Skip to content

Commit d709615

Browse files
Update enable-trusted-access.md
Resolving blocking issues of PR
1 parent 7b099a9 commit d709615

File tree

1 file changed

+15
-22
lines changed

1 file changed

+15
-22
lines changed

articles/sap/monitor/enable-trusted-access.md

Lines changed: 15 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -11,40 +11,33 @@ ms.author: vaidehikher
1111
---
1212

1313
# Enabling private endpoints for AMS resources
14-
1514
One of the challenges for customers is that the key vault and storage account that are created as part of the Azure Monitor for SAP solutions Managed Resource Group have their public access enabled. Customers want to disable this public access to be security compliant, but blocking the public access on these resources can lead to functional issues within AMS.
1615
With this feature, you can use the system-assigned identity of the Azure Monitor for SAP solutions resource and our service will use trusted access mode to interact with the key vault and storage account. Using this feature, you can then block public access and only allow traffic from AMS subnet on your key vault and storage account in AMS managed resource group.
1716
This feature provides more security and control over your AMS resources, as you can limit the access to the key vault and storage account to the AMS service and subnet only and prevent any unauthorized or malicious access from outside.
1817

1918
## Prerequisites and steps to enable trusted access using System Assigned Managed Identity
2019
To use the trusted access using MSI feature, you need to meet the following prerequisites and follow the steps below:
2120
* Migrate to Dedicated app service plan: [Follow steps here](https://go.microsoft.com/fwlink/?linkid=2306196)
22-
> This is a mandatory step to avoid having function app scaling issues after storage account's public access is disabled.
21+
> [!Note]
22+
> Migrating to dedicated app service plan is a mandatory step to avoid having function app scaling issues after storage account's public access is disabled.
2323
24-
`Important Note: Trusted access feature is supported only if the "ROUTE ALL" is enabled during the monitor creation.`
24+
> [!Important]
25+
> Trusted access feature is supported only if the "ROUTE ALL" is enabled during the monitor creation.
2526
2627
## Steps to follow while creating new AMS
27-
* Log in to the Azure portal and create a new Azure Monitor for SAP solutions resource.
28-
* Fill in the required fields, such as the name, description, etc.
29-
* (Mandatory) Under the Networking section, have the 'Route all' option enabled.
30-
* Under the Identity section, select Enable System Assigned Managed Identity.
31-
![screenshot of enabling trusted access during AMS resource creation.](../monitor/media/enable-trusted-access/enable-system-assigned-mi.png)
32-
33-
* Click on Save to create the monitor instance.
34-
* Create all the providers that are needed.
28+
1. Log in to the Azure portal and create a new Azure Monitor for SAP solutions resource.
29+
2. Fill in the required fields, such as the name, description, etc.
30+
3. Under the Networking section, have the 'Route all' option enabled.
31+
4. Under the Identity section, select Enable System Assigned Managed Identity.
32+
![Screenshot of Enabling Trusted Access during AMS Resource Creation.](../monitor/media/enable-trusted-access/enable-system-assigned-mi.png)
33+
5. Click on Save to create the monitor instance.
34+
6. Create all the providers that are needed.
3535

3636
## Steps to follow for existing AMS
37-
* Log in to the Azure portal and navigate to your Azure Monitor for SAP solutions resource.
38-
39-
* Migrate to Dedicated app service plan: [Follow steps here](https://go.microsoft.com/fwlink/?linkid=2306196)
40-
> This is a mandatory step to avoid having function app scaling issues after storage account's public access is disabled.
41-
42-
* Go to the identity tab and enable the system assigned identity and wait for the operation to complete and monitor should be in succeeded state after the operation.
43-
![screenshot of enabling trusted access under indentity tab.](../monitor/media/enable-trusted-access/enable-mi-existing-customer.png)
44-
37+
1. Log in to the Azure portal and navigate to your Azure Monitor for SAP solutions resource.
38+
2. Migrate to Dedicated app service plan: [Follow steps here](https://go.microsoft.com/fwlink/?linkid=2306196)
39+
3. Go to the identity tab and enable the system assigned identity and wait for the operation to complete and monitor should be in succeeded state after the operation.
40+
![Screenshot of Enabling Trusted Access under Indentity tab.](../monitor/media/enable-trusted-access/enable-mi-existing-customer.png)
4541

4642
## Disable Identity on existing AMS
4743
* Go to Identity tab for AMS and disable the identity and save.
48-
49-
## Important:
50-
* Migrating to dedicated app service plan is a mandatory step to avoid having function app scaling issues after storage account's public access is disabled.

0 commit comments

Comments
 (0)