You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-aad.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ description: Learn how to enable user sign-in to the API Management developer po
6
6
author: dlepow
7
7
ms.service: azure-api-management
8
8
ms.topic: how-to
9
-
ms.date: 12/08/2025
9
+
ms.date: 12/12/2025
10
10
ms.author: danlep
11
11
ms.custom:
12
12
- engagement-fy23
@@ -70,10 +70,13 @@ For steps, see [Switch redirect URIs to the single-page application type](../act
70
70
71
71
## Configure access by users in more than one Microsoft Entra tenant
72
72
73
+
> [!NOTE]
74
+
> Support for access to the developer portal by users from multiple Microsoft Entra ID tenants is currently available in the API Management Developer, Standard, and Premium tiers.
75
+
73
76
You can enable access to the developer portal by users from more than one Microsoft Entra ID tenant. To do this:
74
77
75
78
* Configure app registration for multiple tenants.
76
-
* Update the identity provider configuration for the developer portal to add another tenant.
79
+
* Update the Microsoft Entra ID identity provider configuration for the developer portal to add another tenant.
77
80
78
81
### Configure app registration for multiple tenants
79
82
@@ -82,7 +85,7 @@ The app registration you configure for the identity provider must support multip
82
85
* When creating the app registration, set **Supported account types** to **Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant)**.
83
86
* If you previously configured an app registration for a single tenant, update the **Supported account types** setting on the **Manage** > **Authentication** page of the app registration.
84
87
85
-
### Update identity provider configuration for multiple tenants
88
+
### Update Microsoft Entra ID identity provider configuration for multiple tenants
86
89
87
90
Update the identity provider configuration to add another tenant:
When you publish APIs through Azure API Management, it's easy and common to secure access to those APIs by using subscription keys. Client applications that need to consume the published APIs must include a valid subscription key in HTTP requests when they make calls to those APIs. To get a subscription key for accessing APIs, a subscription is required. For more information about subscriptions, see [Subscriptions in Azure API Management](api-management-subscriptions.md).
17
+
When you publish APIs through Azure API Management, you can secure access to those APIs by using subscription keys. Client applications that need to consume the published APIs must then include a valid subscription key in HTTP requests when they make calls to those APIs. To get a subscription key for accessing APIs, you need a subscription. For more information about subscriptions, see [Subscriptions in Azure API Management](api-management-subscriptions.md).
17
18
18
-
This article walks through the steps for creating subscriptions in the Azure portal.
19
+
This article walks you through the steps for creating subscriptions in the Azure portal.
19
20
20
21
> [!IMPORTANT]
21
-
> The **Allow tracing** setting in subscriptions to enable debug traces is deprecated. To improve security, tracing can now be enabled for specific API requests to API Management. To learn more, see [Enable tracing for an API](api-management-howto-api-inspector.md#enable-tracing-for-an-api).
22
+
> The **Allow tracing** setting in subscriptions to enable debug traces is deprecated. To improve security, you can now enable tracing for specific API requests to API Management. To learn more, see [Enable tracing for an API](api-management-howto-api-inspector.md#enable-tracing-for-an-api).
22
23
23
24
## Prerequisites
24
25
25
-
To take the steps in this article, the prerequisites are as follows:
26
+
To complete the steps in this article, you need the following prerequisites:
26
27
27
28
*[Create an API Management instance](get-started-create-service-instance.md).
28
29
* Understand [subscriptions in API Management](api-management-subscriptions.md).
29
30
30
31
## Create a new subscription
31
32
32
-
1. Navigate to your API Management instance in the [Azure portal](https://portal.azure.com).
33
+
> [!NOTE]
34
+
> API publishers (administrators or users with appropriate permissions to the API Management instance) create and manage subscriptions. API consumers typically request subscriptions through the developer portal or receive them directly from API publishers.
35
+
36
+
1. Go to your API Management instance in the [Azure portal](https://portal.azure.com).
33
37
1. Under **APIs** in the sidebar menu, select **Subscriptions**, then choose **Add subscription**.
34
-
1. Provide a **Name** and optional **Display name** for the subscription.
35
-
1. Select a **Scope** of the subscription from the dropdown list. To learn more, see [Scope of subscriptions](api-management-subscriptions.md#scope-of-subscriptions).
36
-
1. Optionally, choose if the subscription should be associated with a **User** and whether to send a notification for use with the developer portal.
38
+
1. Enter a **Name** and optional **Display name** for the subscription.
39
+
1. Select a **Scope** of the subscription from the dropdown list. For more information, see [Scope of subscriptions](api-management-subscriptions.md#scope-of-subscriptions).
40
+
1. Optionally, choose if the subscription should be associated with a **User**.
41
+
* If you don't associate the subscription with a specific user, it becomes a standalone subscription that can be shared among multiple developers or teams.
42
+
* You can't directly assign subscriptions to Microsoft Entra ID security groups. To provide access to group members, create a standalone subscription and distribute the keys, or use Microsoft Entra ID authentication with policies for group-based access control.
43
+
1. Optionally, choose whether to send a notification for use with the developer portal.
37
44
1. Select **Create**.
38
45
39
46
:::image type="content" source="media/api-management-howto-create-subscriptions/create-subscription.png" alt-text="Screenshot showing how to create an API Management subscription in the portal." lightbox="media/api-management-howto-create-subscriptions/create-subscription.png":::
@@ -45,3 +52,4 @@ After you create the subscription, it appears in the list on the **Subscriptions
45
52
*[Azure API Management terminology](api-management-terminology.md)
46
53
*[Tutorial: Import and publish your first API](import-and-publish.md)
47
54
*[Azure API Management FAQs](api-management-faq.yml)
55
+
*[Securely access products and APIs with Microsoft Entra applications](applications.md)
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-entra-external-id.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ ms.custom:
21
21
22
22
For an overview of options to secure access to the developer portal, see [Secure access to the API Management developer portal](secure-developer-portal-access.md).
23
23
24
-
Currently, API Management supports external identity providers in Microsoft Entra External ID when configured in your Microsoft Entra ID *workforce tenant*. For example, if you're enabling access to the developer portal by users in your workforce tenant, such as the Contoso organization, you might want to configure Google or Facebook as an external identity provider so that these external users can also sign in using their accounts. [Learn more about workforce and external tenant configurations in Microsoft External ID](/entra/external-id/tenant-configurations).
24
+
Currently, API Management supports external identity providers in Microsoft Entra External ID when configured in a Microsoft Entra ID *workforce tenant*. For example, if you're enabling access to the developer portal by users in your workforce tenant, such as the Contoso organization, you might want to configure Google or Facebook as an external identity provider so that these external users can also sign in using their accounts. [Learn more about workforce and external tenant configurations in Microsoft External ID](/entra/external-id/tenant-configurations).
0 commit comments