You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/breaking-changes/managed-certificates-suspension-august-2025.md
+28-2Lines changed: 28 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlepow
6
6
ms.service: azure-api-management
7
7
ms.topic: reference
8
8
ai-usage: ai-assisted
9
-
ms.date: 01/26/2026
9
+
ms.date: 02/06/2026
10
10
ms.author: danlep
11
11
---
12
12
@@ -36,11 +36,37 @@ If you need to add new managed certificates, plan to do so before August 15, 202
36
36
37
37
If you already have managed certificates for your custom domains, do the following to ensure continued access:
38
38
39
-
- Ensure that your API Management service allows [inbound traffic from DigiCert IP addresses on port 80](#allow-access-to-digicert-ip-addresses). This access is now required for the certificate autorenewal process.
39
+
1. Ensure that your API Management service [allows inbound traffic from DigiCert IP addresses on port 80](#step-1-allow-access-to-digicert-ip-addresses). This access is now required for the certificate autorenewal process.
40
+
1.[Configure DNS records](#step-2-configure-dns-records) to resolve your custom domain name.
41
+
1.[Allow API Management service access to port 80](#step-3-allow-api-management-service-access-to-port-80) if you have inbound network restrictions in place.
Configure DNS records for your custom domain to point to your API Management gateway. The type of DNS record you need to add depends on your API Management tier.
50
+
51
+
#### DNS records for Developer, Basic, Standard, or Premium tier
52
+
53
+
1. Add either a [CNAME](/azure/api-management/configure-custom-domain?tabs=custom#cname-record) or A-record with your DNS provider.
54
+
55
+
1. Add DigiCert as an authorized certificate authority (CA) in Azure DNS. For this, create a specific CAA record set within your domain's DNS zone using the Azure portal or other management tools.
56
+
57
+
#### DNS records for Consumption tier
58
+
59
+
1. Add either a [CNAME](/azure/api-management/configure-custom-domain?tabs=custom#cname-record) or [TXT](/azure/api-management/configure-custom-domain?tabs=managed#txt-record) record with your DNS provider. If you configure both, the TXT record takes precedence.
60
+
1. Add DigiCert as an authorized certificate authority (CA) in Azure DNS. For this, you need to create a specific CAA record set within your domain's DNS zone using the Azure portal or other management tools
61
+
62
+
### Step 3: Allow API Management service access to port 80
63
+
64
+
If you have inbound network restrictions configured for your API Management service, allow the Azure API Management resource provider access on port 80. This is required to allow inbound traffic to support certificate revocation list (CRL) checks, certificate renewal, and management communication.
65
+
66
+
1. In the Azure portal, go to **Network security groups**.
67
+
1. Select the network security group associated with your API Management subnet.
68
+
1. Under **Settings** > **Inbound security rules**, add a new rule allowing traffic on port 80 from the **ApiManagement** service tag to the API Management instance.
69
+
44
70
## Help and support
45
71
46
72
If you have questions, get answers from community experts in [Microsoft Q&A](https://aka.ms/apim/azureqa/change/captcha-2022). If you have a support plan and need technical help, create a [support request](https://portal.azure.com/#view/Microsoft_Azure_Support/HelpAndSupportBlade/~/overview).
Copy file name to clipboardExpand all lines: includes/api-management-managed-certificate-ip-access.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,8 +7,6 @@ ms.author: danlep
7
7
ms.custom:
8
8
---
9
9
10
-
### Allow access to DigiCert IP addresses
11
-
12
10
Starting January 2026, Azure API Management needs inbound access on port 80 to [specific DigiCert IP addresses](https://knowledge.digicert.com/alerts/ip-address-domain-validation?utm_medium=organic&utm_source=docs-digicert&referrer=https://docs.digicert.com/en/certcentral/manage-certificates/domain-control-validation-methods/automatic-domain-control-validation-check.html) to renew (rotate) your managed certificate.
13
11
14
12
If your API Management instance restricts incoming IP addresses, we recommend that you remove or modify existing IP restrictions by using one of the following methods based on your deployment architecture.
0 commit comments