What is a recommended secure configuration to allow access from Azure public services such as App Service or PowerBI to SQL MI thru public endpoint. The challenge is that Microsoft public App Services in an NSG will allow access from a whole region as opposed to specific IP address. Same thing for PowerBI.
Thank you
⚠Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.
@ukiguy Thank you for your inquiry. The current solution is App Service Environments which gives you a dedicated IP. Otherwise, you can be selective with specific IP Ranges for a specific data center or enable the Allow Azure services to connect configuration in firewall for your specific service (SQL in this case).
"or enable the Allow Azure services to connect configuration in firewall for your specific service (SQL in this case)." does not apply to Managed Instance as Managed Instance uses Network Security Groups to control access. The NSG equivalent of "Allow Azure services" is having Allow inbound NSG rule for TCP port 3342 scoped for AzureCloud service tag
@ukiguy We will now proceed to close this thread. If there are further questions regarding this matter, please comment and we will gladly continue the discussion.
Most helpful comment
"or enable the Allow Azure services to connect configuration in firewall for your specific service (SQL in this case)." does not apply to Managed Instance as Managed Instance uses Network Security Groups to control access. The NSG equivalent of "Allow Azure services" is having Allow inbound NSG rule for TCP port 3342 scoped for AzureCloud service tag