Proposed Pull Request Change

title titleSuffix description author ms.author ms.service ms.topic ms.date
Approve private endpoint connections across subscriptions Azure Private Link Get started learning how to approve and manage private endpoint connections across subscriptions by using Azure Private Link. abell abell azure-private-link how-to 03/25/2025
📄 Document Links
GitHub View on GitHub Microsoft Learn View on Microsoft Learn
Raw New Markdown
Generating updated version of doc...
Rendered New Markdown
Generating updated version of doc...
+0 -0
+0 -0
--- title: Approve private endpoint connections across subscriptions titleSuffix: Azure Private Link description: Get started learning how to approve and manage private endpoint connections across subscriptions by using Azure Private Link. author: abell ms.author: abell ms.service: azure-private-link ms.topic: how-to ms.date: 03/25/2025 # Customer intent: As a network administrator, I want to approve Private Link connections across Azure subscriptions. --- # Approve Private Link connections across subscriptions Azure Private Link enables you to connect privately to Azure resources. Private Link connections are scoped to a specific subscription. This article shows you how to approve a private endpoint connection across subscriptions. ## Prerequisites - Two active Azure subscriptions: - One subscription hosts the Azure resource and the other subscription contains the consumer private endpoint and virtual network. - An administrator account for each subscription or an account with permissions in each subscription to create and manage resources. Resources used in this article: | Resource | Subscription | Resource group | Location | | --- | --- | --- | --- | | **storage1** *(This name is unique. Replace with the name you create.)* | subscription-1 | test-rg | East US 2 | | **vnet-1** | subscription-2 | test-rg | East US 2 | | **private-endpoint** | subscription-2 | test-rg | East US 2 | ## Sign in to subscription-1 Sign in to **subscription-1** in the [Azure portal](https://portal.azure.com). ## Register the resource providers for subscription-1 For the private endpoint connection to complete successfully, the `Microsoft.Storage` and `Microsoft.Network` resource providers must be registered in **subscription-1**. Use the following steps to register the resource providers. If the `Microsoft.Storage` and `Microsoft.Network` resource providers are already registered, skip this step. > [!IMPORTANT] > If you're using a different resource type, you must register the resource provider for that resource type if it's not already registered. 1. In the search box at the top of the portal, enter **Subscription**. Select **Subscriptions** in the search results. 1. Select **subscription-1**. 1. In **Settings**, select **Resource providers**. 1. In the **Resource providers** filter box, enter **Microsoft.Storage**. Select **Microsoft.Storage**. 1. Select **Register**. 1. Repeat the previous steps to register the `Microsoft.Network` resource provider. ## Create a resource group 1. In the search box at the top of the portal, enter **Resource group**. Select **Resource groups** in the search results. 1. Select **+ Create**. 1. On the **Basics** tab of **Create a resource group**, enter, or select the following information: | Setting | Value | | ------- | ----- | | **Project details** | | | Subscription | Select **subscription-1**. | | Resource group | Enter **test-rg**. | | Region | Select **East US 2**. | 1. Select **Review + Create**. 1. Select **Create**. [!INCLUDE [create-storage-account.md](~/reusable-content/ce-skilling/azure/includes/create-storage-account.md)] ## Obtain the storage account resource ID You need the storage account resource ID to create the private endpoint connection in **subscription-2**. Use the following steps to obtain the storage account resource ID. 1. In the search box at the top of the portal, enter **Storage account**. Select **Storage accounts** in the search results. 1. Select **storage1** or the name of your existing storage account. 1. In **Settings**, select **Endpoints**. 1. Copy the entry in **Storage account resource ID**. ## Sign in to subscription-2 Sign in to **subscription-2** in the [Azure portal](https://portal.azure.com). ## Register the resource providers for subscription-2 For the private endpoint connection to complete successfully, the `Microsoft.Storage` and `Microsoft.Network` resource providers must be registered in **subscription-2**. Use the following steps to register the resource providers. If the `Microsoft.Storage` and `Microsoft.Network` resource providers are already registered, skip this step. > [!IMPORTANT] > If you're using a different resource type, you must register the resource provider for that resource type if it's not already registered. 1. In the search box at the top of the portal, enter **Subscription**. Select **Subscriptions** in the search results. 1. Select **subscription-2**. 1. In **Settings**, select **Resource providers**. 1. In the **Resource providers** filter box, enter **Microsoft.Storage**. Select **Microsoft.Storage**. 1. Select **Register**. 1. Repeat the previous steps to register the `Microsoft.Network` resource provider. [!INCLUDE [virtual-network-create.md](~/reusable-content/ce-skilling/azure/includes/virtual-network-create.md)] ## Create private endpoint 1. In the search box at the top of the portal, enter **Private endpoint**. Select **Private endpoints**. 1. Select **+ Create** in **Private endpoints**. 1. On the **Basics** tab of **Create a private endpoint**, enter, or select the following information: | Setting | Value | | ------- | ----- | | **Project details** | | | Subscription | Select **subscription-2**. | | Resource group | Select **test-rg**. | | **Instance details** | | | Name | Enter **private-endpoint**. | | Network Interface Name | Leave the default of **private-endpoint-nic**. | | Region | Select **East US 2**. | 1. Select **Next: Resource**. 1. Select **Connect to an Azure resource by resource ID or alias**. 1. In **Resource ID or alias**, paste the storage account resource ID that you copied earlier. 1. In **Target sub-resource**, enter **blob**. 1. Select **Next: Virtual Network**. 1. In **Virtual Network**, enter or select the following information: | Setting | Value | | ------- | ----- | | **Networking** | | | Virtual network | Select **vnet-1 (test-rg)**. | | Subnet | Select **subnet-1**. | 1. Select **Next: DNS**. 1. Select **Next: Tags**. 1. Select **Review + Create**. 1. Select **Create**. ## Approve private endpoint connection The private endpoint connection is in a **Pending** state until approved. Use the following steps to approve the private endpoint connection in **subscription-1**. 1. In the search box at the top of the portal, enter **Private endpoint**. Select **Private endpoints**. 1. Select **Pending connections**. 1. Select the box next to your storage account in **subscription-1**. 1. Select **Approve**. 1. Select **Yes** in **Approve connection**. ## Next steps In this article, you learned how to approve a private endpoint connection across subscriptions. To learn more about Azure Private Link, continue to the following articles: - [Azure Private Link overview](private-link-overview.md) - [Azure private endpoint overview](private-endpoint-overview.md)
Success! Branch created successfully. Create Pull Request on GitHub
Error: