Create and configure a private endpoint for IoT Central

You can connect your devices to your IoT Central application by using a private endpoint in an Azure Virtual Network.

Private endpoints use private IP addresses from a virtual network address space to connect your devices privately to your IoT Central application. Network traffic between devices on the virtual network and the IoT platform traverses the virtual network and a private link on the Microsoft backbone network, eliminating exposure on the public internet. This article shows you how to create a private endpoint for your IoT Central application.


Create a private endpoint

There are several ways to create a private endpoint for IoT Central application:

To create a private endpoint on an existing IoT Central application:

  1. In the Azure portal, navigate to your application and then select Networking.

  2. Select the Private endpoint connections tab, and then select + Private endpoint.

  3. On the Basics tab, enter a name and select a region for your private endpoint. Then select Next: Resource.

  4. The Resource tab is auto-populated for you. Select Next: Virtual Network.

  5. On the Virtual Network tab, select the Virtual network and Subnet where you want to deploy your private endpoint.

  6. On the same tab, in the Private IP configuration section, select Dynamically allocate IP address.

  7. Select Next: DNS.

  8. On the DNS tab, select Yes for Integrate with private DNS zone. The private DNS resolves all the required endpoints to private IP addresses in your virtual network.

    Screenshot from Azure portal that shows private DNS integration.


    Because of the autoscale capabilities in IoT Central, you should use the Private DNS integration option if at all possible. If for some reason you can't use this option, see Use a custom DNS server.

  9. Select Next: Tags.

  10. On the Tags tab, configure any tags you require, and then select Next: Review + Create.

  11. Review the configuration details and then select Create to create your private endpoint resource.

Screenshot from the Azure portal that shows the summary for creating a private endpoint.

Verify private endpoint creation

When the creation of the private endpoint is complete, you can access it in the Azure portal.

To see all the private endpoints created for your application:

  1. In the Azure portal, navigate to your IoT Central application, and then select Networking.

  2. Select the Private endpoint connections tab. The table shows all the private endpoints created for your application.

Screenshot from the Azure portal showing the list of private endpoints.

Use a custom DNS server

In some situations, you may not be able to integrate with the private DNS zone of the virtual network. For example, you may use your own DNS server or create DNS records using the host files on your virtual machines. This section describes how to get to the DNS zones.

  1. Install chocolatey.

  2. Install ARMClient:

    choco install armclient
  3. Sign in with ARMClient:

    armclient login 
  4. Use the following command to get the private DNS zones for your IoT Central application. Replace the placeholders with the details for your IoT Central application:

    armclient GET /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.IoTCentral/IoTApps/<AppName>/privateLinkResources?api-version=2021-11-01-preview
  5. Check the response. The required DNS zones are in the requiredZoneNames array in the response payload:

      "value": [  
          "id": "/subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.IoTCentral/IoTApps/<AppName>/privateLinkResources/iotApp",  
          "name": "ioTApp",  
          "type": "Microsoft.IoTCentral/IoTApps/privateLinkResources",  
          "location": "<the region of your application>",  
          "properties": {  
          "groupId": "iotApp",  
            "<IoTCentral Name>",  
            "<DPS Name>",  
            "<IoTHub1 Name>",  
            "<IoTHub2 Name>",  
            "<EH1 Name>",  
            "<EH2 Name>"],  
          "requiredZoneNames": [  
          "provisioningState": "Succeeded"}  
  6. In the Azure portal, navigate to your private endpoint, and select DNS configuration. On this page, you can find the required information for the IP address mapping to the DNS name.

Screenshot from the Azure portal that shows the private DNS configuration.


This information lets you populate your custom DNS server with the necessary records. If at all possible, you should integrate with the private DNS Zones of the virtual network and not configure your own custom DNS server. Private endpoints for IoT Central applications differ from other Azure PaaS services. In some situations, such as IoT Central autoscaling, IoT Central scales out the number of IoT Hubs accessible through the private endpoint. If you choose to populate your own custom DNS server, it's your responsibility to update the DNS records whenever IoT Central autoscales, and later remove records when the number of IoT hubs scales in.

Restrict public access

To restrict public access for your devices to IoT Central, turn off access from public endpoints. After you turn off public access, devices can't connect to IoT Central from public networks, and must use a private endpoint:

  1. In the Azure portal, navigate to your IoT Central application and then select Networking.

  2. On the Public access tab, select Disabled for public network access:

    Screenshot from the Azure portal that shows how to disable public access.

  3. Optionally, you can define a list of IP addresses/ranges that can connect to the public endpoint of your IoT Central application.

  4. Select Save.

Connect to a private endpoint

When you disable public network access for your IoT Central application, your devices won't be able to connect to the Device Provisioning Service (DPS) global endpoint. This happens because the only FQDN for DPS has a direct IP address in your virtual network. The global endpoint is now unreachable.

When you configure a private endpoint for your IoT Central application, the IoT Central service endpoint is updated to reflect the direct DPS endpoint.

Update your device code to use the direct DPS endpoint.

Screenshot from I o T Central application that shows the direct DPS endpoint.

Best practices

  • Don't use private link subdomain URLs to connect your devices to IoT Central. Always use the DPS URL shown in your IoT Central application after you create the private endpoint.

  • Using Azure provided private DNS zones for DNS management. Avoid using your own DNS server because you would need to constantly update your DNS configuration to keep up as IoT Central autoscales its resources.

  • If you create multiple private endpoints for same IoT Central resource, the DNS Zone may overwrite the FQDNs so you should add them again.


  • Currently, private connectivity is only enabled for device connections to the underlying IoT hubs and DPS in the IoT Central application. The IoT Central web UI and APIs continue to work through their public endpoints.

  • The private endpoint must be in the same region as your virtual network.

  • When you disable public network access:

    • IoT Central simulated devices won't work because they don't have connectivity to your virtual network.

    • The global DPS endpoint ( isn't accessible. Update your device firmware to connect to the direct DPS instance. You can find the direct DPS URL in the Device connection groups page in your IoT Central application.

  • You can't rename your IoT Central application after you configure a private endpoint.

  • You can't move your private endpoint or the IoT Central application to another resource group or subscription.

  • Support is limited to IPv4. IPv6 isn't supported.


If you're having trouble connecting to a private endpoint, use the following troubleshooting guidance:

Check the connection state

Make sure your private endpoint's connection state is set to approved.

  1. In the Azure portal, navigate to your application and then select Networking.
  2. Select the Private endpoints connection tab. Verify that the connection state is Approved for your private endpoint.

Run checks within the virtual network

Use the following checks to investigate connectivity issues from within the same virtual network. Deploy a virtual machine in the same virtual network where you created the private endpoint. Sign in to the virtual machine, to run the following tests.

To make sure that name resolution is working properly, iterate over all the FQDNs in the private endpoint DNS configuration and run the tests using nslookup, Test-NetConnection, or other similar tools to verify that each DNS matches its corresponding IP address.

In addition, run the following command to verify the DNS name of each FQDN matches with the corresponding IP address.

#replace the <...> placeholders with the correct values 
nslookup iotc-… 

The result looks like the following output:

#Results in the following output: 

Non-authoritative answer:
canonical name =

If you find an FQDN that doesn't match its corresponding IP address, fix your custom DNS server. If you aren't using a custom DNS server, create a support ticket.

Check if you have multiple private endpoints

DNS configuration can be overwritten if you create or delete multiple private endpoints for a single IoT Central application:

  • In the Azure portal, navigate to the private endpoint resource.
  • In the DNS section, make sure there are entries for all required resources: IoT Hubs, Event Hubs, DPS and IoT Central FQDNs.
  • Verify that the IPs (and IPs for other private endpoints using this DNS zone) are reflected in the A record of the DNS.
  • Remove any A records for IPs from older private endpoints that have already been deleted.

Other troubleshooting tips

If after trying all these checks you're still experiencing an issue, try the private endpoint troubleshooting guide.

If all the checks are successful and your devices still can't establish a connection to IoT Central, contact the corporate security team responsible for firewalls and networking in general. Potential reasons for failure include:

  • Misconfiguration of your Azure virtual network
  • Misconfiguration of a firewall appliance
  • Misconfiguration of user defined routes in your Azure virtual network
  • A misconfigured proxy between the device and IoT Central resources

Next steps

Now that you've learned how to create a private endpoint for your application, here's the suggested next step: