You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/api-management-authenticate-authorize-azure-openai.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ In this article, you learn about ways to authenticate and authorize to Azure Ope
23
23
24
24
For background, see:
25
25
26
-
*[Azure OpenAI Service REST API reference](/azure/ai-services/openai/reference)
26
+
*[Azure OpenAI Service REST API reference](/azure/ai-foundry/openai/reference)
27
27
28
28
*[Authentication and authorization to APIs in API Management](authentication-authorization-overview.md).
29
29
@@ -80,13 +80,13 @@ In this example, the named value in API Management is *openai-api-key*.
80
80
## Authenticate with managed identity
81
81
82
82
An alternative and recommended way to authenticate to an Azure OpenAI API is by using a managed identity in Microsoft Entra ID. For background, see
83
-
[How to configure Azure OpenAI Service with managed identity](/azure/ai-services/openai/how-to/managed-identity).
83
+
[How to configure Azure OpenAI Service with managed identity](/azure/api-management/api-management-authenticate-authorize-azure-openai).
84
84
85
85
Following are steps to configure your API Management instance to use a managed identity to authenticate requests to an Azure OpenAI API.
86
86
87
87
1.[Enable](api-management-howto-use-managed-service-identity.md) a system-assigned or user-assigned managed identity for your API Management instance. The following example assumes that you've enabled the instance's system-assigned managed identity.
88
88
89
-
1. Assign the managed identity the **Cognitive Services OpenAI User** role, scoped to the appropriate resource. For example, assign the system-assigned managed identity the **Cognitive Services OpenAI User** role on the Azure OpenAI resource. For detailed steps, see [Role-based access control for Azure OpenAI service](/azure/ai-services/openai/how-to/role-based-access-control).
89
+
1. Assign the managed identity the **Cognitive Services OpenAI User** role, scoped to the appropriate resource. For example, assign the system-assigned managed identity the **Cognitive Services OpenAI User** role on the Azure OpenAI resource. For detailed steps, see [Role-based access control for Azure OpenAI service](/azure/ai-foundry/openai/how-to/role-based-access-control).
90
90
91
91
1. Add the following policy snippet in the `inbound` policy section to authenticate requests to the Azure OpenAI API using the managed identity.
92
92
@@ -163,5 +163,5 @@ Following are high level steps to restrict API access to users or apps that are
163
163
164
164
## Related content
165
165
166
-
* Learn more about [Microsoft Entra ID and OAuth2.0](../active-directory/develop/authentication-vs-authorization.md).
166
+
* Learn more about [Microsoft Entra ID and OAuth2.0](/entra/architecture/auth-oauth2).
167
167
* [Authenticate requests to Azure AI services](/azure/ai-services/authentication)
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-cache-external.md
+9-6Lines changed: 9 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlepow
6
6
7
7
ms.service: azure-api-management
8
8
ms.topic: how-to
9
-
ms.date: 09/11/2025
9
+
ms.date: 10/27/2025
10
10
ms.author: danlep
11
11
ms.custom: sfi-image-nochange
12
12
@@ -44,10 +44,10 @@ To complete this tutorial, you need to:
44
44
45
45
+[Create an Azure API Management instance](get-started-create-service-instance.md)
46
46
+ Understand [caching in Azure API Management](api-management-howto-cache.md)
47
-
+ Have an [Azure Managed Redis](../redis/quickstart-create-managed-redis.md), [Azure Cache for Redis](../azure-cache-for-redis/quickstart-create-redis.md), or another Redis-compatible cache available.
47
+
+ Have an [Azure Managed Redis](../redis/quickstart-create-managed-redis.md) or another Redis-compatible cache available.
48
48
49
49
> [!IMPORTANT]
50
-
> Azure API Management uses a Redis connection string to connect to the cache. If you use Azure Cache for Redis or Azure Managed Redis, enable access key authentication in your cache to use a connection string. Currently, you can't use Microsoft Entra authentication to connect Azure API Management to Azure Cache for Redis or Azure Managed Redis.
50
+
> Azure API Management uses a Redis connection string to connect to the cache. If you use Azure Managed Redis, enable access key authentication in your cache to use a connection string. Currently, you can't use Microsoft Entra authentication to connect Azure API Management to Azure Managed Redis.
51
51
52
52
### Redis cache for Kubernetes
53
53
@@ -57,7 +57,7 @@ For an API Management self-hosted gateway, caching requires an external cache. F
57
57
58
58
Follow the steps below to add an external Redis-compatible cache in Azure API Management. You can limit the cache to a specific gateway in your API Management instance.
59
59
60
-

60
+

61
61
62
62
### Use from setting
63
63
@@ -76,7 +76,7 @@ The **Use from** setting in the configuration specifies the location of your API
76
76
> [!NOTE]
77
77
> You can configure the same external cache for more than one API Management instance. The API Management instances can be in the same or different regions. When sharing the cache for more than one instance, you must select **Default** in the **Use from** setting.
78
78
79
-
### Add an Azure Cache for Redis or Azure Managed Redis instance from the same subscription
79
+
### Add an Azure Managed Redis instance from the same subscription
80
80
81
81
1. Browse to your API Management instance in the Azure portal.
82
82
1. In the left menu, under **Deployment + infrastructure** select **External cache**.
@@ -85,14 +85,17 @@ The **Use from** setting in the configuration specifies the location of your API
85
85
1. In the [**Use from**](#use-from-setting) dropdown, select **Default** or specify the desired region. The **Connection string** is automatically populated.
86
86
1. Select **Save**.
87
87
88
+
> [!NOTE]
89
+
> The default connection string is in the form `<cache-name>:10000,<cache-access-key>,ssl=True,abortConnect=False`. API Management stores the string as a secret named value. If you need to view or edit the string to rotate the access key or troubleshoot connection issues, go to the **Named values** blade.
90
+
88
91
### Add a Redis-compatible cache hosted outside of the current Azure subscription or Azure in general
89
92
90
93
1. Browse to your API Management instance in the Azure portal.
91
94
1. In the left menu, under **Deployment + infrastructure** select **External cache**.
92
95
1. Select **+ Add**.
93
96
1. In the **Cache instance** dropdown, select **Custom**.
94
97
1. In the [**Use from**](#use-from-setting) dropdown, select **Default** or specify the desired region.
95
-
1. Enter your Azure Cache for Redis, Azure Managed Redis, or Redis-compatible cache connection string in the **Connection string** field.
98
+
1. Enter your Azure Managed Redis or Redis-compatible cache connection string in the **Connection string** field.
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-cache.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,7 +82,7 @@ With the caching policies shown in this example, the first request to a test ope
82
82
1. Select **Save**.
83
83
84
84
> [!TIP]
85
-
> If you're using an external cache, as described in [Use an external Azure Cache for Redis in Azure API Management](api-management-howto-cache-external.md), you might want to specify the `caching-type` attribute of the caching policies. See [API Management caching policies](api-management-policies.md#caching) for more information.
85
+
> If you're using an external cache, as described in [Use an external Redis-compatible cache in Azure API Management](api-management-howto-cache-external.md), you might want to specify the `caching-type` attribute of the caching policies. See [API Management caching policies](api-management-policies.md#caching) for more information.
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-entra-external-id.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ Create an app registration in your Microsoft Entra ID tenant. The app registrati
55
55
* In the **Supported account types** section, select **Accounts in this organizational directory only**.
56
56
* In **Redirect URI**, select **Single-page application (SPA)** and enter the following URL: `https://{your-api-management-service-name}.developer.azure-api.net/signin`, where `{your-api-management-service-name}` is the name of your API Management instance.
57
57
* Select **Register** to create the application.
58
-
1.On the app **Overview** page, find the **Application (client) ID** and **Directory (tenant) ID** and copy theses values to a safe location. You need them later.
58
+
1.On the app **Overview** page, find the **Application (client) ID** and **Directory (tenant) ID** and copy these values to a safe location. You need them later.
59
59
1. In the sidebar menu, under **Manage**, select **Certificates & secrets**.
60
60
1. From the **Certificates & secrets** page, on the **Client secrets** tab, select **+ New client secret**.
0 commit comments