You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This guide shows you how to configure your API Management service instance to use client certificate authentication to access the back-end service for an API. Before following the steps in this article, you should have your back-end service configured for client certificate authentication ([to configure certificate authentication in Azure WebSites refer to this article][to configure certificate authentication in Azure WebSites refer to this article]). You need access to the certificate and the password for uploading it to the API Management service.
29
+
This guide shows you how to configure your API Management service instance to use client certificate authentication to access the back-end service for an API. Before following the steps in this article, you should have your back-end service configured for client certificate authentication ([to configure certificate authentication in the Azure App Service refer to this article][to configure certificate authentication in Azure WebSites refer to this article]). You need access to the certificate and the password for uploading it to the API Management service.
30
30
31
31
## <aname="step1"> </a>Upload a Certificate
32
32
33
+
> [!NOTE]
34
+
> Instead of an uploaded certificate you can use a certificate stored in the [Azure Key Vault](https://azure.microsoft.com/services/key-vault/) service as shown in this [example](https://github.com/galiniliev/api-management-policy-snippets/blob/galin/AkvCert/examples/Look%20up%20Key%20Vault%20certificate%20using%20Managed%20Service%20Identity%20and%20call%20backend.policy.xml).
Follow the steps below to upload a new client certificate. If you have not created an API Management service instance yet, see the tutorial [Create an API Management service instance][Create an API Management service instance].
36
39
37
40
1. Navigate to your Azure API Management service instance in the Azure portal.
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-properties.md
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,21 +11,21 @@ ms.service: api-management
11
11
ms.workload: mobile
12
12
ms.tgt_pltfrm: na
13
13
ms.topic: article
14
-
ms.date: 11/05/2019
14
+
ms.date: 01/08/2020
15
15
ms.author: apimpm
16
16
---
17
17
18
18
# How to use named values in Azure API Management policies
19
19
20
20
API Management policies are a powerful capability of the system that allow the Azure portal to change the behavior of the API through configuration. Policies are a collection of statements that are executed sequentially on the request or response of an API. Policy statements can be constructed using literal text values, policy expressions, and named values.
21
21
22
-
Each API Management service instance has a properties collection of key/value pairs, which is called named values, that are global to the service instance. There is no imposed limit on the number of items in the collection. Named values can be used to manage constant string values across all API configuration and policies. Each named value may have the following attributes:
22
+
Each API Management service instance has a collection of key/value pairs, which is called named values, that are global to the service instance. There is no imposed limit on the number of items in the collection. Named values can be used to manage constant string values across all API configuration and policies. Each named value may have the following attributes:
|`Display name`| string | Used for referencing the named value in policies. A string of one to 256 characters. Only letters, numbers, dot, and dash are allowed. |
27
-
|`Value`| string | Actual value. Must not be empty or consist only of whitespace. Maximum of 4096 characters long. |
28
-
|`Secret`| boolean | Determines whether the value is a secret and should be encrypted or not. |
27
+
|`Value`| string | Actual value. Must not be empty or consist only of whitespace. Maximum of 4096 characters long. |
28
+
|`Secret`| boolean | Determines whether the value is a secret and should be encrypted or not. |
29
29
|`Tags`| array of string | Used to filter the named value list. Up to 32 tags. |
> Instead of named values stored within an API Management service, you can use values stored in the [Azure Key Vault](https://azure.microsoft.com/services/key-vault/) service as demonstrated by this [example](https://github.com/Azure/api-management-policy-snippets/blob/master/examples/Look%20up%20Key%20Vault%20secret%20using%20Managed%20Service%20Identity.policy.xml).
43
+
41
44
## To add and edit a named value
42
45
43
46

@@ -46,7 +49,7 @@ Named values can contain literal strings and [policy expressions](/azure/api-man
46
49
2. Select **Named values**.
47
50
3. Press **+Add**.
48
51
49
-
Name and Value are required values. If value is a secret, check the *This is a secret* checkbox. Enter one or more optional tags to help with organizing your named values, and click Save.
52
+
Name and Value are required values. If value is a secret, check the _This is a secret_ checkbox. Enter one or more optional tags to help with organizing your named values, and click Save.
0 commit comments