Skip to content

Commit f6915c9

Browse files
authored
Refactor security caution and notes on managed identities
Removed redundant security caution regarding managed identities and streamlined the note on managed identity specifics.
1 parent 3433833 commit f6915c9

1 file changed

Lines changed: 6 additions & 6 deletions

File tree

articles/api-management/api-management-howto-use-managed-service-identity.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -26,12 +26,6 @@ You can grant two types of identities to an API Management instance:
2626
- A *system-assigned identity* is tied to your service and is deleted if your service is deleted. The service can have only one system-assigned identity.
2727
- A *user-assigned identity* is a standalone Azure resource that you can assign to your service. The service can have multiple user-assigned identities.
2828

29-
> [!CAUTION]
30-
> **Security consideration:** Users with permissions to edit API Management policies (for example, users assigned the [API Management Service Contributor](/azure/role-based-access-control/built-in-roles#api-management-service-contributor) role) can use the [`authentication-managed-identity`](authentication-managed-identity-policy.md) policy to authenticate as the service's managed identity. When you assign roles or permissions to the API Management resouce, be aware that any user who can edit policies may be able to access those same resources through the managed identity. To mitigate risk:
31-
> - Follow the [principle of least privilege](/entra/identity-platform/secure-least-privileged-access) when assigning roles to managed identities.
32-
> - Only grant the API Management Contributor role or policy editing permissions to trusted users.
33-
> - Regularly review and audit managed identity role assignments and who has access to edit API Management policies.
34-
3529
> [!NOTE]
3630
> - Managed identities are specific to the Microsoft Entra tenant in which your Azure subscription is hosted. They don't get updated if you move a subscription to a different directory. If you move a subscription, you need to recreate and reconfigure the identities.
3731
> - API Management managed identities are also specific to the Azure subscription in which the service is hosted. If you move the service to a different subscription in the same tenant, you need to recreate and reconfigure the identities.
@@ -321,6 +315,12 @@ You can use a system-assigned managed identity to access Key Vault to store and
321315

322316
Use the system-assigned identity to authenticate to a backend service via the [authentication-managed-identity](authentication-managed-identity-policy.md) policy.
323317

318+
> [!CAUTION]
319+
> **Security consideration:** Users with permissions to edit API Management policies (for example, users assigned the [API Management Service Contributor](/azure/role-based-access-control/built-in-roles#api-management-service-contributor) role) can use the [`authentication-managed-identity`](authentication-managed-identity-policy.md) policy to authenticate as the service's managed identity. When you assign roles or permissions to the API Management resouce, be aware that any user who can edit policies may be able to access those same resources through the managed identity. To mitigate risk:
320+
> - Follow the [principle of least privilege](/entra/identity-platform/secure-least-privileged-access) when assigning roles to managed identities.
321+
> - Only grant the API Management Contributor role or policy editing permissions to trusted users.
322+
> - Regularly review and audit managed identity role assignments and who has access to edit API Management policies.
323+
324324
### Connect to Azure resources behind an IP firewall by using a system-assigned managed identity
325325

326326
API Management is a trusted Microsoft service to the following resources. This trusted status enables the service to connect to the following resources behind a firewall when the firewall enables the **Allow Trusted Microsoft Services to bypass this firewall** setting. After you explicitly assign the appropriate Azure role to the [system-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) for a resource instance, the scope of access for the instance corresponds to the Azure role that's assigned to the managed identity.

0 commit comments

Comments
 (0)