You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-disaster-recovery-backup-restore.md
+3-14Lines changed: 3 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: dlepow
7
7
8
8
ms.service: azure-api-management
9
9
ms.topic: how-to
10
-
ms.date: 12/05/2025
10
+
ms.date: 12/18/2025
11
11
ms.author: danlep
12
12
ms.custom: devx-track-azurepowershell
13
13
---
@@ -29,7 +29,7 @@ This article shows how to automate backup and restore operations of your API Man
29
29
> Each backup expires after 30 days. If you attempt to restore a backup after the 30-day expiration period has expired, the restore will fail with a `Cannot restore: backup expired` message.
30
30
31
31
> [!IMPORTANT]
32
-
> Restore operation doesn't change custom hostname configuration of the target service. We recommend to use the same custom hostname and TLS certificate for both active and standby services, so that, after restore operation completes, the traffic can be re-directed to the standby instance by a simple DNS CNAME change.
32
+
> Restore operation doesn't change custom hostname configuration of the target service. We recommend using the same custom hostname and TLS certificate for both active and standby services, so that, after restore operation completes, the traffic can be re-directed to the standby instance by a simple DNS CNAME change.
@@ -399,18 +399,7 @@ Restore is a long-running operation that may take several minutes to complete. I
399
399
## Storage networking constraints
400
400
401
401
402
-
If the storage account is **[firewall][azure-storage-ip-firewall] enabled**, it's recommended to use the API Management instance's system-assigned managed identity for access to the account. Ensure that you have networking line of sight from API Management. Configure one of the following network access options on the resource:
403
-
404
-
- Allow public access from all networks.
405
-
406
-
- Set a network security rule to allow API Management traffic based on the IP address or virtual network connectivity.
407
-
408
-
- Secure traffic from API Management with Private Link connectivity.
409
-
410
-
- Use a [network security perimeter](/azure/private-link/network-security-perimeter-concepts#onboarded-private-link-resources) to secure the resource and allow traffic from API Management.
411
-
412
-
> [!IMPORTANT]
413
-
> Starting March 2026, trusted service connectivity to Azure services from API Management by enabling the **Allow Trusted Microsoft Services to bypass this firewall** firewall setting will no longer be supported. To continue accessing these services from API Management after this change, ensure that you choose a supported network access option as described above. [Learn more](breaking-changes/trusted-service-connectivity-retirement-march-2026.md)
402
+
If the storage account is **[firewall][azure-storage-ip-firewall] enabled**, it's recommended to use the API Management instance's system-assigned managed identity for access to the account. Ensure that the storage account [grants access to trusted Azure services](../storage/common/storage-network-security.md?tabs=azure-portal#grant-access-to-trusted-azure-services).
414
403
415
404
## What is not backed up
416
405
-**Usage data** used for creating analytics reports **isn't included** in the backup. Use [Azure API Management REST API][azure api management rest api] to periodically retrieve analytics reports for safekeeping.
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-use-managed-service-identity.md
+7-17Lines changed: 7 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlepow
6
6
7
7
ms.service: azure-api-management
8
8
ms.topic: how-to
9
-
ms.date: 05/19/2025
9
+
ms.date: 12/18/2025
10
10
ms.author: danlep
11
11
ms.custom:
12
12
- devx-track-azurepowershell
@@ -314,27 +314,17 @@ You can use the system-assigned identity to authenticate to a backend service vi
314
314
315
315
### Connect to Azure resources behind an IP firewall by using a system-assigned managed identity
316
316
317
-
For certain scenarios, API Management can communicate with resources in the following services using a system-assigned managed identity configured with an appropriate role assignment:
317
+
API Management is a trusted Microsoft service to the following resources. This trusted status enables the service to connect to the following resources behind a firewall when the firewall enables a setting to **Allow Trusted Microsoft Services to bypass this firewall**. After you explicitly assign the appropriate Azure role to the [system-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) for a resource instance, the scope of access for the instance corresponds to the Azure role that's assigned to the managed identity.
318
318
319
-
- Azure Key Vault
320
-
- Azure Storage
321
-
- Azure Service Bus
322
-
- Azure Event Hubs
323
-
- Azure Container Registry
324
-
- Azure Managed HSM
325
319
326
-
For resources in these services that are protected by an IP firewall, ensure that you have networking line of sight from API Management. Configure one of the following network access options on the resource:
320
+
-[Trusted access for Key Vault](/azure/key-vault/general/overview-vnet-service-endpoints#trusted-services)
321
+
-[Trusted access for Azure Storage](../storage/common/storage-network-security-trusted-azure-services.md?tabs=azure-portal#trusted-access-based-on-system-assigned-managed-identity)
322
+
-[Trusted access for Azure Service Bus](../service-bus-messaging/service-bus-ip-filtering.md#trusted-microsoft-services)
323
+
-[Trusted access for Azure Event Hubs](../event-hubs/event-hubs-ip-filtering.md#trusted-microsoft-services)
327
324
328
-
- Allow public access from all networks.
329
-
330
-
- Set a network security rule to allow API Management traffic based on the IP address or virtual network connectivity.
331
-
332
-
- Secure traffic from API Management with Private Link connectivity.
333
-
334
-
- Use a [network security perimeter](/azure/private-link/network-security-perimeter-concepts#onboarded-private-link-resources) to secure the resource and allow traffic from API Management.
335
325
336
326
> [!IMPORTANT]
337
-
> Starting March 2026, trusted service connectivity to Azure services from API Management by enabling the **Allow Trusted Microsoft Services to bypass this firewall** firewall setting will no longer be supported. To continue accessing these services from API Management after this change, ensure that you choose a supported network access option as described above. [Learn more](breaking-changes/trusted-service-connectivity-retirement-march-2026.md)
327
+
> Starting March 2026, trusted service connectivity to Azure services from the API Management gateway by enabling the **Allow Trusted Microsoft Services to bypass this firewall** firewall setting will no longer be supported. To continue accessing these services from the API Management gateway after this change, ensure that you choose a different supported network access option. For control-plane operations, you can continue to use trusted service connectivity. [Learn more](breaking-changes/trusted-service-connectivity-retirement-march-2026.md).
Copy file name to clipboardExpand all lines: articles/api-management/backends.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -118,6 +118,9 @@ To add CA certificate details, follow these steps:
118
118
> [!NOTE]
119
119
> When you configure details of a custom CA certificate in the backend entity, API Management always validates the certificate name and certificate chain, regardless of whether you enable or disable validation settings in the backend's `backendTlsProperties`.
120
120
121
+
> [!TIP]
122
+
> You can also configure CA certificate details programmatically by using the API Management REST API. Set the `backendTlsProperties` in the [backend entity](/rest/api/apimanagement/backend/create-or-update?view=rest-apimanagement-2025-03-01-preview&preserve-view=true#backendtlsproperties).
123
+
121
124
## Reference backend using set-backend-service policy
122
125
123
126
After creating a backend, you can reference the backend identifier (name) in your APIs. Use the [`set-backend-service`](set-backend-service-policy.md) policy to direct an incoming API request to the backend. If you already configured a backend web service for an API, you can use the `set-backend-service` policy to redirect the request to a backend entity instead. For example:
Copy file name to clipboardExpand all lines: articles/api-management/breaking-changes/trusted-service-connectivity-retirement-march-2026.md
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: Azure API Management - Trusted service connectivity retirement (March 2026)
3
-
description: Azure API Management is retiring trusted service connectivity to supported Azure services as of March 2026. Use alternative networking options for secure connectivity.
3
+
description: Azure API Management is retiring trusted service connectivity by the gateway to supported Azure services as of March 2026. Use alternative networking options for secure connectivity.
4
4
#customer intent: As an Azure admin, I want to determine if my API Management service is affected by the trusted service connectivity retirement so that I can plan necessary changes.
Effective 15 March 2026, Azure API Management is retiring trusted service connectivity to supported Azure services - Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hub, and Container Registry. If your API Management resource relies on this feature to communicate with these services after 15 March 2026, the communication will fail. Use alternative networking options to securely connect to those services.
18
+
Effective 15 March 2026, Azure API Management is retiring trusted service connectivity by the API Management gateway to supported Azure services - Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, and Container Registry. If your API Management gateway relies on this feature to communicate with these services after 15 March 2026, the communication will fail. Use alternative networking options to securely connect to those services.
19
19
20
-
API Management services created on or after 1 December 2025 no longer support trusted service connectivity. Contact Azure support if you need to enable trusted service connectivity in those services until the retirement date.
20
+
The gateway in API Management services created on or after 1 December 2025 no longer supports trusted service connectivity. Contact Azure support if you need to enable trusted service connectivity in those services until the retirement date.
21
21
22
22
## Is my service affected by this change?
23
23
@@ -27,19 +27,19 @@ First, check for an Azure Advisor recommendation:
27
27
1. Select the **Recommendations > Operational excellence** category.
28
28
1. Search for "**Disable trusted service connectivity in API Management**".
29
29
30
-
**If you don't see a recommendation**, your API Management resource isn't affected by the change.
30
+
**If you don't see a recommendation**, your API Management gateway isn't affected by the change.
31
31
32
-
**If you see a recommendation**, your API Management resource is affected by the breaking change and you need to take action:
32
+
**If you see a recommendation**, your API Management gateway is affected by the breaking change and you need to take action:
33
33
34
-
1. Determine if your API Management resource relies on trusted service connectivity to Azure services.
34
+
1. Determine if your API Management gateway relies on trusted service connectivity to Azure services.
35
35
1. If it does, update the networking configuration to eliminate the dependency on trusted service connectivity. If it doesn’t, proceed to the next step.
36
-
1. Disable trusted service connectivity in API Management.
36
+
1. Disable trusted service connectivity in your API Management gateway.
37
37
38
-
### Step 1: Does my API Management resource rely on trusted service connectivity?
38
+
### Step 1: Does my API Management gateway rely on trusted service connectivity?
39
39
40
-
API Management should no longer rely on trusted service connectivity to Azure services. Instead, it should establish a networking line of sight.
40
+
Your API Management gateway should no longer rely on trusted service connectivity to Azure services. Instead, it should establish a networking line of sight.
41
41
42
-
To verify if API Management relies on trusted connectivity to Azure services, check the networking configuration of all Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hub, and Container Registry resources that API Management connects to:
42
+
To verify if your API Management gateway relies on trusted connectivity to Azure services, check the networking configuration of all Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, and Container Registry resources that your API Management gateway connects to:
43
43
44
44
#### For Storage accounts
45
45
@@ -72,7 +72,7 @@ To verify if API Management relies on trusted connectivity to Azure services, ch
72
72
73
73
### Step 2: Eliminate dependency on trusted service connectivity
74
74
75
-
If you verified that API Management relies on trusted connectivity to Azure resources, you need to eliminate this dependency by establishing a networking line of sight for communication from API Management to the listed services.
75
+
If you verified that your API Management gateway relies on trusted connectivity to Azure resources, you need to eliminate this dependency by establishing a networking line of sight for communication from API Management to the listed services.
76
76
77
77
You can configure the networking of target resources to one of the following options:
78
78
@@ -88,11 +88,11 @@ You can configure the networking of target resources to one of the following opt
88
88
89
89
-[Transition to a Network Security Perimeter in Azure](/azure/private-link/network-security-perimeter-transition)
90
90
91
-
### Step 3: Disable trusted service connectivity in API Management
91
+
### Step 3: Disable trusted service connectivity in API Management gateway
92
92
93
-
After ensuring that API Management doesn’t access other Azure services using trusted service connectivity, you must explicitly disable trusted connectivity in your API Management service to acknowledge you have verified that the service no longer depends on trusted connectivity.
93
+
After ensuring that your API Management gateway doesn't access other Azure services using trusted service connectivity, you must explicitly disable trusted connectivity in your gateway to acknowledge you have verified that the service no longer depends on trusted connectivity.
94
94
95
-
To do so, set a custom property `Microsoft.WindowsAzure.ApiManagement.Gateway.ManagedIdentity.DisableOverPrivilegedAccess` to `"True"` on the [API Management resource](/rest/api/apimanagement/api-management-service/create-or-update). For example:
95
+
To do so, set a custom property `Microsoft.WindowsAzure.ApiManagement.Gateway.ManagedIdentity.DisableOverPrivilegedAccess` to `"True"` on the [API Management gateway](/rest/api/apimanagement/api-management-service/create-or-update). For example:
96
96
97
97
98
98
```json
@@ -116,11 +116,11 @@ To do so, set a custom property `Microsoft.WindowsAzure.ApiManagement.Gateway.Ma
116
116
}
117
117
```
118
118
119
-
The Azure Advisor recommendation should disappear within a day or two of disabling the trusted connectivity on the API Management service.
119
+
The Azure Advisor recommendation should disappear within a day or two of disabling the trusted connectivity on the API Management gateway.
120
120
121
121
## What is the deadline for the change?
122
122
123
-
After 15 March 2026, the trusted connectivity from API Management to supported Azure services - Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, and Container Registry - is retired. If your API Management resource relies on this feature to establish communication with these services, the communication will start failing after that date.
123
+
After 15 March 2026, the trusted connectivity from the API Management gateway to supported Azure services - Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, and Container Registry - is retired. If your API Management gateway relies on this feature to establish communication with these services, the communication will start failing after that date.
Copy file name to clipboardExpand all lines: articles/azure-vmware/introduction.md
+16-1Lines changed: 16 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Introduction
3
3
description: Learn the features and benefits of Azure VMware Solution to deploy and manage VMware-based workloads in Azure.
4
4
ms.topic: overview
5
5
ms.service: azure-vmware
6
-
ms.date: 10/30/2025
6
+
ms.date: 12/19/2025
7
7
ms.custom: engagement-fy23
8
8
---
9
9
@@ -64,6 +64,21 @@ When a customer has a deployed Azure VMware Solution private cloud, they can sca
64
64
> [!NOTE]
65
65
> All traffic from an AV64 host towards a customer network will utilize the IP address of the VMKernel Network Interface 1.
66
66
67
+
### Enhanced vMotion Compatibility (EVC) with AV64 extension
68
+
Adding AV64 nodes to an Azure VMware Solution private cloud creates a heterogeneous environment, which results in [Enhanced vMotion Compatibility](https://knowledge.broadcom.com/external/article/313545/vmware-evc-and-cpu-compatibility-faq.html) (EVC) issues between AV64 clusters and base SKU clusters using AV36, AV36P, or AV52 SKUs. AV64 clusters use the Icelake EVC mode due to their Intel Icelake CPUs, whereas AV36, AV36P, and AV52 clusters, built on older Intel CPUs, do not have explicit EVC mode enabled. Details on CPU generations for each SKU are provided above.
69
+
70
+
The heterogeneity of EVC modes across clusters presents challenges for live vMotion operations, as defined by Broadcom, based on the specific scenario and direction of migration. The following section provides a summary of the user experience when performing live vMotion between AV64 and the base clusters.
71
+
72
+
- vMotion to AV64 cluster from Base SKU cluster – this works fine as virtual machine is vMotioned from lower EVC mode cluster to higher EVC mode cluster.
73
+
74
+
- vMotion to base SKU cluster from AV64 cluster – two scenarios
75
+
76
+
- If virtual machine was previously moved from base cluster and not power cycled, then the live vMotion succeeds.
77
+
78
+
- If virtual machine was created on AV64 cluster or power cycled, even though it was previously vMotioned from the base SKU cluster, live vMotion will fail with EVC compatibility error.
79
+
80
+
Customers can avoid live vMotion problems between base SKU and AV64 clusters by setting the VM-level EVC mode to match a lower base cluster EVC, or by powering off the virtual machine and doing a cold vMotion.
81
+
67
82
### AV64 Cluster vSAN fault domain (FD) design and recommendations
68
83
69
84
The traditional Azure VMware Solution host clusters don't have explicit vSAN FD configuration. The reasoning is the host allocation logic ensures, within clusters, that no two hosts reside in the same physical fault domain within an Azure region. This feature inherently brings resilience and high availability for storage, which the vSAN FD configuration is supposed to bring. More information on vSAN FD can be found in the [VMware documentation](https://techdocs.broadcom.com/us/en/vmware-cis/vsan/vsan/8-0/vsan-administration/expanding-and-managing-a-vsan-cluster/managing-fault-domains-in-vsan-clusters.html).
0 commit comments