Skip to content

Commit ff85f40

Browse files
Update access-behind-firewall.md
1 parent 31b6c01 commit ff85f40

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/key-vault/general/access-behind-firewall.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,9 +62,9 @@ For all key vault object (keys and secrets) management and cryptographic operati
6262

6363
The Key Vault service uses other Azure resources like PaaS infrastructure. So it's not possible to provide a specific range of IP addresses that Key Vault service endpoints will have at any particular time. If your firewall supports only IP address ranges, refer to Microsoft Azure Datacenter IP Ranges documents available at:
6464
* [Public](https://www.microsoft.com/en-us/download/details.aspx?id=56519)
65-
* [US Gov](http://www.microsoft.com/en-us/download/details.aspx?id=57063)
66-
* [Germany](http://www.microsoft.com/en-us/download/details.aspx?id=57064)
67-
* [China](http://www.microsoft.com/en-us/download/details.aspx?id=57062)
65+
* [US Gov](https://www.microsoft.com/en-us/download/details.aspx?id=57063)
66+
* [Germany](https://www.microsoft.com/en-us/download/details.aspx?id=57064)
67+
* [China](https://www.microsoft.com/en-us/download/details.aspx?id=57062)
6868

6969
Authentication and Identity (Azure Active Directory) is a global service and may fail over to other regions or move traffic without notice. In this scenario, all of the IP ranges listed in [Authentication and Identity IP Addresses](https://support.office.com/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2#bkmk_identity_ip) should be added to the firewall.
7070

0 commit comments

Comments
 (0)