Skip to content

Commit 312c8eb

Browse files
committed
review
1 parent 18eafdf commit 312c8eb

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

articles/api-management/authentication-certificate-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ ms.author: danlep
4848
### Usage notes
4949

5050
- We recommend configuring [key vault certificates](api-management-howto-mutual-certificates.md) to manage certificates used to secure access to backend services.
51-
- If you configure certificates or passwords not stored in the built-in certificate store, we recommend using [named values](api-management-howto-properties.md) to provide credentials.
51+
- If you configure a certificate password in this policy, we recommend using a [named value](api-management-howto-properties.md).
5252

5353

5454
## Examples

includes/api-management-credentials-caution.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,4 @@ ms.date: 09/11/2024
66
ms.author: danlep
77
---
88
> [!CAUTION]
9-
> Minimize risks of credential exposure when configuring this policy. Microsoft recommends that you use the most secure authentication methods supported by your backend, and protect sensitive information in policy definitions, for example by using [named values](../articles/api-management/api-management-howto-properties.md) and storing secrets in Azure Key Vault.
9+
> Minimize risks of credential exposure when configuring this policy. Microsoft recommends that you use more secure authentication methods if supported by your backend, such as [managed identity authentication](../articles/api-management/authentication-managed-identity-policy.md) or [credential manager](../articles/api-management/credentials-overview.md). If you configure sensitive information in policy definitions, we recommend using [named values](../articles/api-management/api-management-howto-properties.md) and storing secrets in Azure Key Vault.

0 commit comments

Comments
 (0)