You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/front-door-api-management.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,9 +20,12 @@ Azure Front Door is a modern application delivery network platform providing a s
20
20
21
21
This article shows how to:
22
22
23
-
* Set up an Azure Front Door Standard/Premium profile in front of a publicly accessible Azure API Management instance: either non-networked, or injected in a virtual network in [external mode](api-management-using-with-vnet.md).
23
+
* Set up an Azure Front Door Standard/Premium profile in front of a publicly accessible Azure API Management instance: either non-networked, or a Developer or Premium instance injected in a virtual network in [external mode](api-management-using-with-vnet.md).
24
24
* Restrict API Management to accept API traffic only from Azure Front Door.
25
25
26
+
> [!TIP]
27
+
> You can also configure Azure Front Door Premium to route traffic to an API Management gateway using a [private endpoint](../frontdoor/standard-premium/how-to-enable-private-link-apim.md).
You can configure an inbound [private endpoint](../private-link/private-endpoint-overview.md) for your API Management instance to allow clients in your private network to securely access the instance over [Azure Private Link](../private-link/private-link-overview.md).
16
16
17
-
* The private endpoint uses an IP address from an Azure VNet in which it's hosted.
17
+
> [!NOTE]
18
+
> Private endpoint support in the Standard v2 tier is currently in limited preview. To sign up, fill [this form](https://aka.ms/privateendpointpreview).
18
19
19
-
* Network traffic between a client on your private network and API Management traverses over the VNet and a Private Link on the Microsoft backbone network, eliminating exposure from the public internet.
20
+
* The private endpoint uses an IP address from an Azure virtual network in which it's hosted.
21
+
22
+
* Network traffic between a client on your private network and API Management traverses over the virtual network and a Private Link on the Microsoft backbone network, eliminating exposure from the public internet.
20
23
21
24
* Configure custom DNS settings or an Azure DNS private zone to map the API Management hostname to the endpoint's private IP address.
22
25
@@ -29,13 +32,14 @@ You can configure an inbound [private endpoint](../private-link/private-endpoint
29
32
* Only the API Management instance's Gateway endpoint supports inbound Private Link connections.
30
33
* Each API Management instance supports at most 100 Private Link connections.
31
34
* Connections aren't supported on the [self-hosted gateway](self-hosted-gateway-overview.md) or on a [workspace gateway](workspaces-overview.md#workspace-gateway).
35
+
* In the classic API Management tiers, private endpoints aren't supported in instances injected in an internal or external virtual network.
36
+
32
37
33
38
## Prerequisites
34
39
35
40
- An existing API Management instance. [Create one if you haven't already](get-started-create-service-instance.md).
36
-
- The API Management instance must be hosted on the [`stv2` compute platform](compute-infrastructure.md).
37
-
- Do not deploy (inject) the instance into an [external](api-management-using-with-vnet.md) or [internal](api-management-using-with-internal-vnet.md) virtual network.
38
-
- A virtual network and subnet to host the private endpoint. The subnet may contain other Azure resources.
41
+
- When using an instance in the classic Developer or Premium tier, don't deploy (inject) the instance into an [external](api-management-using-with-vnet.md) or [internal](api-management-using-with-internal-vnet.md) virtual network.
42
+
- A virtual network containing a subnet to host the private endpoint. The subnet may contain other Azure resources.
39
43
- (Recommended) A virtual machine in the same or a different subnet in the virtual network, to test the private endpoint.
1.[Optionally disable public network access](#optionally-disable-public-network-access)
61
+
(#approve-pending-private-endpoint-connections)
60
62
61
63
### Get available private endpoint types in subscription
62
64
@@ -89,10 +91,16 @@ Network policies such as network security groups must be disabled in the subnet
89
91
90
92
If you use tools such as Azure PowerShell, the Azure CLI, or REST API to configure private endpoints, update the subnet configuration manually. For examples, see [Manage network policies for private endpoints](../private-link/disable-private-endpoint-network-policy.md).
91
93
92
-
When you use the Azure portal to create a private endpoint, as shown in the next section, network policies are disabled automatically as part of the creation process
94
+
When you use the Azure portal to create a private endpoint, as shown in the next section, network policies are disabled automatically as part of the creation process.
93
95
94
96
### Create private endpoint - portal
95
97
98
+
You can create a private endpoint for your API Management instance in the Azure portal.
99
+
100
+
#### [Classic](#tab/classic)
101
+
102
+
In the classic API Management tiers, you can create a private endpoint when you create the instance. In an existing instance, use the instance's **Network** blade in the Azure portal.
103
+
96
104
1. Navigate to your API Management service in the [Azure portal](https://portal.azure.com/).
97
105
98
106
1. In the left-hand menu, under **Deployment + infrastructure**, select **Network**.
@@ -122,9 +130,12 @@ When you use the Azure portal to create a private endpoint, as shown in the next
122
130
123
131
:::image type="content" source="media/private-endpoint/create-private-endpoint.png" alt-text="Screenshot showing settings to create a private endpoint in the Azure portal.":::
124
132
133
+
> [!IMPORTANT]
134
+
> Only the **Gateway** sub-resource is supported for API Management. Other sub-resources aren't supported.
135
+
125
136
1. Select the **Next: Virtual Network** button at the bottom of the screen.
126
137
127
-
1. In **Networking**, enter or select this information:
138
+
1. In **Virtual Network**, enter or select this information:
128
139
129
140
| Setting | Value |
130
141
| ------- | ----- |
@@ -146,9 +157,7 @@ When you use the Azure portal to create a private endpoint, as shown in the next
146
157
147
158
1. Select the **Next: Tabs** button at the bottom of the screen. If you desire, enter tags to organize your Azure resources.
148
159
149
-
1. Select the **Next: Review + create** button at the bottom of the screen.
150
-
151
-
1. Select **Create**.
160
+
1. Select the **Next: Review + create** button at the bottom of the screen. Select **Create**.
152
161
153
162
### List private endpoint connections to the instance
154
163
@@ -168,14 +177,87 @@ If you have sufficient permissions, approve a private endpoint connection on the
168
177
169
178
You can also use the API Management [Private Endpoint Connection - Create Or Update](/rest/api/apimanagement/private-endpoint-connection/create-or-update) REST API to approve pending private endpoint connections.
170
179
171
-
### Optionally disable public network access
180
+
#### [Standard v2](#tab/v2)
181
+
182
+
> [!NOTE]
183
+
> * Currently you can't set up a private endpoint when creating a Standard v2 instance or using the instances's **Network** blade in the Azure portal.
184
+
> * As shown in this article, you must create and manage private endpoint resources separately from an API Management Standard v2 instance.
185
+
186
+
1. In the [Azure portal](https://portal.azure.com/), go to the **Private Link Center**.
187
+
188
+
1. Select **Private endpoints** > **+ Create**.
189
+
190
+
1. In the **Basics** tab of **Create a private endpoint**, enter or select the following information:
191
+
192
+
| Setting | Value |
193
+
| ------- | ----- |
194
+
|**Project details**||
195
+
| Subscription | Select your subscription. |
196
+
| Resource group | Select an existing resource group, or create a new one. It must be in the same region as your virtual network.|
197
+
|**Instance details**||
198
+
| Name | Enter a name for the endpoint such as *myPrivateEndpoint*. |
199
+
| Network Interface Name | Enter a name for the network interface, such as *myInterface*|
200
+
| Region | Select a location for the private endpoint. It must be in the same region as your virtual network. It may differ from the region where your API Management instance is hosted. |
201
+
202
+
1. Select the **Next: Resource** button at the bottom of the screen.
203
+
204
+
1. In **Resource**, enter or select this information:
205
+
206
+
| Setting | Value |
207
+
| ------- | ----- |
208
+
| Subscription | Your subscription is selected. |
209
+
| Resource type | Select **Microsoft.ApiManagement/service**. |
210
+
| Resource | Select your API Management Standard v2 instance. |
211
+
| Target sub-resource | Select **Gateway**. |
212
+
213
+
:::image type="content" source="media/private-endpoint/create-private-endpoint.png" alt-text="Screenshot showing settings to create a private endpoint in the Azure portal.":::
214
+
215
+
> [!IMPORTANT]
216
+
> Only the **Gateway** sub-resource is supported for API Management. Other sub-resources aren't supported.
217
+
218
+
1. Select the **Next: Virtual Network** button at the bottom of the screen.
172
219
173
-
To optionally limit incoming traffic to the API Management instance only to private endpoints, disable public network access.
220
+
1. In **Virtual Network**, enter or select this information:
221
+
222
+
| Setting | Value |
223
+
| ------- | ----- |
224
+
| Virtual network | Select your virtual network. |
225
+
| Subnet | Select your subnet. |
226
+
| Network policy for private endpoints | Leave the default of **Disabled**. |
227
+
| Private IP configuration | In most cases, select **Dynamically allocate IP address.**|
228
+
| Application security group | Optionally select an [application security group](../virtual-network/application-security-groups.md). |
229
+
230
+
1. Select the **Next: DNS** button at the bottom of the screen.
231
+
232
+
1. In **Private DNS integration**, enter or select this information:
233
+
234
+
| Setting | Value |
235
+
| ------- | ----- |
236
+
| Integrate with private DNS zone | Leave the default of **Yes**. |
237
+
| Subscription | Select your subscription. |
238
+
| Resource group | Select your resource group. |
239
+
| Private DNS zones | The default value is displayed: **(new) privatelink.azure-api.net**.
240
+
241
+
1. Select the **Next: Tabs** button at the bottom of the screen. If you desire, enter tags to organize your Azure resources.
242
+
243
+
1. Select the **Next: Review + create** button at the bottom of the screen. Select **Create**.
244
+
245
+
### List private endpoint connections
246
+
247
+
After the private endpoint is created and the service updated, it appears in the list on the **Private endpoints** page in the **Private Link Center**.
248
+
249
+
Confirm that the endpoint's **Connection status** is **Approved**.
250
+
251
+
---
252
+
253
+
## Optionally disable public network access
254
+
255
+
To optionally limit incoming traffic to the API Management instance only to private endpoints, disable the public network access property.
174
256
175
257
> [!NOTE]
176
-
> Public network access can only be disabled in API Management instances configured with a private endpoint, not with other networking configurations such as VNet injection.
258
+
> Public network access can only be disabled in API Management instances configured with a private endpoint, not with other networking configurations.
177
259
178
-
To disable public network access using the Azure CLI, run the following [az apim update](/cli/azure/apim#az-apim-update) command, substituting the names of your API Management instance and resource group:
260
+
To disable the public network access property using the Azure CLI, run the following [az apim update](/cli/azure/apim#az-apim-update) command, substituting the names of your API Management instance and resource group:
179
261
180
262
```azurecli
181
263
az apim update --name my-apim-service --resource-group my-resource-group --public-network-access false
@@ -187,6 +269,8 @@ You can also use the [API Management Service - Update](/rest/api/apimanagement/a
187
269
188
270
After the private endpoint is created, confirm its DNS settings in the portal:
189
271
272
+
#### [Classic](#tab/classic)
273
+
190
274
1. Navigate to your API Management service in the [Azure portal](https://portal.azure.com/).
191
275
192
276
1. In the left-hand menu, under **Deployment + infrastructure**, select **Network** > **Inbound private endpoint connections**, and select the private endpoint you created.
@@ -195,14 +279,25 @@ After the private endpoint is created, confirm its DNS settings in the portal:
195
279
196
280
1. Review the DNS records and IP address of the private endpoint. The IP address is a private address in the address space of the subnet where the private endpoint is configured.
197
281
282
+
283
+
#### [Standard v2](#tab/v2)
284
+
285
+
1. In the **Private Link Center**, select **Private endpoints** and then the name of your private endpoint.
286
+
287
+
1. In the left-hand navigation, under **Settings**, select **DNS configuration**.
288
+
289
+
1. Review the DNS records and IP address of the private endpoint. The IP address is a private address in the address space of the subnet where the private endpoint is configured.
290
+
291
+
---
292
+
198
293
### Test in virtual network
199
294
200
295
Connect to a virtual machine you set up in the virtual network.
201
296
202
297
Run a utility such as `nslookup` or `dig` to look up the IP address of your default Gateway endpoint over Private Link. For example:
Output should include the private IP address associated with the private endpoint.
@@ -214,7 +309,7 @@ API calls initiated within the virtual network to the default Gateway endpoint s
214
309
From outside the private endpoint path, attempt to call the API Management instance's default Gateway endpoint. If public access is disabled, output includes an error with status code `403` and a message similar to:
215
310
216
311
```
217
-
Request originated from client public IP address xxx.xxx.xxx.xxx, public network access on this 'Microsoft.ApiManagement/service/my-apim-service' is disabled.
312
+
Request originated from client public IP address 192.0.2.12, public network access on this 'Microsoft.ApiManagement/service/my-apim-service' is disabled.
218
313
219
314
To connect to 'Microsoft.ApiManagement/service/my-apim-service', please use the Private Endpoint from inside your virtual network.
220
315
```
@@ -225,5 +320,5 @@ To connect to 'Microsoft.ApiManagement/service/my-apim-service', please use the
225
320
* Learn more about [private endpoints](../private-link/private-endpoint-overview.md) and [Private Link](../private-link/private-link-overview.md), including [Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
* Use a [Resource Manager template](https://azure.microsoft.com/resources/templates/api-management-private-endpoint/) to create an API Management instance and a private endpoint with private DNS integration.
229
-
323
+
* Use a [Resource Manager template](https://azure.microsoft.com/resources/templates/api-management-private-endpoint/) to create a classic API Management instance and a private endpoint with private DNS integration.
324
+
*[Connect Azure Front Door Premium to an Azure API Management with Private Link (Preview)](../frontdoor/standard-premium/how-to-enable-private-link-apim.md).
Copy file name to clipboardExpand all lines: articles/api-management/v2-service-tiers-overview.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,6 +51,8 @@ The latest capabilities of the v2 tiers are supported in API Management API vers
51
51
52
52
***Standard v2** and **Premium v2** support **virtual network integration** to allow your API Management instance to reach API backends that are isolated in a single connected virtual network. The API Management gateway, management plane, and developer portal remain publicly accessible from the internet. The virtual network must be in the same region and subscription as the API Management instance. [Learn more](integrate-vnet-outbound.md).
53
53
54
+
In preview, *Standard v2* also supports inbound [private endpoint connections](private-endpoint.md) to the API Management gateway.
55
+
54
56
***Premium v2** also supports simplified **virtual network injection** for complete isolation of inbound and outbound gateway traffic without requiring network security group rules, route tables, or service endpoints. The virtual network must be in the same region and subscription as the API Management instance. [Learn more](inject-vnet-v2.md).
55
57
56
58
### Supported regions
@@ -77,7 +79,6 @@ The following API Management capabilities are currently unavailable in the v2 ti
77
79
* Capacity metric - *replaced by CPU Percentage of Gateway and Memory Percentage of Gateway metrics*
78
80
* Built-in analytics - *replaced by Azure Monitor-based dashboard*
0 commit comments