Allow cloudshells to be whitelisted in network security groups
We whitelist IP's that are allowed to access privileged services. We'd like to be able to whitelist cloudshells for our staff members.
Benjamin Mitchell commented
This is a similar request to what we have for "https://feedback.azure.com/forums/598699-azure-cloud-shell/suggestions/34351408-allow-cloudshell-to-be-created-inside-a-vnet" - please go up-vote this if not so we can get this on Azure Devs radar.
Yongkang Liu commented
It'll be useful when public ip is not allowed in VMs. If the Azure Cloud Shell is connected to an existing vNet, we can access the VMs without public ip address.
Maxime Rastello commented
Would be great to be able to link an Azure Cloud Shell environment to an existing vNET. It would enable on-premises management scenarios, such as PowerShell over on-premises servers (if vNet is connected through a site-to-site VPN gateway).
Is there a plan to publish public IP ranges that are alloted to containers that run cloud shells? I intend to use NSGs to some training VMs to only have connections originate from Cloud Shell.