Share via

Azure Data Factory-Private Connectivity

Shubhangi Nannware 60 Reputation points
2026-04-03T08:03:47.91+00:00

Can ADF worskapce be made private as like Databricks workspace. If used without VPN should throw error. How to confirm private connectivity of ADF. Linked service test connection which uses SHIR is successful without VPN. DNS resolution of ADF portal is resolving to private IP.

Azure Data Factory
Azure Data Factory

An Azure service for ingesting, preparing, and transforming data at scale.

0 comments No comments

Answer accepted by question author
  1. Nandan Hegde 36,796 Reputation points MVP Volunteer Moderator
    2026-04-03T10:12:42.49+00:00

    Similar thread : https://stackoverflow.com/questions/74349831/even-after-setting-up-the-connect-via-private-endpoint-azure-data-factory-remai/74355332#74355332

    The Private Endpoint you have created is only valid for use with Self-Hosted Integration Runtimes and does not apply to the Data Factory Studio portal.

    In case if you want to restrict it, you can use something called conditional access policy (in which you can restrict accessibility to the ADF portal URL via your company account only within specific IPs)

    1 person found this answer helpful.

1 additional answer

Sort by: Most helpful
  1. Q&A Assist
    2026-04-03T08:04:11.3533333+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    Azure Data Factory cannot be made fully private in the same way as an Azure Databricks workspace, but Private Link can be used to ensure that communication between customer networks and Data Factory goes over private endpoints.

    Key points from the context:

    1. Private connectivity model for ADF
      • Azure Data Factory supports Azure Private Link via private endpoints for:
        • The Data Factory portal (adf.azure.com).
        • Factory endpoints (*.{region}.datafactory.azure.net) used by self-hosted IR.
        • Service Bus (*.servicebus.windows.net) and download.microsoft.com for SHIR operations.
      • Private endpoints use private IPs in a VNet, and DNS is updated so that, from inside the VNet, the Data Factory FQDNs resolve to the private endpoint IPs instead of public IPs.
      • When resolved from outside the VNet, the same FQDNs still resolve to the public endpoints.
    2. Behavior with and without VPN
      • With Private Link configured and DNS integrated, traffic from within the VNet (or on-prem via VPN/ExpressRoute) to ADF endpoints goes over the private endpoint.
      • Disabling public network access in ADF applies to the self-hosted IR, not to Azure IR and SSIS IR.
      • The known limitation: when both sides use Private Link/private endpoints for the same PaaS resource, access patterns can be affected, but this does not turn ADF into a “private-only workspace” in the same sense as Databricks.
      • To force users to go through private connectivity, network and DNS must be designed so that:
        • From corporate networks, ADF FQDNs resolve only to private IPs (via custom DNS/delegation).
        • Direct Internet egress to ADF public endpoints is blocked (e.g., via firewall/proxy), so access without VPN fails.
    3. DNS behavior and verification
      • For a factory DataFactoryA:
        • Outside the VNet:
          • DataFactoryA.{region}.datafactory.azure.net → CNAME to public endpoint → A record to public IP.
        • Inside the VNet with private endpoint:
          • DataFactoryA.{region}.datafactory.azure.net → CNAME to DataFactoryA.{region}.privatelink.datafactory.azure.net → A record to private endpoint IP.
      • If using custom DNS, it must either:
        • Delegate the privatelink subdomain to the Azure private DNS zone, or
        • Host A records mapping DataFactoryA.{region}.datafactory.azure.net directly to the private endpoint IP.
    4. Why SHIR test connection works without VPN
      • The self-hosted IR requires access to:
        • *.{region}.datafactory.azure.net (ADF control plane).
        • *.servicebus.windows.net.
        • download.microsoft.com.
      • If the SHIR machine is off-VNet/VPN and can reach the public Internet, it will resolve these FQDNs to public endpoints and succeed, even if private endpoints also exist elsewhere.
      • This is expected: Private Link does not automatically block public access from other networks; it only provides a private path for networks where the private endpoint and DNS are configured.
    5. How to confirm private connectivity of ADF Use a similar approach as for Databricks and the guidance in the ADF Private Link docs:
      1. Verify DNS resolution from inside the VNet/on-prem (over VPN/ExpressRoute):
      • From a VM in the VNet hosting the private endpoint (or on-prem via VPN/ExpressRoute), run nslookup for:
        • adf.azure.com (portal, if portal private endpoint is configured).
        • DataFactoryA.{region}.datafactory.azure.net (replace with actual factory name/region).
      • Confirm they resolve to:
        • *.privatelink.adf.azure.com / *.privatelink.datafactory.azure.net CNAMEs.
        • A records with private IPs of the private endpoints.
      1. Verify portal and authoring over private endpoint:
      • From a VM in the VNet (or on-prem via VPN/ExpressRoute):
        • Browse to the Data Factory portal (via Azure portal → Data Factory → Author & Monitor).
        • Successful authoring/monitoring while DNS resolves to private IPs confirms private connectivity.
      1. Verify SHIR control-plane traffic over Private Link:
      • Install SHIR on a VM in the VNet with the private endpoints.
      • Ensure DNS for *.{region}.datafactory.azure.net and *.servicebus.windows.net resolves to the corresponding privatelink zones (per the private endpoint configuration).
      • Run “Test connection” on linked services that use this SHIR; success indicates SHIR is communicating via Private Link.
      1. Verify that public path is not used from controlled networks:
      • From the same VNet/on-prem network, check that nslookup does not return public IPs for the ADF endpoints.
      • Use network firewall rules to block direct Internet access to ADF public endpoints from corporate networks; attempts to reach ADF without VPN should then fail.

    In summary, ADF itself does not become a “private-only workspace” object, but Private Link plus DNS and network egress controls can enforce that, from corporate environments, ADF is reachable only via private connectivity and fails when accessed without VPN.


    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.