Skip to content

Commit e51cac5

Browse files
Update Bastion support details
Update the resource management private link documentation to clarify the complications of Azure Bastion support and to remove inaccurate details around data exfiltration protection
1 parent 97d3500 commit e51cac5

File tree

1 file changed

+2
-3
lines changed

1 file changed

+2
-3
lines changed

includes/resource-manager-create-rmpl.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,11 @@ Private links enable you to access Azure services over a private endpoint in you
1111
Private link provides the following security benefits:
1212

1313
* **Private Access** - users can manage resources from a private network via a private endpoint.
14-
* **Data exfiltration** - users are denied access to resources not included in the scope.
1514

1615
> [!NOTE]
1716
> Azure Kubernetes Service (AKS) currently doesn't support the ARM private endpoint implementation.
1817
>
19-
> Azure Bastion doesn't support private DNS zones, which are a recommended configuration for your private endpoint. Enabling a private DNS zone will cause your Bastion instance to stop working.
18+
> Azure Bastion doesn't support private links. It is recommended to use a private DNS zone for your resource management private link private endpoint configuration, but due to the overlap with the management.azure.com name, your Bastion instance will stop working. For more information, view [Azure Bastion FAQ](../articles/bastion/bastion-faq.md#dns).
2019
2120
## Understand architecture
2221

@@ -56,4 +55,4 @@ To set up the private link for resource management, you need the following acces
5655

5756
* Owner on the subscription. This access is needed to create resource management private link resource.
5857
* Owner or Contributor at the root management group. This access is needed to create the private link association resource.
59-
* The Global Administrator for the Azure Active Directory doesn't automatically have permission to assign roles at the root management group. To enable creating resource management private links, the Global Administrator must have permission to read root management group and [elevate access](../articles/role-based-access-control/elevate-access-global-admin.md) to have User Access Administrator permission on all subscriptions and management groups in the tenant. After you get the User Access Administrator permission, the Global Administrator must grant Owner or Contributor permission at the root management group to the user creating the private link association.
58+
* The Global Administrator for the Azure Active Directory doesn't automatically have permission to assign roles at the root management group. To enable creating resource management private links, the Global Administrator must have permission to read root management group and [elevate access](../articles/role-based-access-control/elevate-access-global-admin.md) to have User Access Administrator permission on all subscriptions and management groups in the tenant. After you get the User Access Administrator permission, the Global Administrator must grant Owner or Contributor permission at the root management group to the user creating the private link association.

0 commit comments

Comments
 (0)