You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-aad.md
+13-11Lines changed: 13 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,19 +73,21 @@ API Management supports external identity providers when you configure them in a
73
73
74
74
To optionally enable access to the developer portal by external users in your Microsoft Entra ID tenant, complete the following steps:
75
75
76
-
* Add an external identity provider to your Microsoft Entra ID tenant.
77
-
* Enable self-service sign-up.
76
+
1. Add an external identity provider to your Microsoft Entra ID tenant.
77
+
1. Enable self-service sign-up.
78
78
79
-
### Add an external identity provider to your Microsoft Entra ID tenant
79
+
### 1. Add an external identity provider to your Microsoft Entra ID tenant
80
80
81
-
For this scenario, you must enable an external identity provider in your workforce tenant. Configuring the external identity provider depends on the specific provider and is outside the scope of this article. For options and links to steps, see [Identity providers for External ID in workforce tenants](/entra/external-id/identity-providers).
81
+
For this scenario, you must enable an external identity provider in your workforce tenant. Configuring the external identity provider depends on the specific provider and is outside the scope of this article. For example, for Google you must create a project in the Google Developers Console, then configure the project credentials in Microsoft Entra.
82
82
83
-
### Enable self-service sign-up
83
+
For options and links to steps, see [Identity providers for External ID in workforce tenants](/entra/external-id/identity-providers).
84
+
85
+
### 2. Enable self-service sign-up
84
86
85
87
To allow external users to register for access to the developer portal, complete the following steps:
86
88
87
-
* Enable self-service sign-up for your tenant.
88
-
* Add your app to the self-service sign-up user flow.
89
+
a. Enable self-service sign-up for your tenant.
90
+
b. Add your app to the self-service sign-up user flow.
89
91
90
92
For more information and detailed steps, see [Add self-service sign-up user flows for B2B collaboration](/entra/external-id/self-service-sign-up-user-flow).
91
93
@@ -96,17 +98,17 @@ For more information and detailed steps, see [Add self-service sign-up user flow
96
98
97
99
To optionally enable access to the developer portal by users from more than one Microsoft Entra ID tenant, complete the following steps:
98
100
99
-
* Configure app registration for multiple tenants.
100
-
* Update the Microsoft Entra ID identity provider configuration for the developer portal to add another tenant.
101
+
1. Configure app registration for multiple tenants.
102
+
1. Update the Microsoft Entra ID identity provider configuration for the developer portal to add another tenant.
101
103
102
-
### Configure app registration for multiple tenants
104
+
### 1. Configure app registration for multiple tenants
103
105
104
106
The app registration must support multiple tenants. You can configure this support in either of the following ways:
105
107
106
108
* When creating the app registration, set **Supported account types** to **Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant)**.
107
109
* If you previously configured an app registration for a single tenant, update the **Supported account types** setting on the **Manage** > **Authentication** page of the app registration.
108
110
109
-
### Update Microsoft Entra ID identity provider configuration for multiple tenants
111
+
### 2. Update Microsoft Entra ID identity provider configuration for multiple tenants
110
112
111
113
Update the identity provider configuration to add another tenant:
Copy file name to clipboardExpand all lines: articles/api-management/secure-developer-portal-access.md
+5-10Lines changed: 5 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlepow
6
6
7
7
ms.service: azure-api-management
8
8
ms.topic: concept-article
9
-
ms.date: 12/08/2025
9
+
ms.date: 03/04/2026
10
10
ms.author: danlep
11
11
ms.custom: sfi-image-nochange
12
12
---
@@ -22,21 +22,16 @@ API Management has a fully customizable, standalone, managed [developer portal](
22
22
23
23
## Authentication options
24
24
25
-
***External users** - To enable access to the developer portal for external users, use external identity providers enabled through [Microsoft Entra External ID](/entra/external-id/external-identities-overview).
26
-
* For example, you want users to access the developer portal by using existing social media accounts.
27
-
* The service provides features to enable the end user sign-up and sign-in experience.
25
+
***Internal users** - To enable access to the developer portal for internal users, use your corporate (workforce) Microsoft Entra ID tenant. Microsoft Entra ID provides a seamless single sign-on (SSO) experience for corporate users who need to access and discover APIs through the developer portal.
26
+
27
+
For steps to enable Microsoft Entra authentication in the developer portal, see [How to authorize developer accounts by using Microsoft Entra ID in Azure API Management](api-management-howto-aad.md).
28
28
29
-
Currently, API Management supports external identity providers when configured in your Microsoft Entra ID workforce tenant, not in an external tenant. For more information, see [How to authorize developer accounts by using Microsoft Entra External ID](api-management-howto-entra-external-id.md).
29
+
***External users** - To enable access to the developer portal for external users, you can configure [external identity providers](/entra/external-id/identity-providers)in your Microsoft Entra ID workforce tenant. For example, you might want users to sign up and sign in to the developer portal by using existing social media accounts. For more information, see [Enable access by external users in your Microsoft Entra ID tenant](api-management-howto-aad.md#enable-access-by-external-users).
***Internal users** - To enable access to the developer portal for internal users, use your corporate (workforce) Microsoft Entra ID tenant. Microsoft Entra ID provides a seamless single sign-on (SSO) experience for corporate users who need to access and discover APIs through the developer portal.
36
-
37
-
For steps to enable Microsoft Entra authentication in the developer portal, see [How to authorize developer accounts by using Microsoft Entra ID in Azure API Management](api-management-howto-aad.md).
38
-
39
-
40
35
***Basic authentication** - Use the built-in developer portal [username and password](developer-portal-basic-authentication.md) provider. This option allows developers to register directly in API Management and sign in by using API Management user accounts. User registration through this option is protected by a CAPTCHA service.
0 commit comments