| title | Set up inbound private endpoint for Azure API Management | ||
|---|---|---|---|
| description | Learn how to restrict inbound access to an Azure API Management instance by using an Azure private endpoint and Azure Private Link. | ||
| ms.service | azure-api-management | ||
| author | dlepow | ||
| ms.author | danlep | ||
| ms.topic | how-to | ||
| ms.date | 03/17/2026 | ||
| ms.custom |
|
[!INCLUDE premium-dev-standard-basic-premiumv2-standardv2.md]
You can configure an inbound private endpoint for your API Management instance to allow clients in your private network to securely access the instance over Azure Private Link.
-
The private endpoint uses an IP address from an Azure virtual network in which it's hosted.
-
Network traffic between a client on your private network and API Management traverses over the virtual network and a Private Link on the Microsoft backbone network, eliminating exposure from the public internet.
-
Configure custom DNS settings or an Azure DNS private zone to map the API Management hostname to the endpoint's private IP address.
:::image type="content" source="media/private-endpoint/api-management-private-endpoint.png" alt-text="Diagram that shows a secure inbound connection to API Management using private endpoint.":::
[!INCLUDE api-management-private-endpoint]
- Only the API Management instance's Gateway endpoint supports inbound Private Link connections.
- Each API Management instance supports at most 100 Private Link connections.
- Connections aren't supported on the self-hosted gateway or on a workspace gateway.
- In the classic API Management tiers, private endpoints aren't supported in instances injected in an internal or external virtual network.
[!NOTE] In the Standard v2 and Premium v2 tiers, private endpoints are supported in instances with any supported virtual network configuration when fronted with Azure Front Door Premium.
Use an inbound private endpoint to enable private-only access directly to the API Management gateway to limit exposure of sensitive data or backends.
Supported configurations include:
- Pass client requests through a firewall and configure rules to route requests privately to the API Management gateway.
- Configure Azure Front Door (or Azure Front Door with Azure Application Gateway) to receive external traffic and then route traffic privately to the API Management gateway. For example, see Connect Azure Front Door Premium to an Azure API Management with Private Link.
- An existing API Management instance. Create one if you haven't already.
- Availability of the API Management private endpoint type in your subscription and region.
- A virtual network containing a subnet to host the private endpoint. The subnet can contain other Azure resources, but it can't be delegated to another service.
- (Recommended) A virtual machine in the same or a different subnet in the virtual network, to test the private endpoint. [!INCLUDE azure-cli-prepare-your-environment-no-header.md]
Typically, a network administrator creates a private endpoint. Depending on your Azure role-based access control (RBAC) permissions, a private endpoint that you create is either automatically approved to send traffic to the API Management instance, or requires the resource owner to manually approve the connection.
| Approval method | Minimum RBAC permissions |
|---|---|
| Automatic | Microsoft.Network/virtualNetworks/**Microsoft.Network/virtualNetworks/subnets/**Microsoft.Network/privateEndpoints/**Microsoft.Network/networkinterfaces/**Microsoft.Network/locations/availablePrivateEndpointTypes/readMicrosoft.ApiManagement/service/**Microsoft.ApiManagement/service/privateEndpointConnections/** |
| Manual | Microsoft.Network/virtualNetworks/**Microsoft.Network/virtualNetworks/subnets/**Microsoft.Network/privateEndpoints/**Microsoft.Network/networkinterfaces/**Microsoft.Network/locations/availablePrivateEndpointTypes/read |
Follow these steps to create and configure a private endpoint for your API Management instance.
In the Classic tiers, you can create a private endpoint when you create an API Management instance in the Azure portal, or you can add a private endpoint to an existing instance.
-
In the Create API Management service wizard, select the Networking tab.
-
In Connectivity type, select Private endpoint.
-
Select + Add.
-
On the Create private endpoint page, enter or select the following information:
Setting Value Subscription Select your subscription. Resource group Select an existing resource group, or create a new one. It must be in the same region as your virtual network. Location Select a location for the private endpoint. It must be in the same region as your virtual network. It can differ from the region where your API Management instance is hosted. Name Enter a name for the endpoint such as myPrivateEndpoint. Sub-resource Select Gateway. -
Under Networking, enter or select the virtual network and subnet for your private endpoint.
-
Under Private DNS integration, select Integrate with private DNS zone. The default DNS zone is displayed: privatelink.azure-api.net.
-
Select OK.
-
Continue with the creation of the API Management instance.
-
Go to your API Management service in the Azure portal.
-
In the left-hand menu, under Deployment + infrastructure, select Network.
-
Select Inbound private endpoint connections > + Add endpoint.
:::image type="content" source="media/private-endpoint/add-endpoint-from-instance.png" alt-text="Screenshot showing how to add a private endpoint using the Azure portal.":::
-
In the Basics tab, enter or select the following information:
Setting Value Project details Subscription Select your subscription. Resource group Select an existing resource group, or create a new one. It must be in the same region as your virtual network. Instance details Name Enter a name for the endpoint such as myPrivateEndpoint. Network Interface Name Enter a name for the network interface, such as myInterface Region Select a location for the private endpoint. It must be in the same region as your virtual network. It can differ from the region where your API Management instance is hosted. -
Select the Next: Resource button at the bottom of the screen. The following information about your API Management instance is already populated:
- Subscription
- Resource type
- Resource name
-
In Resource, in Target sub-resource, select Gateway.
:::image type="content" source="media/private-endpoint/create-private-endpoint.png" alt-text="Screenshot showing settings to create a private endpoint in the Azure portal.":::
[!IMPORTANT] Only the Gateway sub-resource is supported for API Management. Other sub-resources aren't supported.
-
Select the Next: Virtual Network button at the bottom of the screen.
-
In Virtual Network, enter or select this information:
Setting Value Virtual network Select your virtual network. Subnet Select your subnet. Private IP configuration In most cases, select Dynamically allocate IP address. Application security group Optionally select an application security group. -
Select the Next: DNS button at the bottom of the screen.
-
In Private DNS integration, enter or select this information:
Setting Value Integrate with private DNS zone Leave the default of Yes. Subscription Select your subscription. Resource group Select your resource group. Private DNS zones The default value is displayed: (new) privatelink.azure-api.net. -
Select Next: Tabs at the bottom of the screen. If you want, enter tags to organize your Azure resources.
-
Select Next: Review + create at the bottom of the screen. Select Create.
After you create the private endpoint and update the service, the private endpoint appears in the list on the API Management instance's Inbound private endpoint connections page in the portal.
Note the endpoint's Connection state:
- Approved indicates that the API Management resource automatically approved the connection.
- Pending indicates that the connection must be manually approved by the resource owner.
If a private endpoint connection is in a pending state, an owner of the API Management instance must manually approve it before it can be used.
If you have sufficient permissions, approve a private endpoint connection on the API Management instance's Private endpoint connections page in the portal. In the connection's context (...) menu, select Approve.
You can also use the API Management Private Endpoint Connection - Create Or Update REST API to approve pending private endpoint connections.
You can create a private endpoint when you create an API Management instance in the Azure portal, or you can add a private endpoint to an existing instance.
-
In the Create API Management service wizard, select the Networking tab.
-
In Network configuration, select Inbound private link and/or outbound virtual network integration.
-
Next to Private endpoints, select Create new.
-
On the Create private endpoint page, enter or select the following information:
Setting Value Subscription Select your subscription. Resource group Select an existing resource group, or create a new one. It must be in the same region as your virtual network. Location Select a location for the private endpoint. It must be in the same region as your virtual network. It can differ from the region where your API Management instance is hosted. Name Enter a name for the endpoint such as myPrivateEndpoint. Sub-resource Select Gateway. -
Under Networking, enter or select the virtual network and subnet for your private endpoint.
-
Under Private DNS integration, select Integrate with private DNS zone. The default DNS zone is displayed: privatelink.azure-api.net.
-
Select OK.
-
Optionally configure settings for outbound virtual network integration.
-
Continue with the creation of the API Management instance.
-
In the Azure portal, go to your API Management Standard v2 instance.
-
In the left-hand menu, under Deployment + infrastructure, select Network > Edit.
-
Under Inbound features, next to Private endpoints, select Create new.
-
On the Create private endpoint page, enter or select the following information:
Setting Value Subscription Select your subscription. Resource group Select an existing resource group, or create a new one. It must be in the same region as your virtual network. Location Select a location for the private endpoint. It must be in the same region as your virtual network. It can differ from the region where your API Management instance is hosted. Name Enter a name for the endpoint such as myPrivateEndpoint. Sub-resource Select Gateway. -
Under Configure virtual network, enter or select the virtual network and subnet for your private endpoint.
-
Under Private DNS integration, select Enable, and select your Subscription and Resource group. The default DNS zone is displayed: privatelink.azure-api.net.
-
Select Create. By default, the endpoint's Connection state is Approved.
To list private endpoint connections to the API Management instance:
-
In the Azure portal, go to your API Management Standard v2 instance.
-
In the left-hand menu, under Deployment + infrastructure, select Network.
-
Next to Private endpoints, select the link.
-
On the Private endpoints page, review the private endpoints to the API Management instance.
-
To change the connection state or delete the endpoint, select an endpoint, then select the context (...) menu. Choose the appropriate command on the menu.
For an API Management Premium v2 instance, currently you must create a private endpoint resource separately in Private Link services.
-
In the Azure portal, go to Private endpoints.
-
Select + Create.
-
In the Basics tab of Create a private endpoint, enter or select the following information:
Setting Value Project details Subscription Select your subscription. Resource group Select an existing resource group, or create a new one. It must be in the same region as your virtual network. Instance details Name Enter a name for the endpoint such as myPrivateEndpoint. Network Interface Name Enter a name for the network interface, such as myInterface Region Select a location for the private endpoint. It must be in the same region as your virtual network. It can differ from the region where your API Management instance is hosted. -
Select the Next: Resource button at the bottom of the screen.
-
In Resource, enter or select this information:
Setting Value Subscription Your subscription is selected. Resource type Select Microsoft.ApiManagement/service. Resource Select your API Management Premium v2 instance. Target sub-resource Select Gateway. :::image type="content" source="media/private-endpoint/create-private-endpoint-private-link-center.png" alt-text="Screenshot showing settings to create a private endpoint in the Azure portal.":::
[!IMPORTANT] Only the Gateway sub-resource is supported for API Management. Other sub-resources aren't supported.
-
Select the Next: Virtual Network button at the bottom of the screen.
-
In Networking, enter or select this information:
Setting Value Virtual network Select your virtual network. Subnet Select your subnet. Network policy for private endpoints Leave the default of Disabled. Private IP configuration In most cases, select Dynamically allocate IP address. Application security group Optionally select an application security group. -
Select the Next: DNS button at the bottom of the screen.
-
In Private DNS integration, enter or select this information:
Setting Value Integrate with private DNS zone Leave the default of Yes. Subscription Select your subscription. Resource group Select your resource group. Private DNS zones The default value is displayed: (new) privatelink.azure-api.net. -
Select Next: Tabs at the bottom of the screen. If you want, enter tags to organize your Azure resources.
-
Select Next: Review + create at the bottom of the screen. Select Create.
After you create the private endpoint and update the service, the private endpoint appears in the list on the Private endpoints page.
Make sure the endpoint's Connection status is Approved.
To limit incoming traffic to the API Management instance only to private endpoints, disable the public network access property.
Important
- You can disable public network access after you configure a private endpoint.
- You can disable public network access in an existing API Management instance, not during the deployment process.
Note
You can disable public network access in API Management instances configured with a private endpoint, not with other networking configurations.
To disable the public network access property in the classic tiers by using the Azure CLI, run the following az apim update command, substituting the names of your API Management instance and resource group:
az apim update --name my-apim-service --resource-group my-resource-group --public-network-access false
You can also use the API Management Service - Update REST API to disable public network access, by setting the publicNetworkAccess property to Disabled.
Use the portal to disable the public network access property in a Standard v2 instance.
-
In the Azure portal, go to your API Management Standard v2 instance.
-
In the left-hand menu, under Deployment + infrastructure, select Network > Edit.
-
Under Inbound features, in the Public network access section, select Disable.
In the Premium v2 tier, use the API Management Service - Update REST API to disable public network access, by setting the publicNetworkAccess property to Disabled.
After you create the private endpoint, confirm its DNS settings in the portal.
-
Go to your API Management service in the Azure portal.
-
In the left-hand menu, under Deployment + infrastructure, select Network > Inbound private endpoint connections, and select the private endpoint you created.
-
In the left-hand navigation, under Settings, select DNS configuration.
-
Review the DNS records and IP address of the private endpoint. The IP address is a private address in the address space of the subnet where you configured the private endpoint.
-
Go to your API Management service in the Azure portal.
-
In the left-hand menu, under Deployment + infrastructure, select Network > Edit, and select the private endpoint you created.
-
On the Private endpoint page, review the endpoint's virtual network and private DNS integration settings.
-
In the Azure portal, go to Private endpoints, then select the name of your private endpoint.
-
In the left-hand navigation, under Settings, select DNS configuration.
-
Review the DNS records and IP address of the private endpoint. The IP address is a private address in the address space of the subnet where you configured the private endpoint.
Connect to a virtual machine you set up in the virtual network.
Run a utility such as nslookup or dig to look up the IP address of your default Gateway endpoint over Private Link. For example:
nslookup my-apim-service.privatelink.azure-api.net
Output should include the private IP address associated with the private endpoint.
API calls initiated within the virtual network to the default Gateway endpoint should succeed.
From outside the private endpoint path, attempt to call the API Management instance's default Gateway endpoint. If public access is disabled, output includes an error with status code 403 and a message similar to:
Request originated from client public IP address 192.0.2.12, public network access on this 'Microsoft.ApiManagement/service/my-apim-service' is disabled.
To connect to 'Microsoft.ApiManagement/service/my-apim-service', please use the Private Endpoint from inside your virtual network.
[!INCLUDE api-management-standard-v2-limitation]
- Use policy expressions with the
context.requestvariable to identify traffic from the private endpoint. - Learn more about private endpoints and Private Link, including Private Link pricing.
- Manage private endpoint connections.
- Troubleshoot Azure private endpoint connectivity problems.
- Use a Resource Manager template to create a classic API Management instance and a private endpoint.