Azure App Service provides a way to configure access restriction policies to allow/deny network access on workloads (Azure Function App/Web App etc) hosted on the App Service. This policy can be set to allow/deny access based on
1) IP addresses
2) Azure Virtual Network subnets.
The detailed description of this capability is available in the Microsoft Documentation of this feature.
By setting network access restrictions, you can ensure that only the consumers with specific IP addresses or Azure Virtual Networks are allowed to access the App service.
In the below example, we have a API built using Azure Function App that can be consumed by several teams/business units within an organization. We have set access restrictions on the API app to allow specific IPs and Azure Virtual Networks.
There are a few considerations in order to configure these access restrictions through the Azure portal.
1) The user account that configures these access restrictions must be assigned specific privileges on the consumer's Virtual Network. Either 'Network Contributor' role can be assigned to this account OR to ensure the least privileges, a custom role with the below permissions can be assigned
- Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action
- Microsoft.Network/virtualNetworks/subnets/read
- Microsoft.Network/virtualNetworks/read
This means that individual user accounts from the API's development/operations team will have access to consumer's VNETs.
2) The user account must continue to have access on these virtual networks in order to be able to make any changes to the access restriction configurations. For example, if the access of a user account configuring these policies is removed from the "Cloud COE" VNET, an attempt to add or remove a policy fails.To get around this issue, the VNET from which user's access was revoked must be removed from the configuration first.
The failure message can be seen in detail through the Azure CLI
az webapp config access-restriction remove -g SharePointSiteProvisioningAPI -n SiteProvisioningAPI --rule-name "Cloud COE IP-1"
The client 'OpsUser@<domain>.onmicrosoft.com' with object id '<objectID>' has permission to perform action 'Microsoft.Web/sites/config/write' on scope '/subscriptions/<subscriptionID>/resourceGroups/SharePointSiteProvisioningAPI/providers/Microsoft.Web/sites/SiteProvisioningAPI/config/web'; however, it does not have permission to perform action 'joinViaServiceEndpoint/action' on the linked scope(s) '/subscriptions/<subscriptionID>/resourceGroups/CloudCenterOfExcellenceRG/providers/Microsoft.Network/virtualNetworks/CloudCOE-Vnet/subnets/CloudCOE-Subnet-SiteProv' or the linked scope(s) are invalid.
Automate access restriction configurations using a Service Principal :
The use of individual user accounts for configuring access restriction can be avoided by automating this operation using a Service Principal identity. One way to achieve this is by Azure PowerShell or Azure CLI. However, NOTE : that if you wish to whitelist a Virtual Network that lies in a different subscription, this isn't supported in Azure CLI at the time of writing this blog post.
Till the time (if and when ?) cross subscription whitelisting is available in Azure CLI/Az PowerShell, this can be achieved using the Azure Management REST API.
The script below authenticates to AAD using a Service Principal, which has been assigned a custom RBAC role (with permissions explained above) on the API consumer's Virtual Networks and uses the Azure Management API to update 'ipSecurityRestrictions' in web site's config. The Script is intended to be used on PowerShell Core with latest Az module version to enable the use of 'Get-AzAccessToken' command.
Configure the '$ipRules' and '$vnetRules' in the script to configure access restrictions.
# Configure the Azure Tenant ID | |
$tenantID = "<tenantID>" | |
# App ID of the service principal to be used for access restriction configurations | |
$AppId = "<AppID>" | |
# Azure Management API base URL. | |
$managementAPIUrl = "https://management.azure.com" | |
# Connect to the Azure tenant. This code uses AppID and Secret however | |
# an SPN with certificate credentials can be used. | |
$creds = Get-Credential | |
Connect-AzAccount -Tenant $tenantID -ServicePrincipal -Credential $creds | |
# Get the Access token to access Azure Management API. | |
$authToken = Get-AzAccessToken -ResourceUrl $managementAPIUrl | |
$accessToken = $authToken.Token | |
Write-Host "Token length" | |
Write-Host $accessToken.Length | |
# Configure the details of the Azure App Service where you want to set access restriction policies | |
$appServiceSubscriptionID = '<Subscription ID>' | |
$appServiceResourceGroup = 'SharePointSiteProvisioningAPI' | |
$APIAppName = 'SiteProvisioningAPI' | |
# Azure management API : App config API URL | |
$apiUrl = "https://management.azure.com/subscriptions/$appServiceSubscriptionID/resourceGroups/$appServiceResourceGroup/providers/Microsoft.Web/sites/$APIAppName/config/web?api-version=2020-06-01" | |
# Configure the Auth token to be sent in request header | |
$hdrs = @{} | |
$hdrs.Add("Authorization","Bearer $accessToken") | |
# Get the existing network restriction config | |
# We will use a PUT operation to configure access restrictions. So the existing configurations must be fetched | |
$accessRestrictionConfig = Invoke-RestMethod -Method Get -Headers $hdrs -Uri $apiUrl -ContentType 'application/json' | |
# Set the values to create IP rules. Set policy using 'Action' and 'RestrictionType' | |
$ipRules = @( | |
[pscustomobject]@{Name='ConsumerIP-1';IPAddress='1.2.3.4/31';Priority=100;Action="Add";RestrictionType="Allow"} | |
[pscustomobject]@{Name='ConsumerIP-2';IPAddress='1.0.0.1/32';Priority=100;Action="Add";RestrictionType="Allow"} | |
[pscustomobject]@{Name='ConsumerIP-3';IPAddress='1.0.0.2/32';Priority=100;Action="Remove"} | |
) | |
# Set the values to create VNET rules. Set policy using 'Action' and 'RestrictionType' | |
$vnetRules = @( | |
[pscustomobject]@{ | |
Name='R&D-Vnet'; | |
SubnetURL='/subscriptions/<SubscriptionID>/resourceGroups/<ResourceGroupName>/providers/Microsoft.Network/virtualNetworks/RAndD-Vnet[This-is-vnet-name]/subnets/RAndD-Subnet-SiteProv[This-is-Subnet-name]'; | |
Priority=100; | |
Action="Add"; | |
RestrictionType="Allow" | |
} | |
[pscustomobject]@{ | |
Name='CloudCOE-Vnet'; | |
SubnetURL='/subscriptions/<SubscriptionID>/resourceGroups/<ResourceGroupName>/providers/Microsoft.Network/virtualNetworks/CloudCOE-Vnet[This-is-vnet-name]/subnets/CloudCOE-Subnet-SiteProv[This-is-subnet-name]'; | |
Priority=100; | |
Action="Add"; | |
RestrictionType="Allow" | |
} | |
) | |
$functAppProperties = @{ | |
properties= @{ | |
ipSecurityRestrictions=@() | |
} | |
} | |
# Create config object for IP address rules | |
foreach($ipRule in $ipRules) | |
{ | |
$action = $null | |
Write-Host 'Working on IP Rule: '$ipRule.Name | |
if($ipRule.Action -and ($ipRule.Action -eq 'Add')) | |
{ | |
$whiteListRule = @{ | |
ipAddress= $ipRule.IPAddress | |
action= $ipRule.RestrictionType | |
priority= $ipRule.Priority | |
name= $ipRule.Name | |
} | |
$functAppProperties.properties.ipSecurityRestrictions += $whiteListRule | |
} | |
if($ipRule.Action -and ($ipRule.Action -eq 'Remove')) | |
{ | |
$accessRestrictionConfig.properties.ipSecurityRestrictions = $accessRestrictionConfig.properties.ipSecurityRestrictions | where-object {($_.ipAddress -ne $ipRule.IPAddress)} | |
} | |
} | |
# Create config object for VNET rules | |
foreach($vnetRule in $vnetRules) | |
{ | |
$action = $null | |
Write-Host 'Working on VNET Rule: '$vnetRule.Name | |
if($vnetRule.Action -and ($vnetRule.Action -eq 'Add')) | |
{ | |
$whiteListRule = @{ | |
vnetSubnetResourceId= $vnetRule.SubnetURL | |
action= $vnetRule.RestrictionType | |
priority= $vnetRule.Priority | |
name= $vnetRule.Name | |
} | |
$functAppProperties.properties.ipSecurityRestrictions += $whiteListRule | |
} | |
if($vnetRule.Action -and ($vnetRule.Action -eq 'Remove')) | |
{ | |
$accessRestrictionConfig.properties.ipSecurityRestrictions = $accessRestrictionConfig.properties.ipSecurityRestrictions | where-object {($_.vnetSubnetResourceId -ne $ipRule.SubnetURL)} | |
} | |
} | |
# Update the access restriction config using the Azure Management API | |
$body = $functAppProperties | ConvertTo-Json -Depth 10 | |
$Data = Invoke-RestMethod -Method Put -Body $body -Headers $hdrs -Uri $apiUrl -ContentType 'application/json' | |