Skip to content

Commit ea2d8ba

Browse files
Merge pull request #310690 from MicrosoftDocs/main
Auto Publish – main to live - 2026-01-20 23:00 UTC
2 parents 5485c26 + 095f9a2 commit ea2d8ba

36 files changed

Lines changed: 518 additions & 259 deletions

articles/api-management/breaking-changes/trusted-service-connectivity-retirement-march-2026.md

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Azure API Management is retiring trusted service connectivity by th
44
#customer intent: As an Azure admin, I want to determine if my API Management service is affected by the trusted service connectivity retirement so that I can plan necessary changes.
55
author: dlepow
66
ms.author: danlep
7-
ms.date: 12/18/2025
7+
ms.date: 01/15/2026
88
ms.topic: reference
99
ms.service: azure-api-management
1010
ai-usage: ai-assisted
@@ -17,16 +17,11 @@ ai-usage: ai-assisted
1717

1818
Effective 15 March 2026, Azure API Management is retiring trusted service connectivity by the API Management gateway to supported Azure services - Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, and Container Registry. If your API Management gateway relies on this feature to communicate with these services after 15 March 2026, the communication will fail. Use alternative networking options to securely connect to those services.
1919

20-
The gateway in API Management services created on or after 1 December 2025 no longer supports trusted service connectivity. Contact Azure support if you need to enable trusted service connectivity in those services until the retirement date.
20+
The gateway in API Management services created on or after 1 December 2025 no longer supports trusted service connectivity. Contact Azure support if you need to enable trusted service connectivity in those services until the retirement date.
2121

2222
## Is my service affected by this change?
2323

24-
Trusted service connectivity retirement affects scenarios where the API Management gateway needs to communicate with Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, or Container Registry services when they're configured as backends or accessed through policies such as `send-request`.
25-
26-
> [!IMPORTANT]
27-
> Trusted service connectivity remains supported for API Management control plane operations. The following scenarios continue to work without changes when using trusted service connectivity:
28-
> - Accessing Azure Storage for backup and restore
29-
> - Accessing Azure Key Vault for managing named values, backend credentials, or custom hostname certificates
24+
The retirement of trusted service connectivity affects scenarios where the API Management gateway depends on this feature and managed identity to communicate with Azure services — such as Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, or Container Registry. This applies when these services are configured as backends or accessed through policies like `send-request` or `send-one-way-request`.
3025

3126
First, check for an Azure Advisor recommendation:
3227

@@ -40,11 +35,22 @@ First, check for an Azure Advisor recommendation:
4035

4136
1. Determine if your API Management gateway relies on trusted service connectivity to Azure services.
4237
1. If it does, update the networking configuration to eliminate the dependency on trusted service connectivity. If it doesn’t, proceed to the next step.
43-
1. Disable trusted service connectivity in your API Management gateway.
38+
1. Disable trusted service connectivity in your API Management gateway.
39+
40+
#### Scenarios that are not affected by the breaking change
41+
42+
All scenarios involving control plane operations that use trusted service connectivity remain supported and aren't affected by the breaking change, including accessing:
43+
44+
- Azure Key Vault for **named values**, **client certificates**, and **custom hostname certificates**
45+
- Azure Storage for **backup and restore**
46+
47+
If your API Management service has an established networking line of sight to the key vault used for named values and client certificates, you can but don't have to remove trusted connectivity configuration on the key vault.
48+
49+
For backup and restore and custom hostname certificates, you need to ensure the target key vault or storage account is publicly accessible or you need to preserve its trusted connectivity setting to allow traffic from API Management resources, even if your API Management service has a networking line of sight established with it.
4450

4551
### Step 1: Does my API Management gateway rely on trusted service connectivity?
4652

47-
Your API Management gateway should no longer rely on trusted service connectivity to Azure services. Instead, it should establish a networking line of sight.
53+
Your API Management gateway should no longer rely on trusted service connectivity to Azure services. Instead, it should establish a networking line of sight.
4854

4955
To verify if your API Management gateway relies on trusted connectivity to Azure services, check the networking configuration of all Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, and Container Registry resources that your API Management gateway connects to:
5056

articles/azure-functions/functions-bindings-cosmosdb-v2-input.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1323,8 +1323,6 @@ app = func.FunctionApp()
13231323
def test_function(msg: func.QueueMessage,
13241324
inputDocument: func.DocumentList,
13251325
outputDocument: func.Out[func.Document]):
1326-
document = documents[id]
1327-
document["text"] = "This was updated!"
13281326
doc = inputDocument[0]
13291327
doc["text"] = "This was updated!"
13301328
outputDocument.set(doc)

articles/bastion/bastion-faq.md

Lines changed: 8 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about frequently asked questions for Azure Bastion.
44
author: abell
55
ms.service: azure-bastion
66
ms.topic: faq
7-
ms.date: 03/03/2025
7+
ms.date: 12/10/2025
88
ms.author: abell
99
ms.custom: references_regions
1010
# Customer intent: "As a cloud administrator, I want to understand the deployment and connectivity requirements for Azure Bastion, so that I can effectively manage and secure remote access to our virtual machines."
@@ -59,18 +59,10 @@ You can use a private DNS zone ending with one of the names in the previous list
5959

6060
Azure Bastion isn't supported with Azure Private DNS Zones in national clouds.
6161

62-
### My privatelink.azure.com can't resolve to management.privatelink.azure.com
63-
64-
This might be due to the private DNS zone for privatelink.azure.com linked to the Bastion virtual network causing management.azure.com CNAMEs to resolve to management.privatelink.azure.com behind the scenes. Create a CNAME record in their privatelink.azure.com zone for management.privatelink.azure.com to arm-frontdoor-prod.trafficmanager.net to enable successful DNS resolution.
65-
6662
### <a name="dns"></a>Does Azure Bastion support Private Link?
6763

6864
No, Azure Bastion doesn't currently support Azure Private Link.
6965

70-
### Why do I get a "Failed to add subnet" error when using "Deploy Bastion" in the portal?
71-
72-
At this time, for most address spaces, you must add a subnet named **AzureBastionSubnet** to your virtual network before you select **Deploy Bastion**.
73-
7466
### <a name="write-permissions"></a>Are special permissions required to deploy Bastion to the AzureBastionSubnet?
7567

7668
To deploy Bastion to the AzureBastionSubnet, the following RBAC permissions are required: **Microsoft.Network/virtualNetworks/write**,**Microsoft.Network/virtualNetworks/subnets/join/action**, and **Microsoft.Network/publicIPAddresses**.
@@ -105,13 +97,9 @@ No. Downgrading a SKU isn't supported. For more information about SKUs, see the
10597

10698
No, Bastion connectivity to Azure Virtual Desktop isn't supported.
10799

108-
### <a name="udr"></a>How do I handle deployment failures?
109-
110-
Review any error messages and [raise a support request in the Azure portal](/azure/azure-portal/supportability/how-to-create-azure-support-request) as needed. Deployment failures can result from [Azure subscription limits, quotas, and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md). Specifically, customers might encounter a limit on the number of public IP addresses allowed per subscription that causes the Azure Bastion deployment to fail.
100+
### <a name="move-virtual-network"></a>Does Bastion support moving a virtual network to another resource group?
111101

112-
### <a name="move-virtual-network"></a>Does Bastion support moving a VNet to another resource group?
113-
114-
No. If you move your virtual network to another resource group (even if it's in the same subscription), you'll need to first delete Bastion from virtual network, and then proceed to move the virtual network to the new resource group. Once the virtual network is in the new resource group, you can deploy Bastion to the virtual network.
102+
No. If you move your virtual network to another resource group (even if it's in the same subscription), you need to first delete Bastion from virtual network, and then proceed to move the virtual network to the new resource group. Once the virtual network is in the new resource group, you can deploy Bastion to the virtual network.
115103

116104

117105

@@ -134,11 +122,7 @@ In order to make a connection, the following roles are required:
134122
* Reader role on the Azure Bastion resource.
135123
* Reader role on the virtual network of the target virtual machine (if the Bastion deployment is in a peered virtual network).
136124

137-
Additionally, the user must have the rights (if required) to connect to the VM. For example, if the user is connecting to a Windows VM via RDP and isn't a member of the local Administrators group, they must be a member of the Remote Desktop Users group.
138-
139-
### <a name="session"></a>Why do I get "Your session has expired" error message before the Bastion session starts?
140-
141-
If you go to the URL directly from another browser session or tab, this error is expected. It helps ensure that your session is more secure and that the session can be accessed only through the Azure portal. Sign in to the Azure portal and begin your session again.
125+
Additionally, the user must have the rights (if necessary) to connect to the VM. For example, if the user is connecting to a Windows VM via RDP and isn't a member of the local Administrators group, they must be a member of the Remote Desktop Users group.
142126

143127
### <a name="publicip"></a>Do I need a public IP on my virtual machine to connect via Azure Bastion?
144128

@@ -164,10 +148,6 @@ No. You don't need to install an agent or any software on your browser or your A
164148

165149
See [About VM connections and features](vm-about.md) for supported features.
166150

167-
### <a name="shareable-links-passwords"></a>Is Reset Password available for local users connecting via shareable link?
168-
169-
No. Some organizations have company policies that require a password reset when a user logs into a local account for the first time. When using shareable links, the user can't change the password, even though a "Reset Password" button might appear.
170-
171151
### <a name="audio"></a>Is remote audio available for VMs?
172152

173153
Yes. See [About VM connections and features](vm-about.md#audio).
@@ -178,7 +158,7 @@ Azure Bastion offers support for file transfer between your target VM and local
178158

179159
### <a name="aadj"></a>Does Bastion work with Entra ID extension-joined VMs?
180160

181-
Bastion does work with Entra ID extension-joined VMs for Microsoft Entra users with RDP and SSH on the native client, and SSH only on the portal. Entra ID for RDP on the portal is not yet supported. For more information, see [Sign in to a Windows virtual machine in Azure by using Microsoft Entra ID](../active-directory/devices/howto-vm-sign-in-azure-ad-windows.md#requirements).
161+
Bastion does work with Entra ID extension-joined VMs for Microsoft Entra users with RDP and SSH on the native client, and SSH only on the portal. Entra ID for RDP on the portal isn't yet supported. For more information, see [Sign in to a Windows virtual machine in Azure by using Microsoft Entra ID](../active-directory/devices/howto-vm-sign-in-azure-ad-windows.md#requirements).
182162

183163
### <a name="rdscal-compatibility"></a>Is Bastion compatible with VMs set up as RDS session hosts?
184164

@@ -226,44 +206,20 @@ Azure Bastion currently doesn't support timezone redirection and isn't timezone
226206

227207
### <a name="disconnect"></a>Will an existing session disconnect during maintenance on the Bastion host?
228208

229-
Yes, existing sessions on the target Bastion resource will disconnect during maintenance on the Bastion resource.
230-
231-
### I'm connecting to a VM using a JIT policy, do I need additional permissions?
232-
233-
If user is connecting to a VM using a JIT policy, there are no additional permissions needed. For more information on connecting to a VM using a JIT policy, see [Enable just-in-time access on VMs](/azure/defender-for-cloud/just-in-time-access-usage).
209+
Yes, existing sessions disconnect during maintenance on the Bastion resource.
234210

235-
## <a name="peering"></a>VNet peering FAQs
211+
## <a name="peering"></a>Virtual network peering FAQs
236212

237213
### Can I still deploy multiple Bastion hosts across peered virtual networks?
238214

239215
Yes. By default, a user sees the Bastion host that is deployed in the same virtual network in which VM resides. However, in the **Connect** menu, a user can see multiple Bastion hosts detected across peered networks. They can select the Bastion host that they prefer to use to connect to the VM deployed in the virtual network.
240216

241217
### If my peered VNets are deployed in different subscriptions, will connectivity via Bastion work?
242218

243-
Yes, connectivity via Bastion will continue to work for peered virtual networks across different subscription for a single Tenant. Subscriptions across two different Tenants aren't supported. To see Bastion in the **Connect** drop down menu, the user must select the subs they have access to in **Subscription > global subscription**.
219+
Yes, connectivity via Bastion continues to work for peered virtual networks across different subscription for a single Tenant. Subscriptions across two different Tenants aren't supported. To see Bastion in the **Connect** drop down menu, the user must select the subs they have access to in **Subscription > global subscription**.
244220

245221
:::image type="content" source="./media/bastion-faq/global-subscriptions.png" alt-text="Global subscriptions filter." lightbox="./media/bastion-faq/global-subscriptions.png":::
246222

247-
### I have access to the peered VNet, but I can't see the VM deployed there.
248-
249-
Make sure the user has **read** access to both the VM, and the peered virtual network. Additionally, check under IAM that the user has **read** access to following resources:
250-
251-
* Reader role on the virtual machine.
252-
* Reader role on the NIC with private IP of the virtual machine.
253-
* Reader role on the Azure Bastion resource.
254-
* Reader role on the virtual network (Not needed if there isn't a peered virtual network).
255-
256-
|Permissions|Description|Permission type|
257-
|---|---| ---|
258-
|Microsoft.Network/bastionHosts/read |Gets a Bastion Host|Action|
259-
|Microsoft.Network/virtualNetworks/BastionHosts/action |Gets Bastion Host references in a virtual network.|Action|
260-
|Microsoft.Network/virtualNetworks/bastionHosts/default/action|Gets Bastion Host references in a virtual network.|Action|
261-
|Microsoft.Network/networkInterfaces/read|Gets a network interface definition.|Action|
262-
|Microsoft.Network/networkInterfaces/ipconfigurations/read|Gets a network interface IP configuration definition.|Action|
263-
|Microsoft.Network/virtualNetworks/read|Get the virtual network definition|Action|
264-
|Microsoft.Network/virtualNetworks/subnets/virtualMachines/read|Gets references to all the virtual machines in a virtual network subnet|Action|
265-
|Microsoft.Network/virtualNetworks/virtualMachines/read|Gets references to all the virtual machines in a virtual network|Action|
266-
267223
## Next steps
268224

269225
For more information, see [What is Azure Bastion](bastion-overview.md).

0 commit comments

Comments
 (0)