An Azure service that provides private connectivity from a virtual network to Azure platform as a service, customer-owned, or Microsoft partner services.
Thanks for reaching out in Microsoft Q&A forum,
Are there other requirements when accessing Azure Storage, Synapse Studio, Synapse database through VDI environments?
Yes. Beyond basic network connectivity and Private Endpoint setup, VDI environments have three additional requirements that standard desktop setups don't:
- Proxy bypass configuration – VDI traffic typically routes through a corporate security proxy (like Zscaler). Azure Private Endpoint traffic must bypass this proxy and go DIRECT, because Private Endpoints are private network resources, not internet destinations.
- SSL inspection exclusion – Security proxies often decrypt and re-encrypt HTTPS traffic for inspection. This breaks Azure services that use certificate pinning (like Azure AD authentication) or require persistent TLS sessions (like Synapse Studio's WebSocket connections).
- Token acquisition path – Azure AD authentication flows from VDI must reach Microsoft Entra ID endpoints without proxy interference. If the proxy intercepts these calls, token acquisition fails even though DNS and TCP tests pass.
Is there anything that needs to be configured at Azure side/VDI side/Zscaler side?
Azure Side: Nothing additional is needed. Your current setup (Private Endpoints, Azure AD authentication, RBAC roles) is already correct. The fact that operations work outside VDI proves this. Specifically:
- No need to whitelist VDI outbound IPs in Azure Storage firewalls
- No need to change Private Endpoint configurations
- No need to modify Synapse workspace network settings
- Just ensure "Allow Azure Services on the trusted services list" is enabled on the Storage Account (this allows Synapse's managed identity to access storage)
VDI Side: Two things to verify:
- Clear any cached Azure AD tokens and do a fresh sign-in inside VDI (stale tokens can cause weird failures)
- Ensure Conditional Access policies in Azure AD aren't blocking VDI IP ranges or requiring MFA methods that don't work in VDI sessions
Zscaler Side (This is where the fix is): Your Zscaler team must configure:
SSL Inspection Bypass for these FQDNs (do NOT decrypt):
- SSL Inspection Bypass for these FQDNs (do NOT decrypt):
-
*.dfs.core.windows.net -
*.blob.core.windows.net -
*.sql.azuresynapse.net -
*.dev.azuresynapse.net -
login.microsoftonline.com -
*.aadcdn.microsoftonline-p.com
-
- Proxy Bypass in the PAC file for:
- Private IP ranges (10.x.x.x, 172.16.x.x, 192.168.x.x) – this covers all Private Endpoint traffic
- The specific FQDNs listed above
- WebSocket/WSS allowance – Synapse Studio needs WebSocket upgrades and long-lived HTTPS sessions without idle timeout termination
- Authorization header passthrough – Don't modify or strip Bearer tokens in requests
This is the critical piece. Zscaler is treating Private Endpoint traffic like internet traffic when it should be treated as internal private network traffic.
already had multiple calls with VDI and Zscaler team but no resolution yet
The issue is that network teams often test connectivity (DNS, TCP ports) and see everything green, so they assume the configuration is correct. But those tests don't validate:
- Whether SSL inspection is breaking certificate pinning
- Whether WebSocket upgrades are being blocked
- Whether Azure AD token flows are being intercepted
What your Zscaler team needs to do is check their transaction logs during a failed operation (like creating a folder). Look for the FQDNs *.dfs.core.windows.net or *.sql.azuresynapse.net and check if the transaction shows SSL_INSPECTED or CERT_REPLACED. If it does, that's your smoking gun SSL inspection is breaking the connection.
Once they add those FQDNs to the SSL inspection bypass list and configure proxy bypass for Private Endpoint IP ranges, everything will start working immediately.
Do we need to whitelist VDI's outbound IP in Azure portal tunnels: but as mentioned earlier network connectivity is there from VDI. TCP test connection and nslookup gave correct output
No, absolutely not. Here's why:
- You've already confirmed network connectivity works (TCP tests pass, nslookup returns correct private IPs)
- Upload operations and container creation already succeed from VDI
- The same user and permissions work outside VDI
If you needed to whitelist VDI IPs in Azure Storage firewalls, nothing would work from VDI – not even uploads or container creation. The fact that some operations work proves the firewall already allows your traffic through the Private Endpoint.
The problem isn't Azure blocking your IP, it's Zscaler intercepting and breaking specific types of connections (persistent TLS sessions, WebSockets, Azure AD token flows) that data-plane operations require. Whitelisting IPs in Azure won't fix proxy interception issues.
Reference:
- Connect to a secure Azure storage account from Synapse
- Zscaler & Azure Traffic Forwarding Deployment Guide
- Azure Private Link with Azure Virtual Desktop
- Manage Azure private endpoints
Kindly let us know if the above helps or you need further assistance on this issue.
Please do not forget to
and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.