You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/network-security-perimeter-concepts.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,6 +101,7 @@ A network security perimeter-aware private link resource is a PaaS resource that
101
101
|[Cosmos DB](/azure/cosmos-db/how-to-configure-nsp)| Microsoft.DocumentDB/databaseAccounts || Public Preview |
102
102
|[Event Hubs](/azure/event-hubs/network-security-perimeter)| Microsoft.EventHub/namespaces || Generally Available |
103
103
|[Key Vault](/azure/key-vault/general/network-security#network-security-perimeter-preview)| Microsoft.KeyVault/vaults || Generally Available |
104
+
|[Service Bus](/azure/service-bus-messaging/network-security-perimeter)| Microsoft.ServiceBus/namespaces || Generally Available |
104
105
|[SQL DB](/azure/azure-sql/database/network-security-perimeter)| Microsoft.Sql/servers || Public Preview |
105
106
|[Storage](/azure/storage/common/storage-network-security#network-secuirty-perimeter-preview)| Microsoft.Storage/storageAccounts || Generally Available |
106
107
|[Azure OpenAI service](/azure/ai-services/openai/how-to/network-security-perimeter)| Microsoft.CognitiveServices(kind="OpenAI") || Public Preview |
description: Learn how to associate an Azure Service Bus namespace with a network security perimeter
5
5
ms.reviewer: spelluru
6
-
ms.date: 01/15/2026
6
+
ms.date: 03/30/2026
7
7
author: EldertGrootenboer
8
8
ms.author: egrootenboer
9
9
ms.topic: feature-guide
10
10
ms.custom:
11
11
---
12
12
13
13
14
-
# Network security perimeter for Azure Service Bus (public preview)
14
+
# Network security perimeter for Azure Service Bus
15
15
16
16
[Azure Service Bus](./service-bus-messaging-overview.md) supports integration with [network security perimeter](../private-link/network-security-perimeter-concepts.md).
17
17
@@ -34,22 +34,23 @@ Azure Service Bus supports scenarios that require access to other PaaS resources
34
34
-**Customer-managed keys (CMK)** require communication with Azure Key Vault. For more information, see [Configure customer-managed keys for encrypting Azure Service Bus data at rest](configure-customer-managed-key.md).
35
35
36
36
> [!NOTE]
37
-
> - Network security perimeter is currently in public preview.
38
-
> - Network security perimeter doesn't support [Azure Service Bus Geo-Disaster Recovery](./service-bus-geo-dr.md).
39
37
> - Network security perimeter currently doesn't support [Azure Service Bus Geo-Replication](./service-bus-geo-replication.md).
40
38
> - Network security perimeter rules don't govern private link traffic through [private endpoints](../private-link/private-endpoint-overview.md).
41
39
42
40
## Create a network security perimeter
43
41
44
-
Create your own network security perimeter resource using [Azure portal](../private-link/create-network-security-perimeter-portal.md), [PowerShell](../private-link/create-network-security-perimeter-powershell.md), or [Azure CLI](../private-link/create-network-security-perimeter-cli.md).
42
+
Create your own network security perimeter resource by using [Azure portal](../private-link/create-network-security-perimeter-portal.md), [PowerShell](../private-link/create-network-security-perimeter-powershell.md), or [Azure CLI](../private-link/create-network-security-perimeter-cli.md).
45
43
46
44
## Associate Service Bus with a network security perimeter in the Azure portal
47
45
48
-
1. Go to your network security perimeter resource in the Azure portal.
49
-
1. Select **Resources** from the left menu.
50
-
1. Select **Associate** to add a new resource association.
51
-
1. Search for and select the Service Bus namespace you want to add.
52
-
1. Select a profile to associate with the namespace and select **Associate**.
46
+
You can associate your Service Bus namespace with a network security perimeter directly from the Service Bus namespace in the Azure portal.
47
+
48
+
1. On your Service Bus namespace page, select **Networking** under **Settings**.
49
+
1. Select the **Public access** tab.
50
+
1. In the **Network security perimeter** section, select **Associate**.
51
+
1. In the **Select network security perimeter** dialog, search for and select the network security perimeter you want to associate with the namespace.
52
+
1. Select a profile to associate with the namespace.
53
+
1. Select **Associate** to complete the association.
0 commit comments