Skip to content

Commit 1375d32

Browse files
committed
broken links
1 parent 06797f6 commit 1375d32

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

articles/api-management/breaking-changes/managed-certificates-suspension-august-2025.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,13 +50,13 @@ Configure DNS records for your custom domain to point to your API Management gat
5050

5151
#### DNS records for Developer, Basic, Standard, or Premium tier
5252

53-
1. Add either a [CNAME](/azure/api-management/configure-custom-domaintabs=managed#cname-record) or A-record with your DNS provider.
53+
1. Add either a [CNAME](/azure/api-management/configure-custom-domain?tabs=managed#cname-record) or A-record with your DNS provider.
5454

5555
1. Add DigiCert as an authorized certificate authority (CA) in Azure DNS. For this, create a specific CAA record set within your domain's DNS zone using the Azure portal or other management tools.
5656

5757
#### DNS records for Consumption tier
5858

59-
1. Add either a [CNAME](/azure/api-management/configure-custom-domaintabs=managed#cname-record) or [TXT](/azure/api-management/configure-custom-domain?tabs=managed#txt-record) record with your DNS provider. If you configure both, the TXT record takes precedence.
59+
1. Add either a [CNAME](/azure/api-management/configure-custom-domain?tabs=managed#cname-record) or [TXT](/azure/api-management/configure-custom-domain?tabs=managed#txt-record) record with your DNS provider. If you configure both, the TXT record takes precedence.
6060
1. Add DigiCert as an authorized certificate authority (CA) in Azure DNS. For this, you need to create a specific CAA record set within your domain's DNS zone using the Azure portal or other management tools
6161

6262
### Step 3: Allow API Management service access to port 80

0 commit comments

Comments
 (0)