You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/breaking-changes/trusted-service-connectivity-retirement-march-2026.md
+16-10Lines changed: 16 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Azure API Management is retiring trusted service connectivity by th
4
4
#customer intent: As an Azure admin, I want to determine if my API Management service is affected by the trusted service connectivity retirement so that I can plan necessary changes.
5
5
author: dlepow
6
6
ms.author: danlep
7
-
ms.date: 12/18/2025
7
+
ms.date: 01/15/2026
8
8
ms.topic: reference
9
9
ms.service: azure-api-management
10
10
ai-usage: ai-assisted
@@ -17,16 +17,11 @@ ai-usage: ai-assisted
17
17
18
18
Effective 15 March 2026, Azure API Management is retiring trusted service connectivity by the API Management gateway to supported Azure services - Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, and Container Registry. If your API Management gateway relies on this feature to communicate with these services after 15 March 2026, the communication will fail. Use alternative networking options to securely connect to those services.
19
19
20
-
The gateway in API Management services created on or after 1 December 2025 no longer supports trusted service connectivity. Contact Azure support if you need to enable trusted service connectivity in those services until the retirement date.
20
+
The gateway in API Management services created on or after 1 December 2025 no longer supports trusted service connectivity. Contact Azure support if you need to enable trusted service connectivity in those services until the retirement date.
21
21
22
22
## Is my service affected by this change?
23
23
24
-
Trusted service connectivity retirement affects scenarios where the API Management gateway needs to communicate with Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, or Container Registry services when they're configured as backends or accessed through policies such as `send-request`.
25
-
26
-
> [!IMPORTANT]
27
-
> Trusted service connectivity remains supported for API Management control plane operations. The following scenarios continue to work without changes when using trusted service connectivity:
28
-
> - Accessing Azure Storage for backup and restore
29
-
> - Accessing Azure Key Vault for managing named values, backend credentials, or custom hostname certificates
24
+
The retirement of trusted service connectivity affects scenarios where the API Management gateway depends on this feature and managed identity to communicate with Azure services — such as Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, or Container Registry. This applies when these services are configured as backends or accessed through policies like `send-request` or `send-one-way-request`.
30
25
31
26
First, check for an Azure Advisor recommendation:
32
27
@@ -40,11 +35,22 @@ First, check for an Azure Advisor recommendation:
40
35
41
36
1. Determine if your API Management gateway relies on trusted service connectivity to Azure services.
42
37
1. If it does, update the networking configuration to eliminate the dependency on trusted service connectivity. If it doesn’t, proceed to the next step.
43
-
1. Disable trusted service connectivity in your API Management gateway.
38
+
1. Disable trusted service connectivity in your API Management gateway.
39
+
40
+
#### Scenarios that are not affected by the breaking change
41
+
42
+
All scenarios involving control plane operations that use trusted service connectivity remain supported and aren't affected by the breaking change, including accessing:
43
+
44
+
- Azure Key Vault for **named values**, **client certificates**, and **custom hostname certificates**
45
+
- Azure Storage for **backup and restore**
46
+
47
+
If your API Management service has an established networking line of sight to the key vault used for named values and client certificates, you can but don't have to remove trusted connectivity configuration on the key vault.
48
+
49
+
For backup and restore and custom hostname certificates, you need to ensure the target key vault or storage account is publicly accessible or you need to preserve its trusted connectivity setting to allow traffic from API Management resources, even if your API Management service has a networking line of sight established with it.
44
50
45
51
### Step 1: Does my API Management gateway rely on trusted service connectivity?
46
52
47
-
Your API Management gateway should no longer rely on trusted service connectivity to Azure services. Instead, it should establish a networking line of sight.
53
+
Your API Management gateway should no longer rely on trusted service connectivity to Azure services. Instead, it should establish a networking line of sight.
48
54
49
55
To verify if your API Management gateway relies on trusted connectivity to Azure services, check the networking configuration of all Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, and Container Registry resources that your API Management gateway connects to:
Copy file name to clipboardExpand all lines: articles/bastion/bastion-faq.md
+8-52Lines changed: 8 additions & 52 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about frequently asked questions for Azure Bastion.
4
4
author: abell
5
5
ms.service: azure-bastion
6
6
ms.topic: faq
7
-
ms.date: 03/03/2025
7
+
ms.date: 12/10/2025
8
8
ms.author: abell
9
9
ms.custom: references_regions
10
10
# Customer intent: "As a cloud administrator, I want to understand the deployment and connectivity requirements for Azure Bastion, so that I can effectively manage and secure remote access to our virtual machines."
@@ -59,18 +59,10 @@ You can use a private DNS zone ending with one of the names in the previous list
59
59
60
60
Azure Bastion isn't supported with Azure Private DNS Zones in national clouds.
61
61
62
-
### My privatelink.azure.com can't resolve to management.privatelink.azure.com
63
-
64
-
This might be due to the private DNS zone for privatelink.azure.com linked to the Bastion virtual network causing management.azure.com CNAMEs to resolve to management.privatelink.azure.com behind the scenes. Create a CNAME record in their privatelink.azure.com zone for management.privatelink.azure.com to arm-frontdoor-prod.trafficmanager.net to enable successful DNS resolution.
65
-
66
62
### <aname="dns"></a>Does Azure Bastion support Private Link?
67
63
68
64
No, Azure Bastion doesn't currently support Azure Private Link.
69
65
70
-
### Why do I get a "Failed to add subnet" error when using "Deploy Bastion" in the portal?
71
-
72
-
At this time, for most address spaces, you must add a subnet named **AzureBastionSubnet** to your virtual network before you select **Deploy Bastion**.
73
-
74
66
### <aname="write-permissions"></a>Are special permissions required to deploy Bastion to the AzureBastionSubnet?
75
67
76
68
To deploy Bastion to the AzureBastionSubnet, the following RBAC permissions are required: **Microsoft.Network/virtualNetworks/write**,**Microsoft.Network/virtualNetworks/subnets/join/action**, and **Microsoft.Network/publicIPAddresses**.
@@ -105,13 +97,9 @@ No. Downgrading a SKU isn't supported. For more information about SKUs, see the
105
97
106
98
No, Bastion connectivity to Azure Virtual Desktop isn't supported.
107
99
108
-
### <aname="udr"></a>How do I handle deployment failures?
109
-
110
-
Review any error messages and [raise a support request in the Azure portal](/azure/azure-portal/supportability/how-to-create-azure-support-request) as needed. Deployment failures can result from [Azure subscription limits, quotas, and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md). Specifically, customers might encounter a limit on the number of public IP addresses allowed per subscription that causes the Azure Bastion deployment to fail.
100
+
### <aname="move-virtual-network"></a>Does Bastion support moving a virtual network to another resource group?
111
101
112
-
### <aname="move-virtual-network"></a>Does Bastion support moving a VNet to another resource group?
113
-
114
-
No. If you move your virtual network to another resource group (even if it's in the same subscription), you'll need to first delete Bastion from virtual network, and then proceed to move the virtual network to the new resource group. Once the virtual network is in the new resource group, you can deploy Bastion to the virtual network.
102
+
No. If you move your virtual network to another resource group (even if it's in the same subscription), you need to first delete Bastion from virtual network, and then proceed to move the virtual network to the new resource group. Once the virtual network is in the new resource group, you can deploy Bastion to the virtual network.
115
103
116
104
117
105
@@ -134,11 +122,7 @@ In order to make a connection, the following roles are required:
134
122
* Reader role on the Azure Bastion resource.
135
123
* Reader role on the virtual network of the target virtual machine (if the Bastion deployment is in a peered virtual network).
136
124
137
-
Additionally, the user must have the rights (if required) to connect to the VM. For example, if the user is connecting to a Windows VM via RDP and isn't a member of the local Administrators group, they must be a member of the Remote Desktop Users group.
138
-
139
-
### <aname="session"></a>Why do I get "Your session has expired" error message before the Bastion session starts?
140
-
141
-
If you go to the URL directly from another browser session or tab, this error is expected. It helps ensure that your session is more secure and that the session can be accessed only through the Azure portal. Sign in to the Azure portal and begin your session again.
125
+
Additionally, the user must have the rights (if necessary) to connect to the VM. For example, if the user is connecting to a Windows VM via RDP and isn't a member of the local Administrators group, they must be a member of the Remote Desktop Users group.
142
126
143
127
### <aname="publicip"></a>Do I need a public IP on my virtual machine to connect via Azure Bastion?
144
128
@@ -164,10 +148,6 @@ No. You don't need to install an agent or any software on your browser or your A
164
148
165
149
See [About VM connections and features](vm-about.md) for supported features.
166
150
167
-
### <aname="shareable-links-passwords"></a>Is Reset Password available for local users connecting via shareable link?
168
-
169
-
No. Some organizations have company policies that require a password reset when a user logs into a local account for the first time. When using shareable links, the user can't change the password, even though a "Reset Password" button might appear.
170
-
171
151
### <aname="audio"></a>Is remote audio available for VMs?
172
152
173
153
Yes. See [About VM connections and features](vm-about.md#audio).
@@ -178,7 +158,7 @@ Azure Bastion offers support for file transfer between your target VM and local
178
158
179
159
### <aname="aadj"></a>Does Bastion work with Entra ID extension-joined VMs?
180
160
181
-
Bastion does work with Entra ID extension-joined VMs for Microsoft Entra users with RDP and SSH on the native client, and SSH only on the portal. Entra ID for RDP on the portal is not yet supported. For more information, see [Sign in to a Windows virtual machine in Azure by using Microsoft Entra ID](../active-directory/devices/howto-vm-sign-in-azure-ad-windows.md#requirements).
161
+
Bastion does work with Entra ID extension-joined VMs for Microsoft Entra users with RDP and SSH on the native client, and SSH only on the portal. Entra ID for RDP on the portal isn't yet supported. For more information, see [Sign in to a Windows virtual machine in Azure by using Microsoft Entra ID](../active-directory/devices/howto-vm-sign-in-azure-ad-windows.md#requirements).
182
162
183
163
### <aname="rdscal-compatibility"></a>Is Bastion compatible with VMs set up as RDS session hosts?
184
164
@@ -226,44 +206,20 @@ Azure Bastion currently doesn't support timezone redirection and isn't timezone
226
206
227
207
### <aname="disconnect"></a>Will an existing session disconnect during maintenance on the Bastion host?
228
208
229
-
Yes, existing sessions on the target Bastion resource will disconnect during maintenance on the Bastion resource.
230
-
231
-
### I'm connecting to a VM using a JIT policy, do I need additional permissions?
232
-
233
-
If user is connecting to a VM using a JIT policy, there are no additional permissions needed. For more information on connecting to a VM using a JIT policy, see [Enable just-in-time access on VMs](/azure/defender-for-cloud/just-in-time-access-usage).
209
+
Yes, existing sessions disconnect during maintenance on the Bastion resource.
### Can I still deploy multiple Bastion hosts across peered virtual networks?
238
214
239
215
Yes. By default, a user sees the Bastion host that is deployed in the same virtual network in which VM resides. However, in the **Connect** menu, a user can see multiple Bastion hosts detected across peered networks. They can select the Bastion host that they prefer to use to connect to the VM deployed in the virtual network.
240
216
241
217
### If my peered VNets are deployed in different subscriptions, will connectivity via Bastion work?
242
218
243
-
Yes, connectivity via Bastion will continue to work for peered virtual networks across different subscription for a single Tenant. Subscriptions across two different Tenants aren't supported. To see Bastion in the **Connect** drop down menu, the user must select the subs they have access to in **Subscription > global subscription**.
219
+
Yes, connectivity via Bastion continues to work for peered virtual networks across different subscription for a single Tenant. Subscriptions across two different Tenants aren't supported. To see Bastion in the **Connect** drop down menu, the user must select the subs they have access to in **Subscription > global subscription**.
### I have access to the peered VNet, but I can't see the VM deployed there.
248
-
249
-
Make sure the user has **read** access to both the VM, and the peered virtual network. Additionally, check under IAM that the user has **read** access to following resources:
250
-
251
-
* Reader role on the virtual machine.
252
-
* Reader role on the NIC with private IP of the virtual machine.
253
-
* Reader role on the Azure Bastion resource.
254
-
* Reader role on the virtual network (Not needed if there isn't a peered virtual network).
255
-
256
-
|Permissions|Description|Permission type|
257
-
|---|---| ---|
258
-
|Microsoft.Network/bastionHosts/read |Gets a Bastion Host|Action|
259
-
|Microsoft.Network/virtualNetworks/BastionHosts/action |Gets Bastion Host references in a virtual network.|Action|
260
-
|Microsoft.Network/virtualNetworks/bastionHosts/default/action|Gets Bastion Host references in a virtual network.|Action|
261
-
|Microsoft.Network/networkInterfaces/read|Gets a network interface definition.|Action|
262
-
|Microsoft.Network/networkInterfaces/ipconfigurations/read|Gets a network interface IP configuration definition.|Action|
263
-
|Microsoft.Network/virtualNetworks/read|Get the virtual network definition|Action|
264
-
|Microsoft.Network/virtualNetworks/subnets/virtualMachines/read|Gets references to all the virtual machines in a virtual network subnet|Action|
265
-
|Microsoft.Network/virtualNetworks/virtualMachines/read|Gets references to all the virtual machines in a virtual network|Action|
266
-
267
223
## Next steps
268
224
269
225
For more information, see [What is Azure Bastion](bastion-overview.md).
0 commit comments