You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> Starting March 15, 2025, Azure API Management will [retire](breaking-changes/git-configuration-retirement-march-2025.md) the ability to manage the configuration of your service instance using the built-in Git repository. If you plan to continue using a Git repository to manage the configuration of your service instance after the retirement date, update your configuration management to use a different solution such as APIOps and your own Git repository implementation.
18
+
16
19
Each API Management service instance maintains a configuration database that contains information about the configuration and metadata for the service instance. Changes can be made to the service instance by changing a setting in the Azure portal, using Azure tools such as Azure PowerShell or the Azure CLI, or making a REST API call. In addition to these methods, you can manage your service instance configuration using Git, enabling scenarios such as:
17
20
18
21
***Configuration versioning** - Download and store different versions of your service configuration
@@ -42,7 +45,7 @@ This article describes how to enable and use Git to manage your service configur
42
45
43
46
1. Navigate to your API Management instance in the [Azure portal](https://portal.azure.com/).
44
47
45
-
1. In the left menu, under **Deployment and infrastructure**, select **Repository**.
48
+
1. In the left menu, under **Deployment + infrastructure**, select **Repository**.
46
49
47
50
:::image type="content" source="media/api-management-configuration-repository-git/api-management-enable-git.png" alt-text="Screenshot showing how to access Git configuration for API Management.":::
48
51
@@ -67,7 +70,10 @@ For information on saving the service configuration using the REST API, see [Ten
67
70
68
71
## Get access credentials
69
72
70
-
To clone a repository, in addition to the URL to your repository, your need a username and a password.
73
+
To clone a repository, in addition to the URL to your repository, you need a username and a password.
74
+
75
+
> [!CAUTION]
76
+
> Using username and password credentials with a Git repository can pose security risks. Store your password securely and rotate it regularly. Don't store your credentials in plain text in code or configuration files.
71
77
72
78
1. On the **Repository** page, select **Access credentials** near the top of the page.
If you receive any errors, try modifying your `git clone` command to include the user name and password, as shown in the following example.
100
+
If you receive any errors, try modifying your `git clone` command to include the username, as shown in the following example. Provide the password when prompted.
If this provides an error, try URL encoding the password portion of the command. One quick way to do this is to open Visual Studio, and issue the following command in the **Immediate Window**. To open the **Immediate Window**, open any solution or project in Visual Studio (or create a new empty console application), and choose **Windows**, **Immediate** from the **Debug** menu.
106
+
If this provides an error, try URL encoding the password and pass it in the command. One quick way to do this is to open Visual Studio, and issue the following command in the **Immediate Window**. To open the **Immediate Window**, open any solution or project in Visual Studio (or create a new empty console application), and choose **Windows**, **Immediate** from the **Debug** menu.
101
107
102
108
```
103
109
?System.Net.WebUtility.UrlEncode("password from the Azure portal")
104
110
```
105
111
106
-
Use the encoded password along with your user name and repository location to construct the git command.
112
+
Use the encoded password along with your username and repository location to construct the git command.
Copy file name to clipboardExpand all lines: articles/api-management/authentication-authorization-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -149,7 +149,7 @@ While authorization is preferred, and OAuth 2.0 has become the dominant method o
149
149
|---------|---------|---------|
150
150
|[Managed identity authentication](authentication-managed-identity-policy.md)| Authenticate to backend API with a system-assigned or user-assigned [managed identity](api-management-howto-use-managed-service-identity.md). | Recommended for scoped access to a protected backend resource by obtaining a token from Microsoft Entra ID. |
151
151
|[Certificate authentication](authentication-certificate-policy.md)| Authenticate to backend API using a client certificate. | Certificate may be stored in key vault. |
152
-
|[Basic authentication](authentication-basic-policy.md)| Authenticate to backend API with username and password that are passed through an Authorization header. | Discouraged if better options are available. |
152
+
|[Basic authentication](authentication-basic-policy.md) | Authenticate to backend API with username and password that are passed through an Authorization header. | Discouraged if more secure authentication options are available (for example, managed identity, certificates, credential manager). If chosen, use [named values](api-management-howto-properties.md) to provide credentials, with secrets protected in a key vault.
153
153
154
154
## Next steps
155
155
* Learn more about [authentication and authorization](../active-directory/develop/authentication-vs-authorization.md) in the Microsoft identity platform.
Effective 15 March 2025, Azure API Management will retire the ability to manage the configuration of your service instance using the built-in Git repository. If you plan to continue using a Git repository to manage the configuration of your service instance after the retirement date, you must update your configuration management to use a different solution such as APIOps and your own Git repository implementation.
16
+
Starting 15 March 2025, Azure API Management will retire the ability to manage the configuration of your service instance using the built-in Git repository. If you plan to continue using a Git repository to manage the configuration of your service instance after the retirement date, you must update your configuration management to use a different solution such as APIOps and your own Git repository implementation.
Copy file name to clipboardExpand all lines: articles/api-management/developer-portal-basic-authentication.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,8 +5,8 @@ description: Learn how to set up user accounts with username and password authen
5
5
6
6
author: dlepow
7
7
ms.service: azure-api-management
8
-
ms.topic: article
9
-
ms.date: 08/30/2022
8
+
ms.topic: how-to
9
+
ms.date: 01/10/2025
10
10
ms.author: danlep
11
11
---
12
12
@@ -18,6 +18,8 @@ In the developer portal for Azure API Management, the default authentication met
18
18
19
19
For an overview of options to secure the developer portal, see [Secure access to the API Management developer portal](secure-developer-portal-access.md).
20
20
21
+
> [!CAUTION]
22
+
> While you can use basic authentication to secure users' access to the developer portal, we recommend configuring a more secure authentication method such as [Microsoft Entra ID](api-management-howto-aad.md) or [Azure AD B2C](api-management-howto-aad-b2c.md), if available.
Copy file name to clipboardExpand all lines: articles/api-management/developer-portal-wordpress-plugin.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlepow
6
6
ms.service: azure-api-management
7
7
ms.custom:
8
8
ms.topic: how-to
9
-
ms.date: 07/18/2024
9
+
ms.date: 01/10/2025
10
10
ms.author: danlep
11
11
---
12
12
@@ -35,9 +35,12 @@ For this scenario, you create a managed WordPress site hosted on Azure App Servi
35
35
36
36
1. In the Azure portal, navigate to [https://portal.azure.com/#create/WordPress.WordPress](https://portal.azure.com/#create/WordPress.WordPress).
37
37
38
-
1. On the **Create WordPress on App Service** page, in the **Basics** tab, enter your project details.
38
+
1. On the **Create WordPress on App Service** page, in the **Basics** tab, enter your project details, Web App details, and WordPress setup settings.
39
39
40
-
Record the WordPress admin username and password in a safe place. These credentials are required to sign into the WordPress admin site and install the plugin in a later step.
40
+
Store the WordPress admin username and password in a safe place. These credentials are required to sign into the WordPress admin site and install the plugin in a later step.
41
+
42
+
> [!CAUTION]
43
+
> Avoid using the default WordPress `admin` username, and create a strong password. [Learn more about WordPress password best practices](https://wordpress.org/documentation/article/password-best-practices/)
Copy file name to clipboardExpand all lines: articles/api-management/secure-developer-portal-access.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Learn about options to secure access to the API Management develope
5
5
author: dlepow
6
6
7
7
ms.service: azure-api-management
8
-
ms.topic: conceptual
8
+
ms.topic: concept-article
9
9
ms.date: 09/12/2023
10
10
ms.author: danlep
11
11
---
@@ -36,6 +36,9 @@ API Management has a fully customizable, standalone, managed [developer portal](
36
36
37
37
***Basic authentication** - A default option is to use the built-in developer portal [username and password](developer-portal-basic-authentication.md) provider, which allows developers to register directly in API Management and sign in using API Management user accounts. User sign up through this option is protected by a CAPTCHA service.
38
38
39
+
> [!CAUTION]
40
+
> While you can use basic authentication to secure users' access to the developer portal, we recommend configuring a more secure authentication method such as [Microsoft Entra ID](api-management-howto-aad.md) or [Azure AD B2C](api-management-howto-aad-b2c.md).
41
+
39
42
40
43
## Developer portal test console
41
44
In addition to providing configuration for developer users to sign up for access and sign in, the developer portal includes a test console where the developers can send test requests through API Management to the backend APIs. This test facility also exists for contributing users of API Management who manage the service using the Azure portal.
@@ -111,6 +114,6 @@ Key configurations:
111
114
Go a step further by delegating [user registration or product subscription](api-management-howto-setup-delegation.md) and extend the process with your own logic.
112
115
113
116
114
-
## Next steps
117
+
## Related content
115
118
* Learn more about [authentication and authorization](../active-directory/develop/authentication-vs-authorization.md) in the Microsoft identity platform.
116
119
* Learn how to [mitigate OWASP API security threats](mitigate-owasp-api-threats.md) using API Management.
| use-managed-identity | Boolean. Specifies whether to use the API Management instance's system-assigned [managed identity](api-management-howto-use-managed-service-identity.md) for connection to the Azure SQL database in place of a username and password in the connection string. Policy expressions are allowed. <br/><br/>The identity must be [configured](#configure-managed-identity-integration-with-azure-sql) to access the Azure SQL database. | No |`false`|
80
+
| use-managed-identity | Boolean. Specifies whether to use the API Management instance's system-assigned [managed identity](api-management-howto-use-managed-service-identity.md) for connection to the Azure SQL database in place of a username and password in the connection string. Policy expressions are allowed. <br/><br/>The identity must be [configured](#configure-managed-identity-integration-with-azure-sql) to access the Azure SQL database. Microsoft recommends this option as the most secure authentication method. | No |`false`|
81
81
82
82
### request attribute
83
83
@@ -128,7 +128,7 @@ The `sql-data-source` resolver policy configures a Transact-SQL (T-SQL) request
128
128
129
129
## Configure managed identity integration with Azure SQL
130
130
131
-
You can configure an API Management system-assigned managed identity for access to Azure SQL instead of configuring SQL authentication with username and password. For background, see [Configure and manage Microsoft Entra authentication with Azure SQL](/azure/azure-sql/database/authentication-aad-configure).
131
+
We strongly recommend configuring an API Management system-assigned managed identity for access to Azure SQL instead of configuring SQL authentication with username and password. For background, see [Configure and manage Microsoft Entra authentication with Azure SQL](/azure/azure-sql/database/authentication-aad-configure).
132
132
133
133
### Prerequisites
134
134
@@ -149,7 +149,7 @@ Enable Microsoft Entra authentication to SQL Database by assigning a Microsoft E
149
149
150
150
1. In the portal, go to your Azure SQL database resource.
151
151
1. Select **Query editor (preview)**.
152
-
1. Login using Active Directory authentication.
152
+
1. Login using Microsoft Entra authentication.
153
153
1. Execute the following SQL script. Replace `<identity-name>` with the name of your API Management instance.
0 commit comments