Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Network | Monitoring » Configure Azure Container Registry for a secure connection with Azure Container Apps
  • Get certificate thumbprint
    Retrieve an SSL Thumbprint in Windows using PowerShell Scripts
  • image 22
    How to clone a Windows Server running on VirtualBox Virtualization
  • Norton AV
    Enable or disable Norton silent mode on Mac Anti-Virus Solution
  • image 166
    How to deploy a .NET application to AWS Elastic Beanstalk using AWS Tool Kit AWS/Azure/OpenShift
  • Uninstall MicrosoftDefenderUpdate
    What you need to know about Microsoft Defender Antivirus Security | Vulnerability Scans and Assessment
  • settings app not working featured 800x400 1
    How to search through the Windows registry Windows Server
  • MBAM Client
    How to Check if MBAM Agent is installed on Windows PC Windows
  • aks 1
    Azure Storage: How to create Blob Storage and upload files AWS/Azure/OpenShift

Configure Azure Container Registry for a secure connection with Azure Container Apps

Posted on 10/02/202414/03/2024 Raphael Gab-Momoh By Raphael Gab-Momoh No Comments on Configure Azure Container Registry for a secure connection with Azure Container Apps
How-to-configure-Azure-container-register-with-secured-connection-with-container-apps

Ensuring container app resource security is important, and creating a private endpoint for security ensures it. This guide prioritizes actively configuring Azure Container Registry for secure connections with Azure Container Apps. Microsoft Azure empowers users with Azure Container Registry, enabling secure storage and management of Docker container images via Docker Hub technology. Please see how to Join Bulk Devices using a Provisioning Package to Azure again Deploy a Static Website to Azure Storage from VSCode.

Azure Container Apps, a Microsoft Azure solution, actively simplifies deploying and managing containerized applications at scale, providing seamless scalability and management capabilities.

Leveraging Azure’s infrastructure streamlines deployment processes, offering features like automatic scaling, integrated monitoring, and seamless integration with Azure services.

Explore additional useful guides available here for further insights. How to Deploy Azure Resources Using Azure Bicep and How to Install Azure DevOps Server 2022 also Step-by-step guide on how to set up the Synology DS923+ NAS.

Configuring Azure Container Registry for secure connections

Create a user-managed identity.
Configure Container Registry with AcrPull permissions for the managed identity, and configure Container Registry with a private endpoint connection

Create a user-assigned managed identity for container app resource security

User-assigned managed identities provide a way to separate identity management from the lifecycle of the Azure resource itself.

Consequently, this can be particularly useful in scenarios where you have multiple resources that need to access other Azure services securely. By doing so, you can centralize the management of identities and their permissions. To achieve this using Azure CLI, you can use the following command:

az identity create --resource-group <resource-group-name> --name <managed-identity-name>

replace –resource-group-name with techd and managed identity with techdmi

self-assigned-Managed-Identity
Managed identity created

Configure Container Registry with AcrPull permissions for the managed identity

Microsoft Azure provides Azure Container Registry (ACR), a managed Docker registry service. It enables storing and managing container images for Docker deployment. ACR offers features including image storage, management, security, and integration with other Azure services.

The “AcrPull” permission grants the ability to pull (download) container images from an Azure Container Registry. Granting this permission to a user, service principal, or managed identity allows them to retrieve Docker images from the registry.

It’s essential for any entity needing to deploy containers using images stored in the registry. In the end, all we just want to do is to ensure container app resource security.

Step1: create the container registry:

az acr create --resource-group techd --name techdacr --sku Basic
create-container-registry
Container registry created
Container-registry
techdacr

Step2: configure the ACR with the AcrPull permission

In the Azure portal, open your Container Registry resource.
On the left-side menu, select Access Control (IAM).
On the Access Control (IAM) page, select Add role assignment.
Search for the AcrPull role, and then select AcrPull.
Select Next.
On the Members tab, to the right of Assign access to, select Managed identity.
Select + Select members.
On the Select managed identities page, under Managed identity, select User-assigned managed identity, and then select the user-assigned managed identity created for this project.
For example: techdmi
On the Select Managed Identities page, under Managed identity, select User-assigned managed identity, and then select the user-assigned managed identity created for this project.
On the Review + Assign tab, select Review + assign.
Wait for the role assignment to be added.
Steps to assign a role to ACR
AcrPull-role-assignment-found
AcrPull role assignment
role-selected-and-matched-with-a-managed-identity
Role matched with user-assigned managed identity
finally-assigned
Managed Identity assigned a role

Configure Container Registry with a private endpoint

Ensure that your Container Registry resource is open in the portal.
Under Settings, select Networking.
On the Private access tab, select + Create a private endpoint connection.
Specify the following information under Project details on the Basics tab:
Subscription: Specify the Azure subscription that you’re using for this guided project.
Resource group: Use ‘techd‘.
Name: Use ‘containerappendpoint’.
Region: Select ‘eastus‘.
Select Next: Resource.
On the DNS tab, under Private DNS Integration, ensure that the following information is displayed:
Ensure that “Yes” is selected for Integrate with private DNS zone.
Notice that “(new) privatelink.azurecr.io” is specified for Private DNS Zone.
Select Next: Virtual Network.
On the Resource tab, make sure the following information is displayed:
Ensure you’ve selected the Azure subscription you’re using for this guided project under Subscription.
Make sure you’ve selected Microsoft.ContainerRegistry/registries for Resource Type.
Ensure you’ve selected the name of your registry under Resource.
Verify that the registry is selected under the Target sub-resource.
Select Next: DNS.
On the DNS tab, under Private DNS Integration, ensure that the following information is displayed:
Make sure that “Yes” is selected for Integrate with private DNS zone.
Notice that “(new) privatelink.azurecr.io” is specified for Private DNS Zone.
Select Next: Tags.
Select Next: Review + create.
Upon seeing the “Validation passed” message on the Review + create tab, proceed by selecting “Create.”
Please wait for the deployment to complete.
Steps to configure container registry with private endpoint
Go-to-networking-in-the-settings-tab
networking section under the settings tab

Setting the registry tier to Basic may result in encountering issues when creating a private endpoint for the container registry.

The Basic tier does not support private endpoints. To resolve this problem, you’ll need to upgrade the tier to premium. Only the premium tier has the capability of creating a private endpoint, in addition to having firewalls.

premium-tier
Change the tier from properties
tier-changed
Tier changed to premium

Create private endpoint

To ensure container app resource security, follow the directions in the table above, and subsequently, review all the input as shown below:

review-to-validate
Review and validate then, click on the create button to begin deployment.
Configuring-Azure-Container-Registry-for-secure-connections-with-Azure-Container-Apps-prioritizing-workload-security
container endpoint created

Configuring Azure Container Registry for secure connections with Azure

Configuring Azure Container Registry for secure connections with Azure Container Apps prioritizes workload security. Consequently, ensuring that the pricing tier of the container registry is premium is crucial.

In the event that it is, proceed to configure the workload to use a private endpoint. Subsequently, this article demonstrates how to configure a private endpoint for a secure connection with Azure Container Apps. In the end, all we just want to do is to ensure container app resource security.

I hope you found this article on how to Configure Azure Container Registry for a secure connection with Azure Container Apps useful. Please feel free to leave a comment below.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Pocket (Opens in new window) Pocket
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
AWS/Azure/OpenShift, Containers, Network | Monitoring, Virtualization

Post navigation

Previous Post: Video on how to Configure Data Deduplication on Windows Server
Next Post: How to Migrate RDS CALs

Related Posts

  • ddedw
    You require permission from trustedinstaller: How to delete or rename files protected by Trusted Installer Network | Monitoring
  • Featured image 10
    Add a Printer Using an IP Address in Windows 11 Network | Monitoring
  • Allow and Disallow Simultaneous Connection to Domain and Non Domain network
    Allow and Disallow Simultaneous Connection to Domain and Non-Domain network Network | Monitoring
  • Windows Container
    How to Install a Windows Server Container Host Containers
  • Create S3 Bucket with Terraform
    Create an S3 Bucket with Terraform AWS/Azure/OpenShift
  • Cannot save to the location Windows
    How to Fix Cannot Save to Windows System32 Default.rdp Error Network | Monitoring

More Related Articles

ddedw You require permission from trustedinstaller: How to delete or rename files protected by Trusted Installer Network | Monitoring
Featured image 10 Add a Printer Using an IP Address in Windows 11 Network | Monitoring
Allow and Disallow Simultaneous Connection to Domain and Non Domain network Allow and Disallow Simultaneous Connection to Domain and Non-Domain network Network | Monitoring
Windows Container How to Install a Windows Server Container Host Containers
Create S3 Bucket with Terraform Create an S3 Bucket with Terraform AWS/Azure/OpenShift
Cannot save to the location Windows How to Fix Cannot Save to Windows System32 Default.rdp Error Network | Monitoring

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Get certificate thumbprint
    Retrieve an SSL Thumbprint in Windows using PowerShell Scripts
  • image 22
    How to clone a Windows Server running on VirtualBox Virtualization
  • Norton AV
    Enable or disable Norton silent mode on Mac Anti-Virus Solution
  • image 166
    How to deploy a .NET application to AWS Elastic Beanstalk using AWS Tool Kit AWS/Azure/OpenShift
  • Uninstall MicrosoftDefenderUpdate
    What you need to know about Microsoft Defender Antivirus Security | Vulnerability Scans and Assessment
  • settings app not working featured 800x400 1
    How to search through the Windows registry Windows Server
  • MBAM Client
    How to Check if MBAM Agent is installed on Windows PC Windows
  • aks 1
    Azure Storage: How to create Blob Storage and upload files AWS/Azure/OpenShift

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,836 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.