Share via

Azure Managed Grafana + private endpoint failing behind app gateway

Ashish K Padhy 20 Reputation points
2026-04-06T14:09:39.2133333+00:00

Hello,

I have configured azure managed grafana with private endpoint + disable public access and placed it behind application gateway. Can able to access application gatewate grafana frontend url but its failing after authentication using sso. Any help really appreciated

Thank you

Azure Managed Grafana
Azure Managed Grafana

An Azure service used to deploy Grafana dashboards for analytics and monitoring solutions.


Answer accepted by question author
  1. Suchitra Suregaunkar 11,635 Reputation points Microsoft External Staff Moderator
    2026-04-06T15:59:44.42+00:00

    Hello Ashish K Padhy It sounds like you’ve got Azure Managed Grafana locked down behind a Private Endpoint and Application Gateway — you can hit the Grafana login page, but the SSO/OAuth flow is failing. In most cases that’s because even “private-only” Grafana still needs outbound access to public Microsoft Entra ID endpoints (like login.microsoftonline.com, graph.microsoft.com, etc.) to complete the OAuth handshake. When you disable public access and lock down your subnets, those calls get blocked.

    Here’s what you can try:

    1. Allow outbound to the Microsoft Entra ID endpoints : • If you’re using an NSG or Firewall, add rules or use the AzureActiveDirectory service tag (or explicitly allow FQDNs: login.microsoftonline.com, graph.microsoft.com, sts.windows.net, etc.) • This ensures Grafana can reach the identity provider even though the workspace itself isn’t publicly accessible.
    2. Verify your private endpoint & DNS setup: • In the Azure portal, go to your Managed Grafana > Networking > Private Access and confirm the endpoint state is “Approved.” • Ensure you’ve integrated with a private DNS zone so that your Grafana hostname resolves correctly inside the VNet.
    3. Check your Application Gateway HTTP settings: • Make sure you’re forwarding the original Host header (or rewriting back to the Grafana FQDN) so Grafana sees the exact URL you’ve registered in Azure AD. • If the host header is wrong, the redirect URI won’t match what’s in your app registration.
    4. Double-check your Azure AD app registration : • In Entra ID, under your Grafana enterprise app, verify the Redirect URI exactly matches the Application Gateway URL (including protocol, hostname, and path, e.g., https://grafana.mycompany.com/login/azuread). • If you’ve got multiple environments or funky hostnames, make sure each one is listed.

    If you’re still seeing an error after those steps, could you share:

    • The exact error message or behavior after you submit credentials

    • How your Azure AD app’s redirect URI is configured

    • Any NSG/firewall rules you’ve set on the subnet hosting Grafana

    • Whether you’ve tested DNS resolution for both the Grafana FQDN and the Entra endpoints from a VM in the same VNet

    That info will help narrow it down!

    Hope that helps — let me know what you see.

    References

    Thanks,
    Suchitra.

    0 comments No comments

1 additional answer

Sort by: Most helpful
  1. Q&A Assist
    2026-04-06T14:09:53.3766667+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    When Azure Managed Grafana is configured with a private endpoint and public access is disabled, all access must go through that private endpoint. This has two important implications for the scenario:

    1. The Azure portal and some features cannot reach the workspace over the internet
      • Disabling public access “prevents all traffic from accessing the resource unless you go through a private endpoint.”
      • Specifically, when private access is enabled, the Pin to Grafana feature in the Azure portal no longer works because the portal cannot reach a workspace that is only on a private IP.
      • This is expected behavior and is called out as a trade-off when hardening network security.
    2. Azure Managed Grafana does not support connecting to private networks as data sources
      • For data sources and backend calls, Azure Managed Grafana “doesn't currently support connections to private networks.”
      • If any part of the SSO flow or callback path (for example, redirects that must reach the Grafana endpoint) relies on a path that is only reachable over a private network in a way that conflicts with this model, the authentication flow can fail after login.

    Recommended checks and adjustments:

    1. Confirm network model and routing
      • Ensure that the Application Gateway, the private endpoint, and the clients are all in a network topology where the private endpoint IP is reachable end to end.
      • Verify that all user access to Grafana is over HTTPS on port 443 through the private endpoint, as Azure Managed Grafana uses HTTPS/443 only.
    2. Validate that public network access is intentionally disabled
      • In the Azure portal, open the Azure Managed Grafana workspace → SettingsNetworking and confirm Public Access is set to Disabled.
      • If testing or troubleshooting, temporarily set Public Access to Enabled to see if SSO succeeds when the workspace is reachable over the public endpoint. If it works publicly but fails privately, the issue is with private endpoint/App Gateway routing or headers.
    3. Review data source and backend connectivity
      • Ensure that no data source or dependency in the authentication flow is configured to use a private IP that Azure Managed Grafana cannot reach, as “Azure Managed Grafana doesn't currently support connections to private networks.”
    4. Apply recommended network security patterns
      • Use private endpoints and disable public network access as recommended, but ensure that all required traffic (including SSO redirects) is allowed through the Application Gateway and the private endpoint.
      • Configure NSGs and firewalls so that HTTPS traffic from clients via the Application Gateway to the private endpoint is permitted.

    If SSO continues to fail only when going through the private endpoint/App Gateway, re-test with public access enabled to isolate whether the failure is due to network reachability versus identity configuration.


    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.