Skip to content

Commit d5dbea4

Browse files
authored
Merge pull request #314162 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 062bae2 + b2b76c8 commit d5dbea4

2 files changed

Lines changed: 4 additions & 1 deletion

File tree

articles/private-link/network-security-perimeter-concepts.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -141,6 +141,9 @@ Network security perimeter is currently available in all Azure public cloud regi
141141
> [!NOTE]
142142
> For PaaS resource logs, use **Log Analytics Workspace, Storage or Event Hub** as the log destination associated to the same perimeter as the PaaS resource.
143143
144+
> [!NOTE]
145+
> Azure Backup is not supported for Storage Accounts enabled with network security perimeter. We recommend not associating a storage account with network security perimeter if you have backups enabled or if you plan to use Azure Backup.
146+
144147
[!INCLUDE [network-security-perimeter-limits](../../includes/network-security-perimeter-limits.md)]
145148

146149
## Next steps

includes/network-security-perimeter-note-managed-id.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,4 +11,4 @@ ms.custom: include file, ignite-2024
1111
---
1212

1313
> [!NOTE]
14-
> If managed identity is not assigned to the resource which supports it, outbound access to other resources within the same perimeter will be denied. Subscription based inbound rules intended to allow access from this resource will not take effect.
14+
> Enabling a Managed Identity (MI) is required to support intra-perimeter communication between resources. While some capabilities for certain resources (for example, Azure SQL's features that use platform‑managed, SQL‑to‑SQL backend communication) may continue to function without an MI, enabling one is strongly recommended to ensure secure access within the same perimeter or across linked perimeters.

0 commit comments

Comments
 (0)