Skip to content

Commit 832ba3a

Browse files
author
gitName
committed
[APIC] Managed API Center portal
1 parent f9be6f9 commit 832ba3a

File tree

11 files changed

+295
-196
lines changed

11 files changed

+295
-196
lines changed

articles/api-center/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,12 +68,14 @@
6868
href: set-up-notification-workflow.md
6969
- name: API discovery and consumption
7070
items:
71+
- name: Enable API Center portal
72+
href: Set up-api-center-portal.md
73+
- name: Self-host Azure API Center portal
74+
href: enable-api-center-portal.md
7175
- name: Discover and consume APIs - VS Code extension
7276
href: discover-apis-vscode-extension.md
7377
- name: Enable platform API catalog - VS Code extension
7478
href: enable-platform-api-catalog-vscode-extension.md
75-
- name: Self-host Azure API Center portal
76-
href: enable-api-center-portal.md
7779
- name: Check API calls use minimal permissions with Dev Proxy
7880
href: check-minimal-api-permissions-dev-proxy.md
7981
- name: API center management and operations

articles/api-center/enable-api-center-portal.md

Lines changed: 0 additions & 194 deletions
This file was deleted.
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
---
2+
title: Include file
3+
description: Include file
4+
services: api-center
5+
author: dlepow
6+
7+
ms.service: azure-api-center
8+
ms.topic: include
9+
ms.date: 03/04/2025
10+
ms.author: danlep
11+
ms.custom: Include file
12+
---
13+
14+
## Create Microsoft Entra app registration
15+
16+
First configure an app registration in your Microsoft Entra ID tenant. The app registration enables the API Center portal to access data from your API center on behalf of a signed-in user.
17+
18+
1. In the [Azure portal](https://portal.azure.com), navigate to **Microsoft Entra ID** > **App registrations**.
19+
1. Select **+ New registration**.
20+
1. On the **Register an application** page, set the values as follows:
21+
22+
* Set **Name** to a meaningful name such as *api-center-portal*
23+
* Under **Supported account types**, select **Accounts in this organizational directory (Single tenant)**.
24+
* In **Redirect URI**, select **Single-page application (SPA)** and set the URI.
25+
Set the URI to the URI of your API Center portal deployment, in the following form: `https://<service-name>.portal.location>.azure-api-center.ms`. Replace `<service name>` and `<location>` with the name of your API center and the location where it's deployed, Example: `https://myapicenter.portal.eastus.azure-api-center`.
26+
27+
> [!TIP]
28+
> If you are self-hosting the portal, for local testing, you can set the URI to `https://localhost:5173`. This URI is not used for the production deployment of the portal.
29+
30+
* Select **Register**.
31+
1. On the **Overview** page, copy the **Application (client) ID** and the **Directory (tenant) ID**. You set these values when you build the portal.
32+
33+
1. On the **API permissions** page, select **+ Add a permission**.
34+
1. On the **Request API permissions** page, select the **APIs my organization uses** tab. Search for and select **Azure API Center**. You can also search for and select application ID `c3ca1a77-7a87-4dba-b8f8-eea115ae4573`.
35+
1. On the **Request permissions** page, select **user_impersonation**.
36+
1. Select **Add permissions**.
37+
38+
The Azure API Center permissions appear under **Configured permissions**.
39+
40+
:::image type="content" source="media/api-center-portal-app-registration/configure-app-permissions.png" alt-text="Screenshot of required permissions in Microsoft Entra ID app registration in the portal." lightbox="media/api-center-portal-app-registration/configure-app-permissions.png":::
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
title: Include file
3+
description: Include file
4+
services: api-center
5+
author: dlepow
6+
7+
ms.service: azure-api-center
8+
ms.topic: include
9+
ms.date: 03/04/2025
10+
ms.author: danlep
11+
ms.custom: Include file
12+
---
13+
14+
## Prerequisites
15+
16+
* An API center in your Azure subscription. If you haven't created one already, see [Quickstart: Create your API center](set-up-api-center.md).
17+
18+
* Permissions to create an app registration in a Microsoft Entra tenant associated with your Azure subscription, and permissions to grant access to data in your API center.
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
---
2+
title: Include file
3+
description: Include file
4+
services: api-center
5+
author: dlepow
6+
7+
ms.service: azure-api-center
8+
ms.topic: include
9+
ms.date: 03/04/2025
10+
ms.author: danlep
11+
ms.custom: Include file
12+
---
13+
14+
## Enable sign-in to portal by Microsoft Entra users and groups
15+
16+
Users must sign in to see the APIs in your API center. To enable sign-in, assign the **Azure API Center Data Reader** role to users or groups in your organization, scoped to your API center.
17+
18+
> [!IMPORTANT]
19+
> By default, you and other administrators of the API center don't have access to APIs in the API Center portal. Be sure to assign the **Azure API Center Data Reader** role to yourself and other administrators.
20+
21+
For detailed prerequisites and steps to assign a role to users and groups, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.yml). Brief steps follow:
22+
23+
1. In the [Azure portal](https://portal.azure.com), navigate to your API center.
24+
1. In the left menu, select **Access control (IAM)** > **+ Add role assignment**.
25+
1. In the **Add role assignment** pane, set the values as follows:
26+
* On the **Role** page, search for and select **Azure API Center Data Reader**. Select **Next**.
27+
* On the **Members** page, In **Assign access to**, select **User, group, or service principal** > **+ Select members**.
28+
* On the **Select members** page, search for and select the users or groups to assign the role to. Click **Select** and then **Next**.
29+
* Review the role assignment, and select **Review + assign**.
30+
31+
> [!NOTE]
32+
> To streamline access configuration for new users, we recommend that you assign the role to a Microsoft Entra group and configure a dynamic group membership rule. To learn more, see [Create or update a dynamic group in Microsoft Entra ID](/entra/identity/users/groups-create-rule).
33+
34+
After you configure access to the portal, configured users can sign in to the portal and view the APIs in your API center.
35+
36+
> [!NOTE]
37+
> The first user to sign in to the portal is prompted to consent to the permissions requested by the API Center portal app registration. Thereafter, other configured users aren't prompted to consent.
207 KB
Loading
127 KB
Loading

0 commit comments

Comments
 (0)