Deny Public Network Access in Azure Database for MySQL - Flexible Server by using the Azure portal

This tutorial describes how to configure an Azure Database for MySQL Flexible Server instance to:

  • Deny all public network access and
  • Allow only connections through private endpoints.

Deny public access during the creation of MySQL flexible server

  1. During Quickstart: Create an instance of Azure Database for MySQL with the Azure portal: In the Networking tab, choose Public access (allowed IP addresses) and Private endpoint as the connectivity method.

  2. To disable public access on the Azure Database for MySQL Flexible Server instance you're creating, uncheck Allow public access to this resource through the internet using a public IP address under Public access.

    Screenshot of denying public access from the portal.

  3. After entering the remaining information in the other tabs, select Review + Create to deploy the Azure Database for MySQL Flexible Server instance without public access.

Deny public access to an existing MySQL flexible server

Note

Requirement: the server is deployed with connectivity Public access (allowed IP addresses) and Private endpoint.

  1. On the Azure Database for MySQL Flexible Server page, under Settings, select Networking.

  2. To disable public access on the Azure Database for MySQL Flexible Server instance, uncheck Allow public access to this resource through the internet using a public IP address under Public access.

    Screenshot of denying public access from the portal next screen.

  3. Select Save to save the changes.