You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-add-products.md
+92-7Lines changed: 92 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,22 +1,23 @@
1
1
---
2
2
title: Tutorial - Create and publish a product in Azure API Management
3
3
description: In this tutorial, you create and publish a product in Azure API Management. Once it's published, developers can begin to use the product's APIs.
In Azure API Management, a [*product*](api-management-terminology.md#term-definitions) contains one or more APIs, a usage quota, and the terms of use. After a product is published, developers can [subscribe](api-management-subscriptions.md) to the product and begin to use the product's APIs.
19
18
19
+
:::zone pivot="interactive"
20
+
20
21
In this tutorial, you learn how to:
21
22
22
23
> [!div class="checklist"]
@@ -26,7 +27,6 @@ In this tutorial, you learn how to:
26
27
27
28
:::image type="content" source="media/api-management-howto-add-products/added-product-1.png" alt-text="API Management products in portal":::
28
29
29
-
30
30
## Prerequisites
31
31
32
32
+ Learn the [Azure API Management terminology](api-management-terminology.md).
@@ -207,3 +207,88 @@ Advance to the next tutorial:
207
207
208
208
> [!div class="nextstepaction"]
209
209
> [Create blank API and mock API responses](mock-api-responses.md)
210
+
211
+
:::zone-end
212
+
213
+
:::zone pivot="terraform"
214
+
215
+
In this article, you use Terraform to create an Azure API Management instance, an API, a product, a group, and associations between the product and the API, and the product and the group.
> * Specify the required version of Terraform and the required providers.
222
+
> * Define variables for the resource group name prefix, resource group location, and the content format and value for the API definition import.
223
+
> * Create a resource group with a randomized name.
224
+
> * Create an API Management service with a randomized name.
225
+
> * Create an API with a randomized name.
226
+
> * Create a product with a randomized name in the API Management service.
227
+
> * Create a group with a randomized name.
228
+
> * Associate the API with the product.
229
+
> * Associate the group with the product.
230
+
> * Output the randomized values such as the names of the resource group, API Management service, API, product, and group.
231
+
232
+
## Prerequisites
233
+
234
+
- Create an Azure account with an active subscription. You can [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
235
+
236
+
-[Install and configure Terraform.](/azure/developer/terraform/quickstart-configure)
237
+
238
+
## Implement the Terraform code
239
+
240
+
> [!NOTE]
241
+
> The sample code for this article is located in the [Azure Terraform GitHub repo](https://github.com/Azure/terraform/tree/master/quickstart/101-azure-api-management-create-with-api). You can view the log file containing the [test results from current and previous versions of Terraform](https://github.com/Azure/terraform/tree/master/quickstart/101-azure-api-management-create-with-api/TestRecord.md).
242
+
>
243
+
> See more [articles and sample code showing how to use Terraform to manage Azure resources](/azure/terraform).
244
+
245
+
1. Create a directory in which to test and run the sample Terraform code and make it the current directory.
246
+
247
+
1. Create a file named `main.tf`, and insert the following code:
# Custom configuration settings for App Service Environments
14
14
15
15
## Overview
16
+
16
17
Because App Service Environments are isolated to a single customer, there are certain configuration settings that can be applied exclusively to App Service Environments. This article documents the various specific customizations that are available for App Service Environments.
17
18
18
19
> [!NOTE]
19
20
> This article covers the features, benefits, and use cases of App Service Environment v3, which is used with App Service Isolated v2 plans.
20
-
>
21
+
>
21
22
22
23
If you do not have an App Service Environment, see [How to Create an App Service Environment v3](./creation.md).
23
24
@@ -48,6 +49,7 @@ The following abbreviated Resource Manager template snippet shows the **clusterS
48
49
The **clusterSettings** attribute can be included in a Resource Manager template to update the App Service Environment.
49
50
50
51
## Use Azure Resource Explorer to update an App Service Environment
52
+
51
53
Alternatively, you can update the App Service Environment by using [Azure Resource Explorer](https://resources.azure.com).
52
54
53
55
1. In Resource Explorer, go to the node for the App Service Environment (**subscriptions** > **{your Subscription}** > **resourceGroups** > **{your Resource Group}** > **providers** > **Microsoft.Web** > **hostingEnvironments**). Then click the specific App Service Environment that you want to update.
@@ -71,12 +73,12 @@ The App Service Environment operates as a black box system where you cannot see
71
73
}
72
74
],
73
75
```
74
-
Setting InternalEncryption to true encrypts internal network traffic in your App Service Environment between the front ends and workers, encrypts the pagefile and also encrypts the worker disks. After the InternalEncryption clusterSetting is enabled, there can be an impact to your system performance. When you make the change to enable InternalEncryption, your App Service Environment will be in an unstable state until the change is fully propagated. Complete propagation of the change can take a few hours to complete, depending on how many instances you have in your App Service Environment. We highly recommend that you do not enable InternalEncryption on an App Service Environment while it is in use. If you need to enable InternalEncryption on an actively used App Service Environment, we highly recommend that you divert traffic to a backup environment until the operation completes.
75
76
77
+
Setting InternalEncryption to true encrypts internal network traffic in your App Service Environment between the front ends and workers, encrypts the pagefile and also encrypts the worker disks. After the InternalEncryption clusterSetting is enabled, there can be an impact to your system performance. When you make the change to enable InternalEncryption, your App Service Environment will be in an unstable state until the change is fully propagated. Complete propagation of the change can take a few hours to complete, depending on how many instances you have in your App Service Environment. We highly recommend that you do not enable InternalEncryption on an App Service Environment while it is in use. If you need to enable InternalEncryption on an actively used App Service Environment, we highly recommend that you divert traffic to a backup environment until the operation completes.
76
78
77
79
## Disable TLS 1.0 and TLS 1.1
78
80
79
-
If you want to manage TLS settings on an app by app basis, then you can use the guidance provided with the [Enforce TLS settings](../configure-ssl-bindings.md#enforce-tls-versions) documentation.
81
+
If you want to manage TLS settings on an app by app basis, then you can use the guidance provided with the [Enforce TLS settings](../configure-ssl-bindings.md#enforce-tls-versions) documentation.
80
82
81
83
If you want to disable all inbound TLS 1.0 and TLS 1.1 traffic for all of the apps in an App Service Environment, you can set the following **clusterSettings** entry:
82
84
@@ -92,19 +94,23 @@ If you want to disable all inbound TLS 1.0 and TLS 1.1 traffic for all of the ap
92
94
The name of the setting says 1.0 but when configured, it disables both TLS 1.0 and TLS 1.1.
93
95
94
96
## Change TLS cipher suite order
95
-
The App Service Environment supports changing the cipher suite from the default. The default set of ciphers is the same set that is used in the multi-tenant service. Changing the cipher suites affects an entire App Service deployment making this only possible in the single-tenant App Service Environment. There are two cipher suites required for an App Service Environment; TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, and TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256. If you wish to operate your App Service Environment with the strongest and most minimal set of cipher suites, then use just the two required ciphers. To configure your App Service Environment to use just the ciphers that it requires, modify the **clusterSettings** as shown below.
97
+
98
+
App Service Environment supports changing the cipher suite from the default. The default set of ciphers is the same set that is used in the multi-tenant App Service. Changing the cipher suite is only possible with App Service Environment, the single-tenant offering, not the multi-tenant offering, because changing it affects the entire App Service deployment. There are two cipher suites that are required for an App Service Environment: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 and TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256. Additionally, you should include the following cipher suites, which are required for TLS 1.3: TLS_AES_256_GCM_SHA384 and TLS_AES_128_GCM_SHA256.
99
+
100
+
To configure your App Service Environment to use just the ciphers that it requires, modify the **clusterSettings** as shown in the following sample. **Ensure that the TLS 1.3 ciphers are included at the beginning of the list**.
> If incorrect values are set for the cipher suite that SChannel cannot understand, all TLS communication to your server might stop functioning. In such a case, you will need to remove the *FrontEndSSLCipherSuiteOrder* entry from **clusterSettings** and submit the updated Resource Manager template to revert back to the default cipher suite settings. Please use this functionality with caution.
112
+
> If incorrect values are set for the cipher suite that SChannel cannot understand, all TLS communication to your server might stop functioning. In such a case, you will need to remove the *FrontEndSSLCipherSuiteOrder* entry from **clusterSettings** and submit the updated Resource Manager template to revert back to the default cipher suite settings. Please use this functionality with caution.
108
113
109
114
## Get started
115
+
110
116
The Azure Quickstart Resource Manager template site includes a template with the base definition for [creating an App Service Environment](https://azure.microsoft.com/resources/templates/web-app-asp-app-on-asev3-create/).
0 commit comments