You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sap/monitor/enable-trusted-access.md
+15-22Lines changed: 15 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,40 +11,33 @@ ms.author: vaidehikher
11
11
---
12
12
13
13
# Enabling private endpoints for AMS resources
14
-
15
14
One of the challenges for customers is that the key vault and storage account that are created as part of the Azure Monitor for SAP solutions Managed Resource Group have their public access enabled. Customers want to disable this public access to be security compliant, but blocking the public access on these resources can lead to functional issues within AMS.
16
15
With this feature, you can use the system-assigned identity of the Azure Monitor for SAP solutions resource and our service will use trusted access mode to interact with the key vault and storage account. Using this feature, you can then block public access and only allow traffic from AMS subnet on your key vault and storage account in AMS managed resource group.
17
16
This feature provides more security and control over your AMS resources, as you can limit the access to the key vault and storage account to the AMS service and subnet only and prevent any unauthorized or malicious access from outside.
18
17
19
18
## Prerequisites and steps to enable trusted access using System Assigned Managed Identity
20
19
To use the trusted access using MSI feature, you need to meet the following prerequisites and follow the steps below:
21
20
* Migrate to Dedicated app service plan: [Follow steps here](https://go.microsoft.com/fwlink/?linkid=2306196)
22
-
> This is a mandatory step to avoid having function app scaling issues after storage account's public access is disabled.
21
+
> [!Note]
22
+
> Migrating to dedicated app service plan is a mandatory step to avoid having function app scaling issues after storage account's public access is disabled.
23
23
24
-
`Important Note: Trusted access feature is supported only if the "ROUTE ALL" is enabled during the monitor creation.`
24
+
> [!Important]
25
+
> Trusted access feature is supported only if the "ROUTE ALL" is enabled during the monitor creation.
25
26
26
27
## Steps to follow while creating new AMS
27
-
* Log in to the Azure portal and create a new Azure Monitor for SAP solutions resource.
28
-
* Fill in the required fields, such as the name, description, etc.
29
-
* (Mandatory) Under the Networking section, have the 'Route all' option enabled.
30
-
* Under the Identity section, select Enable System Assigned Managed Identity.
31
-

32
-
33
-
* Click on Save to create the monitor instance.
34
-
* Create all the providers that are needed.
28
+
1. Log in to the Azure portal and create a new Azure Monitor for SAP solutions resource.
29
+
2. Fill in the required fields, such as the name, description, etc.
30
+
3. Under the Networking section, have the 'Route all' option enabled.
31
+
4. Under the Identity section, select Enable System Assigned Managed Identity.
32
+

33
+
5. Click on Save to create the monitor instance.
34
+
6. Create all the providers that are needed.
35
35
36
36
## Steps to follow for existing AMS
37
-
* Log in to the Azure portal and navigate to your Azure Monitor for SAP solutions resource.
38
-
39
-
* Migrate to Dedicated app service plan: [Follow steps here](https://go.microsoft.com/fwlink/?linkid=2306196)
40
-
> This is a mandatory step to avoid having function app scaling issues after storage account's public access is disabled.
41
-
42
-
* Go to the identity tab and enable the system assigned identity and wait for the operation to complete and monitor should be in succeeded state after the operation.
43
-

44
-
37
+
1. Log in to the Azure portal and navigate to your Azure Monitor for SAP solutions resource.
38
+
2. Migrate to Dedicated app service plan: [Follow steps here](https://go.microsoft.com/fwlink/?linkid=2306196)
39
+
3. Go to the identity tab and enable the system assigned identity and wait for the operation to complete and monitor should be in succeeded state after the operation.
40
+

45
41
46
42
## Disable Identity on existing AMS
47
43
* Go to Identity tab for AMS and disable the identity and save.
48
-
49
-
## Important:
50
-
* Migrating to dedicated app service plan is a mandatory step to avoid having function app scaling issues after storage account's public access is disabled.
0 commit comments