You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/private-link-service.md
+77-6Lines changed: 77 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,15 +1,15 @@
1
1
---
2
2
title: Integrate with Azure Private Link Service
3
3
description: Learn how to integrate Azure Key Vault with Azure Private Link Service
4
-
author: msmbaldwin
5
-
ms.author: mbaldwin
6
-
ms.date: 01/28/2020
4
+
author: ShaneBala-keyvault
5
+
ms.author: sudbalas
6
+
ms.date: 03/08/2020
7
7
ms.service: key-vault
8
8
ms.topic: quickstart
9
9
10
10
---
11
11
12
-
# Integrate Key Vault with Azure Private Link (Preview)
12
+
# Integrate Key Vault with Azure Private Link
13
13
14
14
Azure Private Link Service enables you to access Azure Services (for example, Azure Key Vault, Azure Storage, and Azure Cosmos DB) and Azure hosted customer/partner services over a Private Endpoint in your virtual network.
15
15
@@ -30,7 +30,7 @@ Your private endpoint and virtual network must be in the same region. When you s
30
30
31
31
Your private endpoint uses a private IP address in your virtual network.
32
32
33
-
## Establish a private link connection to key vault
33
+
## Establish a private link connection to Key Vault using the Azure portal
34
34
35
35
First, create a virtual network by following the steps in [Create a virtual network using the Azure portal](../virtual-network/quick-create-portal.md)
36
36
@@ -77,6 +77,60 @@ You can choose to create a private endpoint for any Azure resource in using this
77
77

78
78

79
79
80
+
## Establish a private link connection to Key Vault using CLI
81
+
82
+
### Login to Azure CLI
83
+
```console
84
+
az login
85
+
```
86
+
### Select your Azure Subscription
87
+
```console
88
+
az account set --subscription {AZURE SUBSCRIPTION ID}
az network private-endpoint show --resource-group {RG} --name {Private Endpoint Name}
133
+
```
80
134
## Manage private link connection
81
135
82
136
When you create a private endpoint, the connection must be approved. If the resource for which you are creating a private endpoint is in your directory, you will be able to approve the connection request provided you have sufficient permissions; if you are connecting to an Azure resource in another directory, you must wait for the owner of that resource to approve your connection request.
@@ -90,7 +144,7 @@ There are four provisioning states:
90
144
| Reject | Rejected | Connection was rejected by the private link resource owner. |
91
145
| Remove | Disconnected | Connection was removed by the private link resource owner, the private endpoint becomes informative and should be deleted for cleanup. |
92
146
93
-
### How to manage a private endpoint connection to key vault
147
+
### How to manage a private endpoint connection to Key Vault using the Azure portal
94
148
95
149
1. Log in to the Azure portal.
96
150
1. In the search bar, type in "key vaults"
@@ -103,6 +157,23 @@ There are four provisioning states:
103
157
104
158

105
159
160
+
## How to manage a private endpoint connection to Key Vault using Azure CLI
161
+
162
+
### Approve a Private Link Connection Request
163
+
```console
164
+
az keyvault private-endpoint-connection approve --approval-description {"OPTIONAL DESCRIPTION"} --resource-group {RG} --vault-name {KEY VAULT NAME} –name {PRIVATE LINK CONNECTION NAME}
165
+
```
166
+
167
+
### Deny a Private Link Connection Request
168
+
```console
169
+
az keyvault private-endpoint-connection reject --rejection-description {"OPTIONAL DESCRIPTION"} --resource-group {RG} --vault-name {KEY VAULT NAME} –name {PRIVATE LINK CONNECTION NAME}
170
+
```
171
+
172
+
### Delete a Private Link Connection Request
173
+
```console
174
+
az keyvault private-endpoint-connection delete --resource-group {RG} --vault-name {KEY VAULT NAME} --name {PRIVATE LINK CONNECTION NAME}
175
+
```
176
+
106
177
## Validate that the private link connection works
107
178
108
179
You should validate that the resources within the same subnet of the private endpoint resource are connecting to your key vault over a private IP address, and that they have the correct private DNS zone integration.
0 commit comments