fix: Restrict public access for api endpoint#2169
Closed
Priyanka-Microsoft wants to merge 3 commits intoAzure-Samples:devfrom
Closed
fix: Restrict public access for api endpoint#2169Priyanka-Microsoft wants to merge 3 commits intoAzure-Samples:devfrom
Priyanka-Microsoft wants to merge 3 commits intoAzure-Samples:devfrom
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Purpose
This pull request significantly enhances the network security and private networking capabilities of the Azure deployment, particularly for production/WAF scenarios. The main focus is on restricting public access to backend APIs, enabling private endpoints for all backend services, and allowing fine-grained IP security restrictions while keeping deployment (SCM) endpoints accessible. Documentation is also updated to reflect these architectural improvements.
Network Security & Private Endpoints
privatelink.azurewebsites.netto the list of private DNS zones and integrated it into the deployment, ensuring private DNS resolution for the Function App when private networking is enabled. [1] [2] [3] [4] [5]IP Security Restrictions
Network Security Group (NSG) Rules
Documentation Updates
docs/best_practices.mdanddocs/LOCAL_DEPLOYMENT.mdto clearly describe the new network security architecture, private endpoint usage, and the distinction between public and private access for frontend and backend services. [1] [2]Other Improvements
SecurityControl: Ignoretag to telemetry resources to avoid unnecessary security alerts for resources that are intentionally exposed.These changes collectively ensure that in production deployments, only the frontend is exposed to the public internet, while all backend APIs and data services are securely isolated within a private network, following best practices for Azure network security.
Does this introduce a breaking change?
How to Test
What to Check
Verify that the following are valid
Other Information