Skip to content

Private Connectivity Options

Comparison of methods to connect Azure services privately within a Virtual Network.

Feature Private Endpoint (PE) Service Endpoint (SE) VNet Integration
DNS Impact FQDN points to Private IP Public IP resolved N/A (App Service only)
Security NSG support (Inbound) VNet service rules (Outbound) NSG support (Outbound)
Scope Specific resource instance Entire service in region App Service to VNet
Cost Hourly rate + data transfer Free Free (Plan dependent)
Services Most PaaS & Link Services Key PaaS (Storage, SQL) App Service, Functions

mermaid graph TD User[Private Access Need] --> Target{Target Type?} Target -- PaaS Resource --> Scope{Specific Res?} Scope -- Yes --> PE[Private Endpoint] Scope -- No --> SE[Service Endpoint] Target -- App Outbound --> VNetI[VNet Integration]

Note

Migration from Service Endpoints to Private Endpoints is recommended for enhanced security, as PEs provide a private IP within your VNet and granular resource access.

Selection Checks

  • Choose PE for per-resource isolation and private IP-based access.
  • Choose SE when service-level restriction is acceptable and cost must stay minimal.
  • Use VNet Integration for outbound app connectivity from App Service and Functions.

See Also

Sources