Skip to content

Commit 278886e

Browse files
committed
edits
1 parent 90339ce commit 278886e

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/api-management/api-management-howto-use-managed-service-identity.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Set-AzApiManagement -InputObject $apimService -SystemAssignedIdentity
7171

7272
### Azure Resource Manager (ARM) template
7373

74-
You can create an API Management instance with a system-assigned identity by including the following property in the resource definition:
74+
You can create an API Management instance with a system-assigned identity by including the following property in the ARM template resource definition:
7575

7676
```json
7777
"identity" : {
@@ -131,17 +131,17 @@ The following configurations are required if you want to use API Management to a
131131

132132
[!INCLUDE [api-management-key-vault-network](../../includes/api-management-key-vault-network.md)]
133133

134-
## Supported scenarios using system-assigned identity
134+
## Supported scenarios that use system-assigned identity
135135

136136
### Obtain a custom TLS/SSL certificate for the API Management instance from Key Vault
137137

138138
You can use the system-assigned identity of an API Management instance to retrieve custom TLS/SSL certificates that are stored in Key Vault. You can then assign these certificates to custom domains in the API Management instance. Take these considerations into account:
139139

140140
- The content type of the secret must be *application/x-pkcs12*. For more information, see [Domain certificate options](configure-custom-domain.md?tabs=key-vault#domain-certificate-options).
141-
- Use the Key Vault certificate secret endpoint, which contains the secret.
141+
- You must use the Key Vault certificate secret endpoint, which contains the secret.
142142

143143
> [!Important]
144-
> If you don't provide the object version of the certificate, API Management automatically obtains the newer version of the certificate within four hours after it's updated in Key Vault.
144+
> If you don't provide the object version of the certificate, API Management automatically obtains any newer version of the certificate within four hours after it's updated in Key Vault.
145145
146146
The following example shows an ARM template that uses the system-assigned managed identity of an API Management instance to retrieve a custom domain certificate from Key Vault.
147147

@@ -450,23 +450,23 @@ The `principalId` property is a unique identifier for the identity that's used f
450450
You can use a user-assigned identity to establish trust between an API Management instance and Key Vault. This trust can then be used to retrieve custom TLS/SSL certificates that are stored in Key Vault. You can then assign these certificates to custom domains in the API Management instance.
451451

452452
> [!IMPORTANT]
453-
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. In Key Vault firewall, the **Allow Trusted Microsoft Services to bypass this firewall** option must also be enabled.
453+
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. In Key Vault firewall, the **Allow Trusted Microsoft Services to bypass this firewall** option must be enabled.
454454
455455
Take these considerations into account:
456456

457457
- The content type of the secret must be *application/x-pkcs12*.
458-
- Use the Key Vault certificate secret endpoint, which contains the secret.
458+
- You must use the Key Vault certificate secret endpoint, which contains the secret.
459459

460460
> [!Important]
461-
> If you don't provide the object version of the certificate, API Management automatically obtains the newer version of the certificate within four hours after it's updated in Key Vault.
461+
> If you don't provide the object version of the certificate, API Management automatically obtains any newer version of the certificate within four hours after it's updated in Key Vault.
462462
463463

464464
### Store and manage named values from Key Vault
465465

466466
You can use a user-assigned managed identity to access Key Vault to store and manage secrets for use in API Management policies. For more information, see [Use named values in Azure API Management policies](api-management-howto-properties.md).
467467

468468
> [!NOTE]
469-
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. In Key Vault firewall, the **Allow Trusted Microsoft Services to bypass this firewall** option must also be enabled.
469+
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. In Key Vault firewall, the **Allow Trusted Microsoft Services to bypass this firewall** option must be enabled.
470470
471471
### Authenticate to a backend by using a user-assigned identity
472472

0 commit comments

Comments
 (0)