Access a key vault in a private network through shared private endpoints

Azure Web PubSub can access a key vault in a private network through shared private endpoint connections. This article shows you how to configure your Web PubSub resource to route outbound calls to a key vault through a shared private endpoint instead of through a public network.

Diagram showing architecture of shared private endpoint.

Private endpoints of secured resources created through Azure Web PubSub APIs are called shared private link resources. You "share" access to a resource, such as an instance of Azure Key Vault, that is integrated with Azure Private Link. These private endpoints are created inside the Web PubSub execution environment and aren't directly visible to you.

Note

The examples in this article use the following resource IDs:

  • The resource ID of this Azure Web PubSub instance is _/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.SignalRService/webpubsub/contoso-webpubsub.
  • The resource ID of the Azure Key Vault instance is /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.KeyVault/vaults/contoso-kv.

To use the steps in the following examples, replace these values with your own subscription ID, the name of your Web PubSub resource, and the name of your Azure Key Vault resource.

Prerequisites

  • An Azure account with an active subscription. Create a trial subscription.
  • The Azure CLI 2.25.0 or later (if you use the Azure CLI).
  • An Azure Web PubSub instance in a minimum Standard pricing tier.
  • An Azure Key Vault resource.

Create a shared private endpoint resource to the key vault

  1. In the Azure portal, go to your Azure Web PubSub resource.

  2. On the left menu, select Networking.

  3. Select the Private access tab.

  4. Select Add shared private endpoint.

    Screenshot of shared private endpoints management.

  5. For Name, enter a name to use for the shared private endpoint.

  6. To select your key vault resource, complete one of the following steps:

    • Choose Select from your resources and select your resource from the lists.
    • Select Specify resource ID and enter your key vault resource ID.
  7. For Request message, enter Please approve.

  8. Select Add.

    Screenshot of adding a shared private endpoint.

The shared private endpoint resource provisioning state is Succeeded. The connection state is Pending and waiting for approval for the target resource.

Screenshot of an added shared private endpoint.

Approve the private endpoint connection for the key vault

After the private endpoint connection is created, the connection request from Web PubSub must be approved in your Key Vault resource.

  1. In the Azure portal, go to your Key Vault resource.

  2. On the left menu, select Networking.

  3. Select Private endpoint connections.

    Screenshot of the Azure portal, showing the Private endpoint connections pane.

  4. Select the private endpoint that Web PubSub created.

  5. Select Approve, and then select Yes to confirm.

    It might take a few minutes for the private endpoint connection status to change to Approved.

    Screenshot of the Azure portal, showing an Approved status on the Private endpoint connections pane.

It takes a few minutes for the approval to be propagated to Azure Web PubSub Service. You can check the state using either Azure portal or Azure CLI. The shared private endpoint between Azure Web PubSub Service and Azure Key Vault is active when the container state is approved.

  1. In the Azure portal, go to your Azure Web PubSub resource.

  2. On the left menu, select Networking.

  3. Select Shared private link resources.

    Screenshot of an approved shared private endpoint.

Now you can configure features like a custom domain as you typically would. You don't have to use a special domain for your key vault. Web PubSub automatically handles Domain Name System (DNS) resolution.