Skip to content

Commit 430f29c

Browse files
author
gitName
committed
refactored includes
1 parent a094065 commit 430f29c

6 files changed

+23
-22
lines changed

articles/api-management/api-management-howto-properties.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,8 +59,6 @@ Using key vault secrets is recommended because it helps improve API Management s
5959

6060
- Enable a system-assigned or user-assigned [managed identity](api-management-howto-use-managed-service-identity.md) in the API Management instance.
6161

62-
[!INCLUDE [api-management-key-vault-access](../../includes/api-management-key-vault-access.md)]
63-
6462
[!INCLUDE [api-management-key-vault-secret-access](../../includes/api-management-key-vault-secret-access.md)]
6563

6664
[!INCLUDE [api-management-key-vault-network](../../includes/api-management-key-vault-network.md)]

articles/api-management/api-management-howto-use-managed-service-identity.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,8 +125,6 @@ The `tenantId` property identifies which Microsoft Entra tenant the identity bel
125125

126126
The following configurations are needed for API Management to access certificates from an Azure key vault.
127127

128-
[!INCLUDE [api-management-key-vault-access](../../includes/api-management-key-vault-access.md)]
129-
130128
[!INCLUDE [api-management-key-vault-certificate-access](../../includes/api-management-key-vault-certificate-access.md)]
131129

132130
[!INCLUDE [api-management-key-vault-network](../../includes/api-management-key-vault-network.md)]

articles/api-management/configure-custom-domain.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -89,8 +89,6 @@ To fetch a TLS/SSL certificate, API Management must have the list and get secret
8989
1. On the **Managed identities** page of your API Management instance, enable a system-assigned or user-assigned [managed identity](api-management-howto-use-managed-service-identity.md). Note the principal ID on that page.
9090
1. Assign permissions to the managed identity to access the key vault. Use steps in the following section.
9191

92-
[!INCLUDE [api-management-key-vault-access](../../includes/api-management-key-vault-access.md)]
93-
9492
[!INCLUDE [api-management-key-vault-certificate-access](../../includes/api-management-key-vault-certificate-access.md)]
9593

9694
If the certificate is set to `autorenew` and your API Management tier has an SLA (that is, in all tiers except the Developer tier), API Management will pick up the latest version automatically, without downtime to the service.

includes/api-management-key-vault-access.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,14 @@ ms.author: danlep
1111
1. In the left menu, select **Access configuration**, and note the **Permission model** that is configured.
1212
1. Depending on the permission model, configure either a [key vault access policy](/azure/key-vault/general/assign-access-policy) or [Azure RBAC access](/azure/key-vault/general/rbac-guide) for an API Management managed identity.
1313

14-
**To add a key vault access policy:<br/>**
14+
**To add a key vault access policy:<br/>**
15+
16+
1. In the left menu, select **Access policies**.
17+
1. On the **Access policies** page,select **+ Create**.
18+
1. On the **Permissions** tab, under **Secret permissions**, select **Get** and **List**, then select **Next**.
19+
1. On the **Principal** tab, **Select principal**, search for the resource name of your managed identity, and then select **Next**.
20+
If you're using a system-assigned identity, the principal is the name of your API Management instance.
21+
1. Select **Next** again. On the **Review + create** tab, select **Create**.
22+
1523

16-
1. In the left menu, select **Access policies**.
17-
1. On the **Access policies** page,select **+ Create**.
18-
1. On the **Permissions** tab, under **Secret permissions**, select **Get** and **List**, then select **Next**.
19-
1. On the **Principal** tab, **Select principal**, search for the resource name of your managed identity, and then select **Next**.
20-
If you're using a system-assigned identity, the principal is the name of your API Management instance.
21-
1. Select **Next** again. On the **Review + create** tab, select **Create**.
24+

includes/api-management-key-vault-certificate-access.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,13 @@ ms.topic: include
55
ms.date: 02/21/2025
66
ms.author: danlep
77
---
8-
**To configure Azure RBAC access:<br/>**
9-
10-
1. In the left menu, select **Access control (IAM)**.
11-
1. On the **Access control (IAM)** page, select **Add role assignment**.
12-
1. On the **Role** tab, select **Key Vault Certificate User**.
13-
1. On the **Members** tab, select **Managed identity** > **+ Select members**.
14-
1. On the **Select managed identity** page, select the system-assigned managed identity or a user-assigned managed identity associated with your API Management instance, and then select **Select**.
15-
1. Select **Review + assign**.
8+
[!INCLUDE [api-management-key-vault-access](api-management-key-vault-access.md)]
9+
10+
**To configure Azure RBAC access:<br/>**
11+
12+
1. In the left menu, select **Access control (IAM)**.
13+
1. On the **Access control (IAM)** page, select **Add role assignment**.
14+
1. On the **Role** tab, select **Key Vault Certificate User**.
15+
1. On the **Members** tab, select **Managed identity** > **+ Select members**.
16+
1. On the **Select managed identity** page, select the system-assigned managed identity or a user-assigned managed identity associated with your API Management instance, and then select **Select**.
17+
1. Select **Review + assign**.

includes/api-management-key-vault-secret-access.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,13 @@ ms.topic: include
55
ms.date: 02/21/2025
66
ms.author: danlep
77
---
8+
[!INCLUDE [api-management-key-vault-access](api-management-key-vault-access.md)]
9+
810
**To configure Azure RBAC access:<br/>**
911

1012
1. In the left menu, select **Access control (IAM)**.
1113
1. On the **Access control (IAM)** page, select **Add role assignment**.
1214
1. On the **Role** tab, select **Key Vault Secrets User**.
1315
1. On the **Members** tab, select **Managed identity** > **+ Select members**.
1416
1. On the **Select managed identity** page, select the system-assigned managed identity or a user-assigned managed identity associated with your API Management instance, and then select **Select**.
15-
1. Select **Review + assign**.
17+
1. Select **Review + assign**.

0 commit comments

Comments
 (0)