Skip to content

Commit 871c88a

Browse files
committed
Merge branch 'main' into v3-logic-apps
2 parents 02fb36f + a9e4be7 commit 871c88a

408 files changed

Lines changed: 5854 additions & 3462 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6355,6 +6355,11 @@
63556355
"redirect_url": "/azure/storage/container-storage/install-container-storage-aks",
63566356
"redirect_document_id": true
63576357
},
6358+
{
6359+
"source_path": "articles/reliability/reliability-cosmos-mongodb.md",
6360+
"redirect_url": "/azure/reliability/reliability-documentdb",
6361+
"redirect_document_id": true
6362+
},
63586363
{
63596364
"source_path": "articles/communications-gateway/connectivity.md",
63606365
"redirect_url": "/previous-versions/azure/communications-gateway/connectivity",

articles/api-management/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -714,6 +714,8 @@
714714
href: breaking-changes/identity-provider-adal-retirement-sep-2025.md
715715
- name: CAPTCHA endpoint update (September 2025)
716716
href: breaking-changes/captcha-endpoint-change-sep-2025.md
717+
- name: Trusted service connectivity retirement (March 2026)
718+
href: breaking-changes/trusted-service-connectivity-retirement-march-2026.md
717719
- name: Built-in analytics dashboard retirement (March 2027)
718720
href: breaking-changes/analytics-dashboard-retirement-march-2027.md
719721
- name: Regional availability

articles/api-management/api-management-howto-disaster-recovery-backup-restore.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: azure-api-management
99
ms.topic: how-to
10-
ms.date: 06/16/2025
10+
ms.date: 12/05/2025
1111
ms.author: danlep
1212
ms.custom: devx-track-azurepowershell
1313
---
@@ -399,7 +399,18 @@ Restore is a long-running operation that may take several minutes to complete. I
399399
## Storage networking constraints
400400

401401

402-
If the storage account is **[firewall][azure-storage-ip-firewall] enabled**, it's recommended to use the API Management instance's system-assigned managed identity for access to the account. Ensure that the storage account [grants access to trusted Azure services](../storage/common/storage-network-security.md?tabs=azure-portal#grant-access-to-trusted-azure-services).
402+
If the storage account is **[firewall][azure-storage-ip-firewall] enabled**, it's recommended to use the API Management instance's system-assigned managed identity for access to the account. Ensure that you have networking line of sight from API Management. Configure one of the following network access options on the resource:
403+
404+
- Allow public access from all networks.
405+
406+
- Set a network security rule to allow API Management traffic based on the IP address or virtual network connectivity.
407+
408+
- Secure traffic from API Management with Private Link connectivity.
409+
410+
- Use a [network security perimeter](/azure/private-link/network-security-perimeter-concepts#onboarded-private-link-resources) to secure the resource and allow traffic from API Management.
411+
412+
> [!IMPORTANT]
413+
> Starting March 2026, trusted service connectivity to Azure services from API Management by enabling the **Allow Trusted Microsoft Services to bypass this firewall** firewall setting will no longer be supported. To continue accessing these services from API Management after this change, ensure that you choose a supported network access option as described above. [Learn more](breaking-changes/trusted-service-connectivity-retirement-march-2026.md)
403414
404415
## What is not backed up
405416
- **Usage data** used for creating analytics reports **isn't included** in the backup. Use [Azure API Management REST API][azure api management rest api] to periodically retrieve analytics reports for safekeeping.

articles/api-management/api-management-howto-use-managed-service-identity.md

Lines changed: 20 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -314,14 +314,27 @@ You can use the system-assigned identity to authenticate to a backend service vi
314314

315315
### Connect to Azure resources behind an IP firewall by using a system-assigned managed identity
316316

317+
For certain scenarios, API Management can communicate with resources in the following services using a system-assigned managed identity configured with an appropriate role assignment:
317318

318-
API Management is a trusted Microsoft service to the following resources. This trusted status enables the service to connect to the following resources behind a firewall. After you explicitly assign the appropriate Azure role to the [system-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) for a resource instance, the scope of access for the instance corresponds to the Azure role that's assigned to the managed identity.
319+
- Azure Key Vault
320+
- Azure Storage
321+
- Azure Service Bus
322+
- Azure Event Hubs
323+
- Azure Container Registry
324+
- Azure Managed HSM
319325

326+
For resources in these services that are protected by an IP firewall, ensure that you have networking line of sight from API Management. Configure one of the following network access options on the resource:
320327

321-
- [Trusted access for Key Vault](/azure/key-vault/general/overview-vnet-service-endpoints#trusted-services)
322-
- [Trusted access for Azure Storage](../storage/common/storage-network-security-trusted-azure-services.md?tabs=azure-portal#trusted-access-based-on-system-assigned-managed-identity)
323-
- [Trusted access for Azure Services Bus](../service-bus-messaging/service-bus-ip-filtering.md#trusted-microsoft-services)
324-
- [Trusted access for Azure Event Hubs](../event-hubs/event-hubs-ip-filtering.md#trusted-microsoft-services)
328+
- Allow public access from all networks.
329+
330+
- Set a network security rule to allow API Management traffic based on the IP address or virtual network connectivity.
331+
332+
- Secure traffic from API Management with Private Link connectivity.
333+
334+
- Use a [network security perimeter](/azure/private-link/network-security-perimeter-concepts#onboarded-private-link-resources) to secure the resource and allow traffic from API Management.
335+
336+
> [!IMPORTANT]
337+
> Starting March 2026, trusted service connectivity to Azure services from API Management by enabling the **Allow Trusted Microsoft Services to bypass this firewall** firewall setting will no longer be supported. To continue accessing these services from API Management after this change, ensure that you choose a supported network access option as described above. [Learn more](breaking-changes/trusted-service-connectivity-retirement-march-2026.md)
325338
326339
### Log events to an event hub
327340

@@ -456,7 +469,7 @@ Following are some common scenarios for using a user-assigned managed identity i
456469
You can use a user-assigned identity to establish trust between an API Management instance and Key Vault. This trust can then be used to retrieve custom TLS/SSL certificates that are stored in Key Vault. You can then assign these certificates to custom domains in the API Management instance.
457470

458471
> [!IMPORTANT]
459-
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. In Key Vault firewall, the **Allow Trusted Microsoft Services to bypass this firewall** option must be enabled.
472+
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. For more information, see the section [Requirements for key vault firewall](#requirements-for-key-vault-firewall).
460473
461474
Take these considerations into account:
462475

@@ -472,7 +485,7 @@ Take these considerations into account:
472485
You can use a user-assigned managed identity to access Key Vault to store and manage secrets for use in API Management policies. For more information, see [Use named values in Azure API Management policies](api-management-howto-properties.md).
473486

474487
> [!NOTE]
475-
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. In Key Vault firewall, the **Allow Trusted Microsoft Services to bypass this firewall** option must be enabled.
488+
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. For more information, see the section [Requirements for key vault firewall](#requirements-for-key-vault-firewall).
476489
477490
### Authenticate to a backend by using a user-assigned identity
478491

36.7 KB
Loading

articles/api-management/breaking-changes/overview.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,13 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: reference
9-
ms.date: 07/17/2025
9+
ms.date: 12/03/2025
1010
ms.author: danlep
1111
---
1212

1313
# Upcoming breaking changes
1414

15-
[!INCLUDE [api-management-availability-premium-dev-standard-basic-consumption](../../../includes/api-management-availability-premium-dev-standard-basic-consumption.md)]
16-
15+
[!INCLUDE [api-management-availability-all-tiers](../../../includes/api-management-availability-all-tiers.md)]
1716
The following table lists all the upcoming breaking changes and feature retirements for Azure API Management.
1817

1918
| Change Title | Effective Date |
@@ -33,6 +32,7 @@ The following table lists all the upcoming breaking changes and feature retireme
3332
| [Managed certificates suspension][managed-certificates-suspension-august-2025] | August 15, 2025 - March 15, 2026|
3433
| [ADAL-based Microsoft Entra ID identity provider retirement][msal2025] | September 30, 2025 |
3534
| [CAPTCHA endpoint update][captcha2025] | September 30, 2025 |
35+
| [Trusted service connectivity retirement][trustedservice2026] | March 15, 2026 |
3636
| [Built-in analytics dashboard retirement][analytics2027] | March 15, 2027 |
3737

3838
<!-- Links -->
@@ -52,3 +52,4 @@ The following table lists all the upcoming breaking changes and feature retireme
5252
[workspaces2024]: ./workspaces-breaking-changes-june-2024.md
5353
[workspaces2025march]: ./workspaces-breaking-changes-march-2025.md
5454
[managed-certificates-suspension-august-2025]: ./managed-certificates-suspension-august-2025.md
55+
[trustedservice2026]: ./trusted-service-connectivity-retirement-march-2026.md
Lines changed: 137 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,137 @@
1+
---
2+
title: Azure API Management - Trusted service connectivity retirement (March 2026)
3+
description: Azure API Management is retiring trusted service connectivity to supported Azure services as of March 2026. Use alternative networking options for secure connectivity.
4+
#customer intent: As an Azure admin, I want to determine if my API Management service is affected by the trusted service connectivity retirement so that I can plan necessary changes.
5+
author: dlepow
6+
ms.author: danlep
7+
ms.date: 12/05/2025
8+
ms.topic: reference
9+
ms.service: azure-api-management
10+
ai-usage: ai-assisted
11+
---
12+
13+
14+
# Trusted service connectivity retirement (March 2026)
15+
16+
[!INCLUDE [api-management-availability-all-tiers](../../../includes/api-management-availability-all-tiers.md)]
17+
18+
Effective 15 March 2026, Azure API Management is retiring trusted service connectivity to supported Azure services - Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hub, and Container Registry. If your API Management resource relies on this feature to communicate with these services after 15 March 2026, the communication will fail. Use alternative networking options to securely connect to those services.
19+
20+
API Management services created on or after 1 December 2025 no longer support trusted service connectivity. Contact Azure support if you need to enable trusted service connectivity in those services until the retirement date.
21+
22+
## Is my service affected by this change?
23+
24+
First, check for an Azure Advisor recommendation:
25+
26+
1. In the Azure portal, go to [Advisor](https://ms.portal.azure.com/#view/Microsoft_Azure_Expert/AdvisorMenuBlade/~/overview)
27+
1. Select the **Recommendations > Operational excellence** category.
28+
1. Search for "**Disable trusted service connectivity in API Management**".
29+
30+
**If you don't see a recommendation**, your API Management resource isn't affected by the change.
31+
32+
**If you see a recommendation**, your API Management resource is affected by the breaking change and you need to take action:
33+
34+
1. Determine if your API Management resource relies on trusted service connectivity to Azure services.
35+
1. If it does, update the networking configuration to eliminate the dependency on trusted service connectivity. If it doesn’t, proceed to the next step.
36+
1. Disable trusted service connectivity in API Management.
37+
38+
### Step 1: Does my API Management resource rely on trusted service connectivity?
39+
40+
API Management should no longer rely on trusted service connectivity to Azure services. Instead, it should establish a networking line of sight.
41+
42+
To verify if API Management relies on trusted connectivity to Azure services, check the networking configuration of all Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hub, and Container Registry resources that API Management connects to:
43+
44+
#### For Storage accounts
45+
46+
1. Go to **Networking** under **Security + networking**.
47+
1. Select **Manage** in the **Public network access** tab.
48+
1. API Management may rely on trusted service connectivity if **Allow trusted Microsoft services to access this resource** is selected if:
49+
- **Public network access** is set to **Disable**, or
50+
- **Public network access** is set to **Enable** and **Public network access scope** is set to **Enable from selected networks**.
51+
1. API Management may rely on trusted service connectivity if API Management is configured under **Resource instances**, if **Public network access** is set to **Enable** and **Public network access scope** is set to **Enable from selected networks**.
52+
53+
:::image type="content" source="media/trusted-service-connectivity-retirement-march-2026/network-connectivity-storage.png" alt-text="Screenshot of trusted connectivity settings to Azure Storage in the portal.":::
54+
55+
#### For Event Hubs and Key Vault Managed HSM
56+
57+
1. Go to **Networking** under **Settings**.
58+
1. Select **Manage** in the **Public access** tab.
59+
1. API Management may rely on trusted service connectivity if **Allow trusted Microsoft service to access this resource** is selected if:
60+
- **Public network access** is set to **Disable**, or
61+
- **Public network access** is set to **Enable** and **Default action** is set to **Enable from selected networks**.
62+
63+
#### For Service Bus (Premium only) and Key Vault
64+
65+
1. Go to **Networking** under **Settings**.
66+
1. API Management may rely on trusted service connectivity if **Allow trusted Microsoft services to bypass this firewall** is selected if you're using the **Allow public access from specific virtual networks and IP addresses** or **Disable public access** options.
67+
68+
#### For Container Registry (Premium pricing plan only)
69+
70+
1. Go to **Networking** under **Settings**.
71+
1. API Management may rely on trusted service connectivity if **Allow trusted Microsoft services to access this container registry** is checked under **Firewall exception** if **Public network access** is set to **Selected networks** or **Disabled**.
72+
73+
### Step 2: Eliminate dependency on trusted service connectivity
74+
75+
If you verified that API Management relies on trusted connectivity to Azure resources, you need to eliminate this dependency by establishing a networking line of sight for communication from API Management to the listed services.
76+
77+
You can configure the networking of target resources to one of the following options:
78+
79+
- Enable public connectivity from all networks.
80+
81+
- Set a network security rule to allow API Management traffic based on the IP address or virtual network connectivity.
82+
83+
- Secure traffic from API Management with Private Link connectivity.
84+
85+
- Use Network Security Perimeter to secure your Azure backends and allow traffic from API Management, if supported (for example, for Azure Storage). Learn more about Network Security Perimeter:
86+
87+
- [What is a network security perimeter?](/azure/private-link/network-security-perimeter-concepts#onboarded-private-link-resources)
88+
89+
- [Transition to a Network Security Perimeter in Azure](/azure/private-link/network-security-perimeter-transition)
90+
91+
### Step 3: Disable trusted service connectivity in API Management
92+
93+
After ensuring that API Management doesn’t access other Azure services using trusted service connectivity, you must explicitly disable trusted connectivity in your API Management service to acknowledge you have verified that the service no longer depends on trusted connectivity.
94+
95+
To do so, set a custom property `Microsoft.WindowsAzure.ApiManagement.Gateway.ManagedIdentity.DisableOverPrivilegedAccess` to `"True"` on the [API Management resource](/rest/api/apimanagement/api-management-service/create-or-update). For example:
96+
97+
98+
```json
99+
{
100+
"type": "Microsoft.ApiManagement/service",
101+
"apiVersion": "2025-03-01-preview",
102+
"name": "string",
103+
"identity": {
104+
"type": "SystemAssigned"
105+
},
106+
"location": "string",
107+
"properties": {
108+
"customProperties": {
109+
"Microsoft.WindowsAzure.ApiManagement.Gateway.ManagedIdentity.DisableOverPrivilegedAccess": "True"
110+
}
111+
},
112+
"sku": {
113+
"capacity": "1",
114+
"name": "Developer"
115+
}
116+
}
117+
```
118+
119+
The Azure Advisor recommendation should disappear within a day or two of disabling the trusted connectivity on the API Management service.
120+
121+
## What is the deadline for the change?
122+
123+
After 15 March 2026, the trusted connectivity from API Management to supported Azure services - Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, and Container Registry - is retired. If your API Management resource relies on this feature to establish communication with these services, the communication will start failing after that date.
124+
125+
## Help and support
126+
127+
If you have questions, get answers from community experts in [Microsoft Q&A](/answers). If you have a support plan and you need technical help, create a [support request](https://portal.azure.com/#view/Microsoft_Azure_Support/HelpAndSupportBlade/%7E/overview).
128+
129+
1. Under **Issue type**, select **Technical**.
130+
1. Under **Subscription**, select your subscription.
131+
1. Under **Service**, select **My services**, then select **API Management Service**.
132+
1. Under **Resource**, select the Azure resource that you're creating a support request for.
133+
1. For **Summary**, type a description of your issue, for example, "Trusted service connectivity".
134+
135+
## Related content
136+
137+
See all [upcoming breaking changes and feature retirements](overview.md).

articles/api-management/inject-vnet-v2.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -64,11 +64,7 @@ The subnet needs to be delegated to the **Microsoft.Web/hostingEnvironments** se
6464

6565
:::image type="content" source="media/virtual-network-injection-workspaces-resources/delegate-internal.png" alt-text="Screenshot showing subnet delegation to Microsoft.Web/hostingEnvironments in the portal.":::
6666

67-
68-
> [!NOTE]
69-
> You might need to register the `Microsoft.Web/hostingEnvironments` resource provider in the subscription so that you can delegate the subnet to the service.
70-
71-
For more information about configuring subnet delegation, see [Add or remove a subnet delegation](../virtual-network/manage-subnet-delegation.md).
67+
[!INCLUDE [api-management-virtual-network-v2-delegation-requirement](../../includes/api-management-virtual-network-v2-delegation-requirement.md)]
7268

7369
### Permissions
7470

articles/api-management/integrate-vnet-outbound.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: dlepow
55
ms.author: danlep
66
ms.service: azure-api-management
77
ms.topic: how-to
8-
ms.date: 11/11/2025
8+
ms.date: 12/04/2025
99
---
1010

1111
# Integrate an Azure API Management instance with a private virtual network for outbound connections
@@ -60,12 +60,7 @@ The subnet needs to be delegated to the **Microsoft.Web/serverFarms** service.
6060

6161
:::image type="content" source="media/virtual-network-injection-workspaces-resources/delegate-external.png" alt-text="Screenshot showing subnet delegation to Microsoft.Web/serverFarms in the portal.":::
6262

63-
64-
> [!NOTE]
65-
> You might need to register the `Microsoft.Web/serverFarms` resource provider in the subscription so that you can delegate the subnet to the service, even if you see it on the list of available services in the subnet delegation setup in the portal.
66-
67-
68-
For more information about configuring subnet delegation, see [Add or remove a subnet delegation](../virtual-network/manage-subnet-delegation.md).
63+
[!INCLUDE [api-management-virtual-network-v2-delegation-requirement](../../includes/api-management-virtual-network-v2-delegation-requirement.md)]
6964

7065
### Permissions
7166

0 commit comments

Comments
 (0)