Skip to content

Commit 625f304

Browse files
Merge pull request #314596 from dlepow/dlepow-1775858604645
[APIM] Cred mgr in VNet
2 parents 3dc3607 + cfe6ff2 commit 625f304

3 files changed

Lines changed: 8 additions & 6 deletions

File tree

articles/api-management/credentials-configure-common-providers.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,9 @@ To configure any of the supported providers in API Management, first configure a
3434

3535
* Depending on the provider and your scenario, you might need to retrieve other settings, like authorization endpoint URLs or scopes.
3636

37-
* The provider's authorization endpoints must be reachable over the internet from your API Management instance. If your API Management instance is secured in a virtual network, configure network or firewall rules to allow access to the provider's endpoints.
37+
* The provider's authorization endpoints must be reachable over the internet from your API Management instance. If your API Management instance is secured in a virtual network, configure network or firewall rules to allow access to the provider's endpoints.
38+
39+
Additionally, requests for tokens need to go out of the customer's network to the credential manager endpoint, which remains in a Microsoft network. To reach the credential manager endpoint, allow outbound access from the virtual network to the **AzureConnections** service tag on port 443.
3840

3941
## Microsoft Entra provider
4042

articles/api-management/credentials-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about using credential manager in Azure API Management to cre
44
author: dlepow
55
ms.service: azure-api-management
66
ms.topic: concept-article
7-
ms.date: 09/25/2025
7+
ms.date: 04/10/2026
88
ms.author: danlep
99
ms.custom: references_regions
1010
---
@@ -129,9 +129,9 @@ At runtime, API Management can't fetch new tokens, and an error occurs.
129129

130130
* If the connection is of type *client credentials*, the client secret needs to be updated on the connection level.
131131

132-
### Is this feature supported using API Management running inside a VNet?
132+
### Is this feature supported using API Management running inside a virtual network?
133133

134-
Yes, as long as outbound connectivity on port 443 is enabled to the **AzureConnectors** service tag. For more information, see [Virtual network configuration reference](virtual-network-reference.md#required-ports).
134+
Requests for tokens need to go out of the customer's network to the credential manager endpoint, which remains in a Microsoft network. If the API Management instance is running inside a virtual network, credential manager is supported as long as outbound connectivity on port 443 is enabled to the **AzureConnectors** service tag. For more information, see [Virtual network configuration reference](virtual-network-reference.md#required-ports).
135135

136136
### What happens when a credential provider is deleted?
137137

articles/api-management/virtual-network-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: reference
9-
ms.date: 06/17/2025
9+
ms.date: 04/10/2026
1010
ms.author: danlep
1111
ms.custom: references_regions
1212
---
@@ -45,7 +45,7 @@ When an API Management service instance is hosted in a VNet, the ports in the fo
4545
| Outbound | VirtualNetwork | * | Internet | 80 | TCP | Allow | **Validation and management of Microsoft-managed and customer-managed certificates** | External & Internal |
4646
| Outbound | VirtualNetwork | * | Storage | 443 | TCP | Allow | **Dependency on Azure Storage** | External & Internal |
4747
| Outbound | VirtualNetwork | * | AzureActiveDirectory | 443 | TCP | Allow | [Microsoft Entra ID, Microsoft Graph,](api-management-howto-aad.md) and Azure Key Vault dependency (optional) | External & Internal |
48-
| Outbound | VirtualNetwork | * | AzureConnectors | 443 | TCP | Allow | [managed connections](credentials-overview.md) dependency (optional) | External & Internal |
48+
| Outbound | VirtualNetwork | * | AzureConnectors | 443 | TCP | Allow | [API Management credential manager endpoint](credentials-overview.md) dependency (optional) | External & Internal |
4949
| Outbound | VirtualNetwork | * | Sql | 1433 | TCP | Allow | **Access to Azure SQL endpoints** | External & Internal |
5050
| Outbound | VirtualNetwork | * | AzureKeyVault | 443 | TCP | Allow | **Access to Azure Key Vault** | External & Internal |
5151
| Outbound | VirtualNetwork | * | EventHub | 5671, 5672, 443 | TCP | Allow | Dependency for [Log to Azure Event Hubs policy](api-management-howto-log-event-hubs.md) and [Azure Monitor](api-management-howto-use-azure-monitor.md) (optional) | External & Internal |

0 commit comments

Comments
 (0)