Skip to content

Commit d285f52

Browse files
committed
edits
1 parent 92c2dd8 commit d285f52

3 files changed

Lines changed: 11 additions & 10 deletions

File tree

-32.8 KB
Loading
-1.75 KB
Loading

articles/app-service/tutorial-secure-ntier-app.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ You need two App Service web apps, one for the frontend and one for the backend.
103103

104104
For more information, see the [az appservice plan create](/cli/azure/afd/profile#az-appservice-plan-create) command reference.
105105

106-
1. Create the two web apps.
106+
1. Create the frontend and backend web apps.
107107

108108
The tutorial example creates two sample Node.js apps, where the runtime language version is `NODE:24-lts`. If you prefer to use your own apps, set the `--runtime` parameter `<language-version>` value accordingly. You can run the `az webapp list-runtimes` command for the list of available runtimes:
109109

@@ -118,6 +118,7 @@ You need two App Service web apps, one for the frontend and one for the backend.
118118
frontendAppName=<frontend-app-name>
119119
backendAppName=<backend-app-name>
120120
121+
# Create the web apps
121122
az webapp create --name $frontendAppName --resource-group $resourceGroupName --plan $appServicePlanName --runtime "NODE:24-lts"
122123
az webapp create --name $backendAppName --resource-group $resourceGroupName --plan $appServicePlanName --runtime "NODE:24-lts"
123124
```
@@ -235,7 +236,7 @@ The virtual network infrastructure consists of the following resources:
235236
--group-id sites --vnet-name $virtualNetworkName --subnet $privateEndpointSubnet
236237
```
237238

238-
For more information, see the [az network private-endpoint create](cli/azure/network/private-endpoint#az-network-private-endpoint-create) command reference.
239+
For more information, see the [az network private-endpoint create](/cli/azure/network/private-endpoint#az-network-private-endpoint-create) command reference.
239240

240241
1. Link the private endpoint to the Private DNS zone with a DNS Zone group for the backend web app private endpoint.
241242

@@ -260,7 +261,7 @@ The virtual network infrastructure consists of the following resources:
260261

261262
The browser message indicates direct access is denied:
262263

263-
:::image type="content" source="./media/tutorial-secure-ntier-app/backend-app-service-forbidden.png" alt-text="Screenshot of the browser message when direct access to the backend app is forbidden.":::
264+
:::image type="content" source="./media/tutorial-secure-ntier-app/backend-app-service-forbidden.png" border="false" alt-text="Screenshot of the browser message when direct access to the backend app is forbidden.":::
264265

265266
For more information on App Service access restrictions with private endpoints, see [Azure App Service access restrictions](overview-access-restrictions.md#app-access).
266267

@@ -288,7 +289,7 @@ Because your backend web app isn't publicly accessible, you must allow your cont
288289
az webapp update --resource-group $resourceGroupName --name $backendAppName --set publicNetworkAccess=Enabled
289290
```
290291

291-
1. Set the unmatched rule action for the main web app to deny all traffic.
292+
1. Set the unmatched rule action for the main web app to deny all traffic.
292293

293294
This setting denies public access to the main web app even though the general app access setting is set to allow public access.
294295

@@ -414,7 +415,7 @@ You can set up continuous deployment with GitHub Actions.
414415

415416
1. In the **Settings** tab, set the **Source** option to **GitHub**:
416417

417-
:::image type="content" source="./media/tutorial-secure-n-tier-app/choose-web-app-source.png" alt-text="Screenshot that shows how to choose the deployment source for the frontend web app in the Azure portal.":::
418+
:::image type="content" source="./media/tutorial-secure-ntier-app/choose-web-app-source.png" border="false" alt-text="Screenshot that shows how to choose the deployment source for the frontend web app in the Azure portal.":::
418419

419420
1. If you're deploying from GitHub for the first time, select **Authorize** and follow the authorization prompts. If you want to deploy from a different user's repository, select **Change Account**.
420421

@@ -440,7 +441,7 @@ Now you're ready to check the connections and access to your frontend and backen
440441

441442
You should see the following browser message:
442443

443-
:::image type="content" source="./media/tutorial-secure-ntier-app/backend-app-service-forbidden.png" alt-text="Screenshot of the browser message when direct access to the backend app is forbidden.":::
444+
:::image type="content" source="./media/tutorial-secure-ntier-app/backend-app-service-forbidden.png" border="false" alt-text="Screenshot of the browser message when direct access to the backend app is forbidden.":::
444445

445446
If you **can** reach the app, then check your configuration:
446447

@@ -452,7 +453,7 @@ Now you're ready to check the connections and access to your frontend and backen
452453

453454
When the connection succeeds, you see the following page:
454455

455-
:::image type="content" source="./media/tutorial-secure-ntier-app/frontend-url-content-fetcher.png" alt-text="Screenshot of a successful connection to the frontend app running in the browser.":::
456+
:::image type="content" source="./media/tutorial-secure-ntier-app/frontend-url-content-fetcher.png" border="false" alt-text="Screenshot of a successful connection to the frontend app running in the browser.":::
456457

457458
1. In the URL box, enter the URL for your backend web app, `https://<backend-app-name>.azurewebsites.net`, and select **Fetch**.
458459

@@ -490,17 +491,17 @@ Validate the frontend web app is reaching the backend web app over the private l
490491
curl https://<backend-app-name>.azurewebsites.net
491492
```
492493

493-
:::image type="content" source="./media/tutorial-secure-ntier-app/frontend-ssh-validation.png" alt-text="Screenshot of an SSH session to a frontend instance showing how to validate app connections to the backend.":::
494+
:::image type="content" source="./media/tutorial-secure-ntier-app/frontend-ssh-validation.png" border="false" alt-text="Screenshot of an SSH session to a frontend instance showing how to validate app connections to the backend.":::
494495

495496
The `nslookup` command should resolve to the private IP address of your backend web app. The private IP address should be an address from your virtual network.
496497

497498
You can confirm your private IP address in the Azure portal. Go to the **Settings** > **Networking** page for your backend web app.
498499

499-
:::image type="content" source="./media/tutorial-secure-ntier-app/backend-app-service-inbound-ip.png" alt-text="Screenshot that shows the Networking page for a web app in the Azure portal with the inbound IP address highlighted.":::
500+
:::image type="content" source="./media/tutorial-secure-ntier-app/backend-app-service-inbound-ip.png" border="false" alt-text="Screenshot that shows the Networking page for a web app in the Azure portal with the inbound IP address highlighted.":::
500501

501502
1. Repeat the same `nslookup` and `curl` commands from another terminal (one that isn't an SSH session on your frontend instances).
502503
503-
:::image type="content" source="./media/tutorial-secure-ntier-app/frontend-external-terminal.png" alt-text="Screenshot of an external terminal running the nslookup and curl commands for the backend web app showing access is forbidden.":::
504+
:::image type="content" source="./media/tutorial-secure-ntier-app/frontend-external-terminal.png" border="false" alt-text="Screenshot of an external terminal running the nslookup and curl commands for the backend web app showing access is forbidden.":::
504505
505506
The `nslookup` command returns the **public IP** for the backend web app. Because public access to the backend web app is disabled, if you try to reach the public IP, you get an access denied error. This error means the site isn't accessible from the public internet, which is the intended behavior.
506507

0 commit comments

Comments
 (0)