You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-center/import-api-management-apis.md
+10-90Lines changed: 10 additions & 90 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,6 +26,9 @@ This article shows two options for using the Azure CLI to add APIs to your API c
26
26
27
27
After importing API definitions or APIs from API Management, you can add metadata and documentation in your API center to help stakeholders discover, understand, and consume the API.
28
28
29
+
> [!TIP]
30
+
> You can also set up automatic synchronization of APIS from API Management to your API center. For more information, see [Link an API Management instance to synchronize APIs to your API center](synchronize-api-management-apis.md).
31
+
29
32
## Prerequisites
30
33
31
34
* An API center in your Azure subscription. If you haven't created one, see [Quickstart: Create your API center](set-up-api-center.md).
@@ -58,7 +61,7 @@ az apim api export --api-id my-api --resource-group myResourceGroup \
58
61
```
59
62
60
63
```azurecli
61
-
#! PowerShell syntax
64
+
# Formatted for PowerShell
62
65
az apim api export --api-id my-api --resource-group myResourceGroup `
@@ -128,94 +131,11 @@ When you add APIs from an API Management instance to your API center using `az a
128
131
129
132
### Add a managed identity in your API center
130
133
131
-
For this scenario, your API center uses a [managed identity](/entra/identity/managed-identities-azure-resources/overview) to access APIs in your API Management instance. Depending on your needs, configure either a system-assigned or one or more user-assigned managed identities.
132
-
133
-
The following examples show how to configure a system-assigned managed identity by using the Azure portal or the Azure CLI. At a high level, configuration steps are similar for a user-assigned managed identity.
134
-
135
-
#### [Portal](#tab/portal)
136
-
137
-
1. In the [portal](https://azure.microsoft.com), navigate to your API center.
138
-
1. In the left menu, under **Security**, select **Managed identities**.
139
-
1. Select **System assigned**, and set the status to **On**.
140
-
1. Select **Save**.
141
-
142
-
#### [Azure CLI](#tab/cli)
143
-
144
-
Set the system-assigned identity in your API center using the following [az apic update](/cli/azure/apic#az-apic-update) command. Substitute the names of your API center and resource group:
145
-
146
-
```azurecli
147
-
az apic update --name <api-center-name> --resource-group <resource-group-name> --identity '{"type": "SystemAssigned"}'
### Assign the managed identity the API Management Service Reader role
152
137
153
-
To allow import of APIs, assign your API center's managed identity the **API Management Service Reader** role in your API Management instance. You can use the [portal](../role-based-access-control/role-assignments-portal-managed-identity.yml) or the Azure CLI.
154
-
155
-
#### [Portal](#tab/portal)
156
-
157
-
1. In the [portal](https://azure.microsoft.com), navigate to your API Management instance.
158
-
1. In the left menu, select **Access control (IAM)**.
159
-
1. Select **+ Add role assignment**.
160
-
1. On the **Add role assignment** page, set the values as follows:
161
-
1. On the **Role** tab - Select **API Management Service Reader**.
162
-
1. On the **Members** tab, in **Assign access to** - Select **Managed identity** > **+ Select members**.
163
-
1. On the **Select managed identities** page - Select the system-assigned managed identity of your API center that you added in the previous section. Click **Select**.
164
-
1. Select **Review + assign**.
165
-
166
-
#### [Azure CLI](#tab/cli)
167
-
168
-
1. Get the principal ID of the identity. For a system-assigned identity, use the [az apic show](/cli/azure/apic#az-apic-show) command.
169
-
170
-
```azurecli
171
-
#! /bin/bash
172
-
apicObjID=$(az apic show --name <api-center-name> \
173
-
--resource-group <resource-group-name> \
174
-
--query "identity.principalId" --output tsv)
175
-
```
176
-
177
-
```azurecli
178
-
# PowerShell syntax
179
-
$apicObjID=$(az apic show --name <api-center-name> `
180
-
--resource-group <resource-group-name> `
181
-
--query "identity.principalId" --output tsv)
182
-
```
183
-
184
-
1. Get the resource ID of your API Management instance using the [az apim show](/cli/azure/apim#az-apim-show) command.
1. Assign the managed identity the **API Management Service Reader** role in your API Management instance using the [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create) command.
| Maximum number of APIs | 200<sup>2</sup> | 10,000 |
17
+
| Maximum number of APIs | 200<sup>3</sup> | 10,000 |
18
18
| Maximum number of versions per API | 5 | 100 |
19
19
| Maximum number of definitions per version | 5 | 5 |
20
20
| Maximum number of deployments per API | 10 | 10 |
21
21
| Maximum number of environments | 20 | 20 |
22
22
| Maximum number of workspaces | 1 (Default) | 1 (Default) |
23
-
| Maximum number of custom metadata properties per entity<sup>3</sup> | 10 | 20 |
23
+
| Maximum number of custom metadata properties per entity<sup>4</sup> | 10 | 20 |
24
24
| Maximum number of child properties in custom metadata property of type "object" | 10 |10 |
25
25
| Maximum requests per minute (data plane) | 3,000 | 6,000 |
26
26
| Maximum number of API definitions [linted](../enable-managed-api-analysis-linting.md) per 4 hours | 10 | 100 |
27
+
| Maximum number of linked API sources<sup>5</sup> | 1 | 3 |
27
28
28
-
<sup>1</sup> To increase a limit in the Standard plan, contact [support](https://azure.microsoft.com/support/options/).<br/>
29
-
<sup>2</sup> In the Free plan, use of full service features including API analysis and access through the data plane API is limited to 5 APIs.<br/>
30
-
<sup>3</sup> Custom metadata properties assigned to APIs, deployments, and environments.
29
+
<sup>1</sup> Free plan provided for 90 days, then service is soft-deleted.<br/>
30
+
<sup>2</sup> To increase a limit in the Standard plan, contact [support](https://azure.microsoft.com/support/options/).<br/>
31
+
<sup>3</sup> In the Free plan, use of full service features including API analysis and access through the data plane API is limited to 5 APIs.<br/>
32
+
<sup>4</sup> Custom metadata properties assigned to APIs, deployments, and environments.<br/>
33
+
<sup>5</sup> Sources such as linked API Management instances. In the Free plan, synchronization from a linked API source is limited to 200 APIs and 5 API definitions.
To allow import of APIs, assign your API center's managed identity the **API Management Service Reader** role in your API Management instance. You can use the [portal](../../role-based-access-control/role-assignments-portal-managed-identity.yml) or the Azure CLI.
15
+
16
+
#### [Portal](#tab/portal)
17
+
18
+
1. In the [portal](https://azure.microsoft.com), navigate to your API Management instance.
19
+
1. In the left menu, select **Access control (IAM)**.
20
+
1. Select **+ Add role assignment**.
21
+
1. On the **Add role assignment** page, set the values as follows:
22
+
1. On the **Role** tab - Select **API Management Service Reader**.
23
+
1. On the **Members** tab, in **Assign access to** - Select **Managed identity** > **+ Select members**.
24
+
1. On the **Select managed identities** page - Select the system-assigned managed identity of your API center that you added in the previous section. Click **Select**.
25
+
1. Select **Review + assign**.
26
+
27
+
#### [Azure CLI](#tab/cli)
28
+
29
+
1. Get the principal ID of the identity. For a system-assigned identity, use the [az apic show](/cli/azure/apic#az-apic-show) command.
30
+
31
+
```azurecli
32
+
#! /bin/bash
33
+
apicObjID=$(az apic show --name <api-center-name> \
34
+
--resource-group <resource-group-name> \
35
+
--query "identity.principalId" --output tsv)
36
+
```
37
+
38
+
```azurecli
39
+
# Formatted for PowerShell
40
+
$apicObjID=$(az apic show --name <api-center-name> `
41
+
--resource-group <resource-group-name> `
42
+
--query "identity.principalId" --output tsv)
43
+
```
44
+
45
+
1. Get the resource ID of your API Management instance using the [az apim show](/cli/azure/apim#az-apim-show) command.
1. Assign the managed identity the **API Management Service Reader** role in your API Management instance using the [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create) command.
For this scenario, your API center uses a [managed identity](/entra/identity/managed-identities-azure-resources/overview) to access APIs in your API Management instance. Depending on your needs, configure either a system-assigned or one or more user-assigned managed identities.
15
+
16
+
The following examples show how to configure a system-assigned managed identity by using the Azure portal or the Azure CLI. At a high level, configuration steps are similar for a user-assigned managed identity.
17
+
18
+
#### [Portal](#tab/portal)
19
+
20
+
1. In the [portal](https://azure.microsoft.com), navigate to your API center.
21
+
1. In the left menu, under **Security**, select **Managed identities**.
22
+
1. Select **System assigned**, and set the status to **On**.
23
+
1. Select **Save**.
24
+
25
+
#### [Azure CLI](#tab/cli)
26
+
27
+
Set the system-assigned identity in your API center using the following [az apic update](/cli/azure/apic#az-apic-update) command. Substitute the names of your API center and resource group:
28
+
29
+
```azurecli
30
+
az apic update --name <api-center-name> --resource-group <resource-group-name> --identity '{"type": "SystemAssigned"}'
0 commit comments