Skip to content

Commit 3433833

Browse files
nimakamoosidlepow
andauthored
Update articles/api-management/api-management-howto-use-managed-service-identity.md
Co-authored-by: Dan Lepow <[email protected]>
1 parent 4c133cf commit 3433833

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

articles/api-management/api-management-howto-use-managed-service-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ You can grant two types of identities to an API Management instance:
2626
- A *system-assigned identity* is tied to your service and is deleted if your service is deleted. The service can have only one system-assigned identity.
2727
- A *user-assigned identity* is a standalone Azure resource that you can assign to your service. The service can have multiple user-assigned identities.
2828

29-
> [!IMPORTANT]
29+
> [!CAUTION]
3030
> **Security consideration:** Users with permissions to edit API Management policies (for example, users assigned the [API Management Service Contributor](/azure/role-based-access-control/built-in-roles#api-management-service-contributor) role) can use the [`authentication-managed-identity`](authentication-managed-identity-policy.md) policy to authenticate as the service's managed identity. When you assign roles or permissions to the API Management resouce, be aware that any user who can edit policies may be able to access those same resources through the managed identity. To mitigate risk:
3131
> - Follow the [principle of least privilege](/entra/identity-platform/secure-least-privileged-access) when assigning roles to managed identities.
3232
> - Only grant the API Management Contributor role or policy editing permissions to trusted users.

0 commit comments

Comments
 (0)