Skip to content

Commit f79d6a3

Browse files
nimakamoosiCopilot
andcommitted
[APIM] Add security note about managed identity policy and Contributor role
Add IMPORTANT admonitions to the managed identity how-to guide and the authentication-managed-identity policy reference page. The notes clarify that users with API Management policy editing permissions (e.g., the API Management Service Contributor role) can use the managed identity policy to authenticate as the service's managed identity, and recommend following the principle of least privilege for both managed identity role assignments and policy editing access. Co-authored-by: Copilot <[email protected]>
1 parent 4bcd54d commit f79d6a3

2 files changed

Lines changed: 9 additions & 0 deletions

File tree

articles/api-management/api-management-howto-use-managed-service-identity.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,12 @@ You can grant two types of identities to an API Management instance:
2626
- A *system-assigned identity* is tied to your service and is deleted if your service is deleted. The service can have only one system-assigned identity.
2727
- A *user-assigned identity* is a standalone Azure resource that you can assign to your service. The service can have multiple user-assigned identities.
2828

29+
> [!IMPORTANT]
30+
> **Security consideration:** Users with permissions to edit API Management policies (for example, users assigned the [API Management Service Contributor](/azure/role-based-access-control/built-in-roles#api-management-service-contributor) role) can use the [`authentication-managed-identity`](authentication-managed-identity-policy.md) policy to authenticate as the service's managed identity. When you assign roles or permissions to the managed identity, be aware that any user who can edit policies may be able to access those same resources through the managed identity. To mitigate risk:
31+
> - Follow the [principle of least privilege](/entra/identity-platform/secure-least-privileged-access) when assigning roles to managed identities.
32+
> - Only grant the API Management Contributor role or policy editing permissions to trusted users.
33+
> - Regularly review and audit managed identity role assignments and who has access to edit API Management policies.
34+
2935
> [!NOTE]
3036
> - Managed identities are specific to the Microsoft Entra tenant in which your Azure subscription is hosted. They don't get updated if you move a subscription to a different directory. If you move a subscription, you need to recreate and reconfigure the identities.
3137
> - API Management managed identities are also specific to the Azure subscription in which the service is hosted. If you move the service to a different subscription in the same tenant, you need to recreate and reconfigure the identities.

articles/api-management/authentication-managed-identity-policy.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,9 @@ Both system-assigned identity and any of the multiple user-assigned identities c
2020

2121
[!INCLUDE [api-management-policy-generic-alert](../../includes/api-management-policy-generic-alert.md)]
2222

23+
> [!IMPORTANT]
24+
> **Security consideration:** Any user with permissions to edit API Management policies (for example, users assigned the [API Management Service Contributor](/azure/role-based-access-control/built-in-roles#api-management-service-contributor) role) can use this policy to authenticate as the service's managed identity. This effectively grants that user access to any resource for which the managed identity has permissions. Ensure that you follow the [principle of least privilege](/entra/identity-platform/secure-least-privileged-access) both when assigning permissions to the managed identity and when granting users the ability to edit API Management policies. For more information, see [How to use managed identities in Azure API Management](api-management-howto-use-managed-service-identity.md).
25+
2326

2427
## Policy statement
2528

0 commit comments

Comments
 (0)