Skip to content

Commit d7cc754

Browse files
Merge pull request #210290 from JackStromberg/patch-80
Updating private dns zone use for private endpoints
2 parents 70c5596 + b4fbcab commit d7cc754

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/application-gateway/key-vault-certs.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,9 @@ When you're using a restricted Key Vault, use the following steps to configure A
8080
> [!TIP]
8181
> Steps 1-3 are not required if your Key Vault has a Private Endpoint enabled. The application gateway can access the Key Vault using the private IP address.
8282
83+
> [!Note]
84+
> If using Private Endpoints to access Key Vault, you must link the privatelink.vaultcore.azure.net private DNS zone, containing the corresponding record to the referenced Key Vault, to the virtual network containing Application Gateway. Custom DNS servers may continue to be used on the virtual network instead of the Azure DNS provided resolvers, however the private dns zone will need to remain linked to the virtual network as well.
85+
8386
1. In the Azure portal, in your Key Vault, select **Networking**.
8487
1. On the **Firewalls and virtual networks** tab, select **Selected networks**.
8588
1. For **Virtual networks**, select **+ Add existing virtual networks**, and then add the virtual network and subnet for your Application Gateway instance. During the process, also configure the `Microsoft.KeyVault` service endpoint by selecting its checkbox.

0 commit comments

Comments
 (0)