Edit

Share via


Inbound network protection in Microsoft Fabric

Microsoft Fabric provides several layers of inbound network protection to help organizations control where inbound connections can originate when accessing items and data. These capabilities allow tenant administrators and workspace administrators to enforce network boundaries, restrict public access, and route inbound connections through secure private channels. This article provides an overview of all inbound protection options, how they relate to one another, and guidance for choosing the right configuration for your environment.

Overview of inbound protection features

Fabric provides inbound protection at two scopes:

  • Tenant-level inbound protection: Tenant administrators configure these settings, which apply across all workspaces in the Fabric tenant. They include features like tenant-level Private Link and Microsoft Entra Conditional Access policies that restrict where inbound connections can originate.

  • Workspace-level inbound protection: Workspace administrators configure these settings, which apply to individual workspaces. They include workspace-level Private Link and workspace IP firewall rules that allow admins to define specific network boundaries for their workspaces.

By combining tenant-level and workspace-level inbound protection features, organizations can create a layered security approach that meets their specific access control requirements. The following sections provide more details about each feature and how they interact.

Tenant-level inbound protection

Tenant administrators can configure inbound controls that apply to every workspace unless overridden by workspace-specific settings.

  • Tenant-level Private Link: Routes all inbound connections to Fabric resources through Azure Private Link, ensuring traffic originates from approved virtual networks.
  • Microsoft Entra Conditional Access: Enforces identity-based access policies that can restrict inbound connections based on user location, device compliance, and other factors.
  • Service Tags: Allow or block inbound traffic from specific Azure services by using predefined service tags.
  • Enable workspace-level inbound rules: The tenant setting Configure workspace-level inbound network rules allows or disallows workspace admins from restricting public access at the workspace level. By default, workspace admins can't restrict inbound public access unless the tenant admin enables this setting. When enabled, workspace admins can apply workspace-level inbound restrictions - including private links - giving organizations finer-grained network segmentation.

These tenant-level features provide broad protections that help secure all workspaces in the tenant. However, workspace-level settings can complement them for more targeted control.

Workspace-level inbound protection

Workspace admins can apply more specific inbound security controls when the tenant allows them.

  • Workspace Private Link: Allows a workspace to establish a private endpoint in Azure, ensuring inbound connections originate only from approved networks.

  • Workspace inbound access protection: When the tenant enables workspace-level rules, workspace admins can toggle Restrict public access. Select this option to block public inbound connections and require inbound access through approved private networks.

  • Workspace IP firewall: Admins can configure workspace IP firewall rules to specify which IP ranges can access workspace items. This feature complements private link by enabling granular allowlists.

These layers can work independently or together, depending on organizational needs.

How network security settings interact

Understanding how tenant-level and workspace-level settings interact is essential for configuring secure inbound access. The following table shows how network configurations affect access to the Fabric portal and REST APIs.

Tenant admins can restrict public access only when tenant-level private links are enabled.

Table 1: Access to the Fabric portal based on network settings

Tenant-level public access setting Access from Can I access the Fabric portal? Can I access Fabric REST APIs?
Allowed Public internet Yes Yes, using api.fabric.microsoft.com
Allowed Network with tenant private link Yes Yes, using the tenant-specific FQDN
Allowed Network with workspace private link Yes Yes, using the workspace-specific FQDN
Allowed Allowed IP Yes Yes, using api.fabric.microsoft.com
Restricted Public internet No No
Restricted Network with tenant private link Yes Yes, using tenant-specific FQDN or api.fabric.microsoft.com endpoint, and only if the client allows outbound public access
Restricted Network with workspace private link No Yes, using the workspace-specific FQDN
Restricted Allowed public IP at workspace-level No Yes, using api.fabric.microsoft.com
Restricted Network with both tenant private link and workspace private link Yes Yes, using api.fabric.microsoft.com

Planning considerations for inbound protection

When planning inbound protection for your Fabric environment, consider the following factors:

  • You must be a Fabric administrator to enable tenant-level inbound rules.
  • Workspace-level features depend on tenant settings.
  • Private link requires Azure configuration.
  • IP firewall allows granular control but requires careful IP planning.
  • Consider whether a centralized or workspace-driven model best fits your environment.

Next steps

  • Learn more about [Workspace inbound access protection].
  • Learn more about workspace outbound access protection to understand the full network model.
  • Review Private Link configuration at both tenant and workspace levels.
  • Continue to the scenario articles for detailed setup guidance.