4 votesErik shared this idea ·
Great news – static IP range for Azure Integration Runtime is now available in all ADF regions! You can whitelist specific IP ranges for ADF as part of firewall rules. The IPs are documented here: https://docs.microsoft.com/en-us/azure/data-factory/azure-integration-runtime-ip-addresses#azure-integration-runtime-ip-addresses-specific-regions. Static IP ranges for gov cloud and China cloud will be published soon!
Please refer to this blog post on how you can use various mechanisms including trusted Azure service and static IP to secure data access through ADF:
Service tag support will be made available in next few weeks. Please stay tuned!
If your network security requirement calls for ADF support for VNet and cannot be met using Trusted Azure service (released in Oct 2019), static IP range (released in Jan 2020), or service tag (upcoming), please vote for VNet feature here: https://feedback.azure.com/forums/270578-data-factory/suggestions/37105363-data-factory-should-be-able-to-use-vnet-without-reErik supported this idea ·
An error occurred while saving the commentErik commented
+1 for us as well. We need this feature or at least a tag in SQL Database/ ADLS where we can identify "Allow our subscription services" or better yet where you can specify allowing specific instances of ADF.
Others may not be aware that when you enable Azure services in your SQL Database firewall, you open up your server to connection from anyone's VM anywhere in Azure. This is a significant risk for us.