Skip to content

Commit 129ccc2

Browse files
committed
[APIM] Additional infrastructure endpoints for VNet
1 parent caf4abc commit 129ccc2

File tree

1 file changed

+18
-12
lines changed

1 file changed

+18
-12
lines changed

articles/api-management/virtual-network-reference.md

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: api-management
88
ms.topic: reference
9-
ms.date: 01/06/2023
9+
ms.date: 08/29/2023
1010
ms.author: danlep
1111
ms.custom: references_regions
1212
---
@@ -78,28 +78,21 @@ NSG rules allowing outbound connectivity to Storage, SQL, and Azure Event Hubs s
7878

7979
## TLS functionality
8080

81-
To enable TLS/SSL certificate chain building and validation, the API Management service needs outbound network connectivity to `ocsp.msocsp.com`, `mscrl.microsoft.com`, and `crl.microsoft.com`. This dependency is not required if any certificate you upload to API Management contains the full chain to the CA root.
81+
To enable TLS/SSL certificate chain building and validation, the API Management service needs outbound network connectivity on ports `80` and `443` to `ocsp.msocsp.com`, `oneocsp.msocsp.com`, `mscrl.microsoft.com`, `crl.microsoft.com`, and `csp.digicert.com`. This dependency is not required if any certificate you upload to API Management contains the full chain to the CA root.
82+
8283

8384
## DNS access
8485

8586
Outbound access on port `53` is required for communication with DNS servers. If a custom DNS server exists on the other end of a VPN gateway, the DNS server must be reachable from the subnet hosting API Management.
8687

87-
### FQDN dependencies
88-
89-
To operate properly, the API Management service needs outbound connectivity on port 443 to the following endpoints associated with its cloud-based API Management instance:
88+
## Azure Active Directory integration
9089

91-
| Description | Required | Notes |
92-
|:------------|:---------------------|:------|
93-
| Endpoints for Azure Active Directory integration | ✔️ | Required endpoints are `<region>.login.microsoft.com` and `login.microsoftonline.com`. |
90+
To operate properly, the API Management service needs outbound connectivity on port 443 to the following endpoints associated with Azure Active Directory: `<region>.login.microsoft.com` and `login.microsoftonline.com`.
9491

9592
## Metrics and health monitoring
9693

9794
Outbound network connectivity to Azure Monitoring endpoints, which resolve under the following domains, are represented under the **AzureMonitor** service tag for use with Network Security Groups.
9895

99-
### Metrics and health monitoring
100-
101-
Outbound network connectivity to Azure Monitoring endpoints, which resolve under the following domains, are represented under the AzureMonitor service tag for use with Network Security Groups.
102-
10396
| Azure Environment | Endpoints |
10497
|-------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
10598
| Azure Public | <ul><li>gcs.prod.monitoring.core.windows.net</li><li>global.prod.microsoftmetrics.com</li><li>shoebox2.prod.microsoftmetrics.com</li><li>shoebox2-red.prod.microsoftmetrics.com</li><li>shoebox2-black.prod.microsoftmetrics.com</li><li>prod3.prod.microsoftmetrics.com</li><li>prod3-black.prod.microsoftmetrics.com</li><li>prod3-red.prod.microsoftmetrics.com</li><li>gcs.prod.warm.ingestion.monitoring.azure.com</li></ul> |
@@ -126,6 +119,18 @@ Enable publishing the [developer portal](api-management-howto-developer-portal.m
126119

127120
When adding virtual machines running Windows to the VNet, allow outbound connectivity on port `1688` to the [KMS endpoint](/troubleshoot/azure/virtual-machines/custom-routes-enable-kms-activation#solution) in your cloud. This configuration routes Windows VM traffic to the Azure Key Management Services (KMS) server to complete Windows activation.
128121

122+
## Internal infrastructure and diagnostics
123+
124+
The following settings and FQDNs are required to maintain and diagnose API Management's internal compute infrastructure.
125+
126+
* Allow outbound UDP access on port `123` for NTP.
127+
* Allow outbound TCP access on port `12000` for diagnostics.
128+
* Allow outbound access on port `443` to the following endpoints for internal diagnostics: `azurewatsonanalysis-prod.core.windows.net`, `*.data.microsoft.com`, `azureprofiler.trafficmanager.net`, `shavamanifestazurecdnprod1.azureedge.net`, `shavamanifestcdnprod1.azureedge.net`.
129+
* Allow outbound access on port `443` to the following endpoint for internal PKI: `issuer.pki.azure.com`.
130+
* Enable outbound access on ports `80` and `443` to the following endpoints for Windows Update: `*.update.microsoft.com`, `*.ctldl.windowsupdate.com`, `ctldl.windowsupdate.com`, `download.windowsupdate.com`.
131+
* Allow outbound access on ports `80` and `443` to the endpoint `go.microsoft.com`.
132+
* Allow outbound access on port `443` to the following endpoints for Windows Defender: `wdcp.microsoft.com`, `wdcpalt.microsoft.com `.
133+
129134
## Control plane IP addresses
130135

131136
The following IP addresses are divided by **Azure Environment** and **Region**. In some cases, two IP addresses are listed. Permit both IP addresses.
@@ -196,6 +201,7 @@ The following IP addresses are divided by **Azure Environment** and **Region**.
196201
| Azure Government| USDoD Central| 52.182.32.132|
197202
| Azure Government| USDoD East| 52.181.32.192|
198203

204+
199205
## Next steps
200206

201207
Learn more about:

0 commit comments

Comments
 (0)