You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-center/includes/enable-managed-identity.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,8 +11,6 @@ ms.date: 12/20/2024
11
11
ms.custom: Include file
12
12
---
13
13
14
-
## Enable a managed identity in your API center
15
-
16
14
For this scenario, your API center uses a [managed identity](/entra/identity/managed-identities-azure-resources/overview) to access Azure resources. Depending on your needs, enable either a system-assigned or one or more user-assigned managed identities.
17
15
18
16
The following examples show how to enable a system-assigned managed identity by using the Azure portal or the Azure CLI. At a high level, configuration steps are similar for a user-assigned managed identity.
Copy file name to clipboardExpand all lines: articles/api-center/includes/store-secret-key-vault.md
+4-20Lines changed: 4 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,27 +14,11 @@ ms.custom: Include file
14
14
15
15
To store the API key as a secret in the key vault, see [Set and retrieve secret in Key Vault](/azure/key-vault/secrets/quick-create-portal).
16
16
17
-
#### Enable a managed identity in your API center
18
17
19
-
For this scenario, your API center uses a [managed identity](/entra/identity/managed-identities-azure-resources/overview) to access the key vault. Depending on your needs, enable either a system-assigned or one or more user-assigned managed identities.
18
+
### Enable a managed identity in your API center
20
19
21
-
The following example shows how to enable a system-assigned managedidentity by using the Azure portal. At a high level, configuration steps are similar for a user-assigned managedidentity.
### Assign the managed identity the Key Vault Secrets User role
23
23
24
-
1. In the [portal](https://azure.microsoft.com), navigate to your API center.
25
-
1. In the left menu, under **Security**, select **Managed identities**.
26
-
1. Select **System assigned**, and set the status to **On**.
27
-
1. Select **Save**.
28
-
29
-
#### Assign the Key Vault Secrets User role to the managed identity
30
-
31
-
Assign your API center's managed identity the **Key Vault Secrets User** role in your key vault. The following steps use the Azure portal.
32
-
33
-
1. In the [portal](https://azure.microsoft.com), navigate to your key vault.
34
-
1. In the left menu, select **Access control (IAM)**.
35
-
1. Select **+ Add role assignment**.
36
-
1. On the **Add role assignment** page, set the values as follows:
37
-
1. On the **Role** tab, select **Key Vault Secrets User**.
38
-
1. On the **Members** tab, in **Assign access to**, select **Managed identity** > **+ Select members**.
39
-
1. On the **Select managed identities** page, select the system-assigned managed identity of your API center that you added in the previous section. Click **Select**.
Copy file name to clipboardExpand all lines: articles/api-center/synchronize-api-management-apis.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,9 +55,11 @@ API Management APIs automatically synchronize to the API center whenever existin
55
55
> [!NOTE]
56
56
> You can run Azure CLI command examples in this article in PowerShell or a bash shell. Where different variable syntax is required, the article provides separate command examples for the two shells.
Copy file name to clipboardExpand all lines: articles/api-center/synchronize-aws-gateway-apis.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,10 +83,11 @@ Manually upload and securely store the two IAM user access keys in Azure Key Vau
83
83
84
84
Take note of the **Secret identifier** of each secret, a URI similar to `https://<key-vault-name>.vault.azure.net/secrets/<secret-name>`. You use these identifiers in the next steps.
85
85
86
+
## Configure a managed identity for your API center
0 commit comments