You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## Supported scenarios using system-assigned identity
134
+
## Supported scenarios that use system-assigned identity
135
135
136
136
### Obtain a custom TLS/SSL certificate for the API Management instance from Key Vault
137
137
138
138
You can use the system-assigned identity of an API Management instance to retrieve custom TLS/SSL certificates that are stored in Key Vault. You can then assign these certificates to custom domains in the API Management instance. Take these considerations into account:
139
139
140
140
- The content type of the secret must be *application/x-pkcs12*. For more information, see [Domain certificate options](configure-custom-domain.md?tabs=key-vault#domain-certificate-options).
141
-
-Use the Key Vault certificate secret endpoint, which contains the secret.
141
+
-You must use the Key Vault certificate secret endpoint, which contains the secret.
142
142
143
143
> [!Important]
144
-
> If you don't provide the object version of the certificate, API Management automatically obtains the newer version of the certificate within four hours after it's updated in Key Vault.
144
+
> If you don't provide the object version of the certificate, API Management automatically obtains any newer version of the certificate within four hours after it's updated in Key Vault.
145
145
146
146
The following example shows an ARM template that uses the system-assigned managed identity of an API Management instance to retrieve a custom domain certificate from Key Vault.
147
147
@@ -450,23 +450,23 @@ The `principalId` property is a unique identifier for the identity that's used f
450
450
You can use a user-assigned identity to establish trust between an API Management instance and Key Vault. This trust can then be used to retrieve custom TLS/SSL certificates that are stored in Key Vault. You can then assign these certificates to custom domains in the API Management instance.
451
451
452
452
> [!IMPORTANT]
453
-
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. In Key Vault firewall, the **Allow Trusted Microsoft Services to bypass this firewall** option must also be enabled.
453
+
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. In Key Vault firewall, the **Allow Trusted Microsoft Services to bypass this firewall** option must be enabled.
454
454
455
455
Take these considerations into account:
456
456
457
457
- The content type of the secret must be *application/x-pkcs12*.
458
-
-Use the Key Vault certificate secret endpoint, which contains the secret.
458
+
-You must use the Key Vault certificate secret endpoint, which contains the secret.
459
459
460
460
> [!Important]
461
-
> If you don't provide the object version of the certificate, API Management automatically obtains the newer version of the certificate within four hours after it's updated in Key Vault.
461
+
> If you don't provide the object version of the certificate, API Management automatically obtains any newer version of the certificate within four hours after it's updated in Key Vault.
462
462
463
463
464
464
### Store and manage named values from Key Vault
465
465
466
466
You can use a user-assigned managed identity to access Key Vault to store and manage secrets for use in API Management policies. For more information, see [Use named values in Azure API Management policies](api-management-howto-properties.md).
467
467
468
468
> [!NOTE]
469
-
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. In Key Vault firewall, the **Allow Trusted Microsoft Services to bypass this firewall** option must also be enabled.
469
+
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. In Key Vault firewall, the **Allow Trusted Microsoft Services to bypass this firewall** option must be enabled.
470
470
471
471
### Authenticate to a backend by using a user-assigned identity
0 commit comments