Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Applies to: ✔️ Front Door Premium
Azure Private Link enables you to access Azure PaaS services and services hosted in Azure over a private endpoint in your virtual network. Traffic between your virtual network and the service goes over the Microsoft backbone network, eliminating exposure to the public Internet.
Azure Front Door Premium can connect to your origin using Private Link. Your origin can be hosted in a virtual network or hosted as a PaaS service such as Azure Web App or Azure Storage. Private Link removes the need for your origin to be accessed publicly.
How Private Link works
When you enable Private Link to your origin in Azure Front Door Premium, Front Door creates a private endpoint on your behalf from an Azure Front Door managed regional private network. You receive an Azure Front Door private endpoint request at the origin pending your approval.
You must approve the private endpoint connection before traffic can pass to the origin privately. You can approve private endpoint connections by using the Azure portal, Azure CLI, or Azure PowerShell. For more information, see Manage a Private Endpoint connection.
After you enable an origin for Private Link and approve the private endpoint connection, it can take a few minutes for the connection to be established. During this time, requests to the origin receives an Azure Front Door error message. The error message goes away once the connection is established.
Once your request is approved, a dedicated private endpoint gets assigned for routing your traffic from the Azure Front Door managed virtual network. Traffic from your clients will reach Azure Front Door Global POPs and is then routed over the Microsoft backbone network to the AFD regional cluster which hosts the managed virtual network containing the dedicated private endpoint. The traffic is then routed to your origin via the private link platform over Microsoft backbone network. Hence the incoming traffic to your origin secured upon the moment it arrives to Azure Front Door.
Note
- This feature only supports private link connectivity from your AFD to your origin. Client to AFD private connectivity is not supported.
Supported origins
Origin support for direct private endpoint connectivity is currently limited to the below origin types.
Origin type | Documentation |
---|---|
App Service (Web App, Function App) | Connect AFD to a Web App / Function App origin with Private Link. |
Blob Storage | Connect AFD to a storage account origin with Private Link. |
Storage Static Website | Connect AFD to a storage static website origin with Private Link. |
Internal load balancers, or any services that expose internal load balancers such as Azure Kubernetes Service, or Azure Red Hat OpenShift | Connect AFD to an internal load balancer origin with Private Link. |
API Management | Connect AFD to an API Management origin with Private Link. |
Application Gateway | Connect AFD to an application gateway origin with Private Link. |
Azure Container Apps | Connect AFD to an Azure Container Apps origin with Private Link. |
Note
- This feature isn't supported with Azure App Service Slots and Azure Static Web App.
Region availability
Azure Front Door private link is available in the following regions:
Americas | Europe | Africa | Asia Pacific |
---|---|---|---|
Brazil South | France Central | South Africa North | Australia East |
Canada Central | Germany West Central | Central India | |
Central US | North Europe | Japan East | |
East US | Norway East | Korea Central | |
East US 2 | UK South | East Asia | |
South Central US | West Europe | South East Asia | |
West US 2 | Sweden Central | ||
West US 3 | |||
US Gov Arizona | |||
US Gov Texas | |||
US Gov Virginia |
The Azure Front Door Private Link feature is region agnostic but for the best latency, you should always pick an Azure region closest to your origin when choosing to enable Azure Front Door Private Link endpoint. If your origin's region is not supported in the list of regions AFD Private Link supports, pick the next nearest region. You can use Azure network round-trip latency statistics to determine the next nearest region in terms of latency.
Tips while using AFD Private Link integration
- Azure Front Door doesn't allow mixing public and private origins in the same origin group. Doing so can cause errors during configuration or while AFD tries to send traffic to the public/private origins. Keep all your public origins in a single origin group and keep all your private origins in a different origin group.
- Improving redundancy:
- To improve redundancy at origin level, make sure you have multiple private link enabled origins within the same origin group so that AFD can distribute traffic across multiple instances of the application. If one instance is unavailable, then other origins can still receive traffic.
- To route Private Link traffic, requests are routed from AFD POPs to the AFD managed virtual network hosted in AFD regional clusters. To have redundancy in case the regional cluster is not reachable, it is recommended to configure multiple origins (each with a different Private Link region) under the same AFD origin group. This way even if one regional cluster is unavailable, then other origins can still receive traffic via a different regional cluster. Below is how an origin group with both origin level and region level redundancy would look like.
- While approving the private endpoint connection or after approving the private endpoint connection, if you double click on the private endpoint, you will see an error message saying "You don't have access. Copy the error details and send them to your administrator(s) to get access to this page." This is expected as the private endpoint is hosted within a subscription managed by Azure Front Door.
- For platform protection, each AFD regional cluster has a limit of 7200 RPS (requests per second) per AFD profile. Requests beyond 7200 RPS will be rate limited with "429 Too Many Requests". If you are onboarding or expecting traffic more than 7200 RPS, we recommend deploying multiple origins (each with a different Private Link region) so that traffic is spread across multiple AFD regional clusters. It is recommended that each origin is a separate instance of your application to improve origin level redundancy. But if you can not maintain separate instances, you can still configure multiple origins at AFD level with each origin pointing to the same hostname but the regions are kept different. This way AFD will route the traffic to the same instance but via different regional clusters.
Association of a private endpoint with an Azure Front Door profile
Private endpoint creation
Within a single Azure Front Door profile, if two or more Private Link enabled origins are created with the same set of resource ID, group ID and region, then for all such origins only one private endpoint gets created. Connections to the backend can be enabled using this private endpoint. This setup means you only have to approve the private endpoint once because only one private endpoint gets created. If you create more Private Link enabled origins using the same set of Private Link ___location, resource ID, and group ID, you don't need to approve any more private endpoints.
Single private endpoint
For example, a single private endpoint gets created for all the different origins across different origin groups but in the same Azure Front Door profile as shown in the following table:
Multiple private endpoints
A new private endpoint gets created in the following scenario:
If the region, resource ID or group ID changes, AFD considers that the Private Link ___location and the hostname has changed, resulting in extra private endpoints created and each one needs to be approved.
Enabling Private Link for origins in different Front Door profiles will create extra private endpoints and requires approval for each one.
Private endpoint removal
When an Azure Front Door profile gets deleted, private endpoints associated with the profile also get deleted.
Single private endpoint
If AFD-Profile-1 gets deleted, then the PE1 private endpoint across all the origins also gets deleted.
Multiple private endpoints
If AFD-Profile-1 gets deleted, all private endpoints from PE1 through to PE4 gets deleted.
Deleting an Azure Front Door profile doesn't affect private endpoints created for a different Front Door profile.
For example:
- If AFD-Profile-2 gets deleted, only PE5 is removed.
- If AFD-Profile-3 gets deleted, only PE6 is removed.
- If AFD-Profile-4 gets deleted, only PE7 is removed.
- If AFD-Profile-5 gets deleted, only PE8 is removed.
Next steps
- Learn how to connect Azure Front Door Premium to a Web App origin with Private Link.
- Learn how to connect Azure Front Door Premium to a storage account origin with Private Link.
- Learn how to connect Azure Front Door Premium to an internal load balancer origin with Private Link.
- Learn how to connect Azure Front Door Premium to a storage static website origin with Private Link.
- Learn how to connect Azure Front Door Premium to an application gateway origin with Private Link.
- Learn how to connect Azure Front Door Premium to an API Management origin with Private Link.
- Learn how to connect Azure Front Door Premium to an Azure Container Apps origin with Private Link.