@prasantc Private endpoints in Azure App Service Environment allow you to securely access your web apps over Azure Private Link. Private endpoints provide secure connectivity between clients on your private network and your app.
The private endpoint is assigned an IP address from the IP address range of your virtual network.
The connection between the private endpoint and the app uses a secure Private Link. Private endpoints are only used for incoming traffic to your app. Outgoing traffic won't use this private endpoint.
Using private endpoints for your app enables you to:
- Secure your app by configuring the private endpoint and disable public network access to eliminating public exposure
- Securely connect to your app from on-premises networks that connect to the virtual network using a VPN or ExpressRoute private peering
- Avoid any data exfiltration from your virtual network
In order to enable private endpoint for apps hosted in an IsolatedV2 plan (App Service Environment v3), you have to enable the private endpoint support at the App Service Environment level. You can activate the feature by the Azure portal in the App Service Environment configuration pane, or through the following CLI:
az appservice ase update --name myasename --allow-new-private-endpoint-connections true
For more details you may refer to below official document links would be helpful
- https://learn.microsoft.com/en-us/azure/app-service/networking/private-endpoint
- https://learn.microsoft.com/en-us/azure/app-service/environment/networking Let us know if further query or issue remains.