Hi I was able to host an API application an Azure but unable to access the network of my database which is located in a different server under my network
I was wondering what things should I set up to make this happen
Generally, you could enable the networking of app service to allow web app in the app service to access in a private network then connect the azure VNet and on-premise network via a site to site VPN gateway. You could get more details from this article.
However, in this case if you just want to access the database in another network, it's recommended to use Azure Hybrid Connections, it's a simple way without VPN gateway.
Azure Hybrid Connections enables you to connect your Azure App Services (including Azure Functions) to existing on-prem services/APIs. See How to Add and Create Hybrid Connections in your app and more reference.
Related
I have .NET Core APIS. these APIS accessing some end points of other website and it can be access using VPN connection only, so when I test it in my local machine It works because I have active VPN connection. Now When I am publishing this API as a service on azure, It's returning me error that No host is know. How can I allow azure to access that third party website with VPN connection
I have created an application service run on my IIS server.
That is based on REST (web server).
The service want to access a remote FTP server.
The service is related to application pool, with the "localservice" user.
I want to access the FTP server with no anonymous user available to connect.
How can I connect with c# to the specific ftp server using same credentials as the current running user (local service) without need to save the user and password in a configuration file?
What is the best practice for doing so?
Thanks.
I have an API that runs in Azure App Service.
I have created a Subnet in Azure for my App Service, to be able to see the on premise server. However, when I try to use an FTP path to the on premise server from within my app running in Azure App Service, it does not work.
Trying to navigate to the \\172.28.2.10\\somefoler\\anotherfolder, it gets mapped to the following drive on the machine my API in Azure is running on: D:\\172.28.2.10\\somefoler\\anotherfolder. It gets mapped to the D drive on the machine my API is hosted on.
How do I successfully FTP to a folder on a server that is not hosted in my Azure enviornment?
You need either:
A hybrid connection from your App Service blade panel:
https://devblogs.microsoft.com/premier-developer/using-azure-app-services-with-hybrid-connections/#:~:text=Hybrid%20Connections%20is%20both%20a%20service%20in%20Azure,enable%20an%20alternate%20capability%20to%20access%20your%20application.
VPN gateway site to site or point to point to your on-premise resource.
https://learn.microsoft.com/es-es/azure/vpn-gateway/tutorial-site-to-site-portal
Expressroute
https://learn.microsoft.com/en-us/azure/architecture/reference-architectures/hybrid-networking/expressroute-vpn-failover
I have a simple azure web app that I'd like to be accessible only to another azure web app. Is there a way to achieve this very simple thing without having to pay arm and leg for Azure Service Environment
If you want to deploy your Azure App service on a virtual machine , there is no way to do that. But if you deploy your web application on an Azure VM your requirement can be implemented easily : just using this feature , your web app service can access your web application hosted on virtual machine in Azure VENT and your web application is 100% secure as there is no route to access it for public accesses.
If Azure web app service is necessary for your web application,you can adding your first web app service outbound IP into IP whitelist of the web app service that you want to limit accesses by others . For how to find outbound IP of web app service, pls refer to this doc
However, you know for common Azure app services ,outbound IPs are shared with other common Azure web apps , so this way is available but not so perfect.
Using managed Identity to protect your web app service will be a better and easy way I think: Requests that have passed Azure AD auth will be able to access your web app service.
What's more , in previous link , all ways to protect your web app service have been listed under "Secure app" section , which will be helpful for you too.
I'm implementing an WCF application (service) on Windows Azure to notify to my client (a WPF application, not Silverlight)
I have tried many ways for authentication connection to Windows Azure, such as:
Active Directory Azure: Connect success to Azure with authetication but IssuedTokenWSTrustBinding does not support Duplex.
WsDualHttpBinding: cannot connect with Azure because this binding does not authenticated .
ServiceCredentials :authentication mode:Windows, Federation,UsernamePassword :cannot connect with Azure because this binding does not authenticated .
, I have researched this problem more than 3 months but all ways couldn't successful.
I want to know, does Windows Azure support wcf duplex?