73c842 + 0fe866d commit d6b2f65

File tree

8 files changed

+34
-32
lines changed

8 files changed

+34
-32
lines changed

articles/app-service/app-service-ip-restrictions.md

Lines changed: 30 additions & 28 deletions
Large diffs are not rendered by default.
9.74 KB
Loading
13.2 KB
Loading
2.07 KB
Loading
-58.3 KB
Loading
5.24 KB
Loading
10.2 KB
Loading

articles/app-service/overview-access-restrictions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: App Service Access restrictions
33
description: This article provides an overview of the access restriction features in App Service
44
author: madsd
55
ms.topic: overview
6-
ms.date: 01/03/2024
6+
ms.date: 01/25/2024
77
ms.author: madsd
88
ms.custom: UpdateFrequency3
99
---
@@ -24,11 +24,11 @@ You have the option of configuring a set of access restriction rules for each si
2424

2525
## App access
2626

27-
App access allows you to configure if access is available through the default (public) endpoint. If the setting isn't configured, the default behavior is to enable access unless a private endpoint exists which changes the implicit behavior to disable access. You have the ability to explicitly configure this behavior to either enabled or disabled even if private endpoints exist.
27+
App access allows you to configure if access is available through the default (public) endpoint. You configure this behavior to either be `Disabled` or `Enabled`. When access is enabled, you can add [Site access](#site-access) restriction rules to control access from select virtual networks and IP addresses. If the setting isn't configured, the default behavior is to enable access unless a private endpoint exists which changes the behavior to disable access.
2828

2929
:::image type="content" source="media/overview-access-restrictions/app-access-portal.png" alt-text="Screenshot of app access option in Azure portal.":::
3030

31-
In the Azure Resource Manager API, app access is called `publicNetworkAccess`. For ILB App Service Environment, the default entry point for apps is always internal to the virtual network. Enabling app access (`publicNetworkAccess`) doesn't grant direct public access to the web application; instead, it allows access from the default entry point, which corresponds to the internal IP address of the App Service Environment. If you disable app access on an ILB App Service Environment, you can only access the apps through private endpoints added to the individual apps.
31+
In the Azure Resource Manager API, app access is called `publicNetworkAccess`. For ILB App Service Environment, the default entry point for apps is always internal to the virtual network. Enabling app access (`publicNetworkAccess`) doesn't grant direct public access to the apps; instead, it allows access from the default entry point, which corresponds to the internal IP address of the App Service Environment. If you disable app access on an ILB App Service Environment, you can only access the apps through private endpoints added to the individual apps.
3232

3333
## Site access
3434

@@ -98,7 +98,7 @@ Some use cases for http header filtering are:
9898

9999
## Diagnostic logging
100100

101-
App Service can [send various logging categories to Azure Monitor](./troubleshoot-diagnostic-logs.md#send-logs-to-azure-monitor). One of those categories is called *IPSecurity Audit logs* and represent the activities in access restrictions. All requests that match a rule (except the unmatched rule), both allow and deny, is logged and can be used to validate configuration of access restrictions. The logging capability is also a powerful tool when troubleshooting rules configuration.
101+
App Service can [send various logging categories to Azure Monitor](./troubleshoot-diagnostic-logs.md#send-logs-to-azure-monitor). One of those categories is called `IPSecurity Audit logs` and represent the activities in access restrictions. All requests that match a rule (except the unmatched rule), both allow and deny, is logged and can be used to validate configuration of access restrictions. The logging capability is also a powerful tool when troubleshooting rules configuration.
102102

103103
## Advanced use cases
104104

0 commit comments

Comments
 (0)