Skip to content

Commit a67be14

Browse files
Merge pull request #311812 from EldertGrootenboer/nsp
Refine instructions for creating and associating a NSP with Azure Service Bus
2 parents af08f7d + e088c0d commit a67be14

2 files changed

Lines changed: 12 additions & 10 deletions

File tree

articles/private-link/network-security-perimeter-concepts.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -101,6 +101,7 @@ A network security perimeter-aware private link resource is a PaaS resource that
101101
| [Cosmos DB](/azure/cosmos-db/how-to-configure-nsp) | Microsoft.DocumentDB/databaseAccounts | | Public Preview |
102102
| [Event Hubs](/azure/event-hubs/network-security-perimeter) | Microsoft.EventHub/namespaces | | Generally Available |
103103
| [Key Vault](/azure/key-vault/general/network-security#network-security-perimeter-preview) | Microsoft.KeyVault/vaults | | Generally Available |
104+
| [Service Bus](/azure/service-bus-messaging/network-security-perimeter) | Microsoft.ServiceBus/namespaces | | Generally Available |
104105
| [SQL DB](/azure/azure-sql/database/network-security-perimeter) | Microsoft.Sql/servers | | Public Preview |
105106
| [Storage](/azure/storage/common/storage-network-security#network-secuirty-perimeter-preview) | Microsoft.Storage/storageAccounts | | Generally Available |
106107
| [Azure OpenAI service](/azure/ai-services/openai/how-to/network-security-perimeter) | Microsoft.CognitiveServices(kind="OpenAI") | | Public Preview |

articles/service-bus-messaging/network-security-perimeter.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ title: Network Security Perimeter
33
titleSuffix: Azure Service Bus
44
description: Learn how to associate an Azure Service Bus namespace with a network security perimeter
55
ms.reviewer: spelluru
6-
ms.date: 01/15/2026
6+
ms.date: 03/30/2026
77
author: EldertGrootenboer
88
ms.author: egrootenboer
99
ms.topic: feature-guide
1010
ms.custom:
1111
---
1212

1313

14-
# Network security perimeter for Azure Service Bus (public preview)
14+
# Network security perimeter for Azure Service Bus
1515

1616
[Azure Service Bus](./service-bus-messaging-overview.md) supports integration with [network security perimeter](../private-link/network-security-perimeter-concepts.md).
1717

@@ -34,22 +34,23 @@ Azure Service Bus supports scenarios that require access to other PaaS resources
3434
- **Customer-managed keys (CMK)** require communication with Azure Key Vault. For more information, see [Configure customer-managed keys for encrypting Azure Service Bus data at rest](configure-customer-managed-key.md).
3535

3636
> [!NOTE]
37-
> - Network security perimeter is currently in public preview.
38-
> - Network security perimeter doesn't support [Azure Service Bus Geo-Disaster Recovery](./service-bus-geo-dr.md).
3937
> - Network security perimeter currently doesn't support [Azure Service Bus Geo-Replication](./service-bus-geo-replication.md).
4038
> - Network security perimeter rules don't govern private link traffic through [private endpoints](../private-link/private-endpoint-overview.md).
4139
4240
## Create a network security perimeter
4341

44-
Create your own network security perimeter resource using [Azure portal](../private-link/create-network-security-perimeter-portal.md), [PowerShell](../private-link/create-network-security-perimeter-powershell.md), or [Azure CLI](../private-link/create-network-security-perimeter-cli.md).
42+
Create your own network security perimeter resource by using [Azure portal](../private-link/create-network-security-perimeter-portal.md), [PowerShell](../private-link/create-network-security-perimeter-powershell.md), or [Azure CLI](../private-link/create-network-security-perimeter-cli.md).
4543

4644
## Associate Service Bus with a network security perimeter in the Azure portal
4745

48-
1. Go to your network security perimeter resource in the Azure portal.
49-
1. Select **Resources** from the left menu.
50-
1. Select **Associate** to add a new resource association.
51-
1. Search for and select the Service Bus namespace you want to add.
52-
1. Select a profile to associate with the namespace and select **Associate**.
46+
You can associate your Service Bus namespace with a network security perimeter directly from the Service Bus namespace in the Azure portal.
47+
48+
1. On your Service Bus namespace page, select **Networking** under **Settings**.
49+
1. Select the **Public access** tab.
50+
1. In the **Network security perimeter** section, select **Associate**.
51+
1. In the **Select network security perimeter** dialog, search for and select the network security perimeter you want to associate with the namespace.
52+
1. Select a profile to associate with the namespace.
53+
1. Select **Associate** to complete the association.
5354

5455
## Related content
5556

0 commit comments

Comments
 (0)