Skip to content

Commit f036910

Browse files
Merge pull request #307300 from MicrosoftDocs/main
Auto Publish – main to live - 2025-10-23 17:00 UTC
2 parents 3a4baa0 + f88ff2c commit f036910

File tree

87 files changed

+439
-233
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

87 files changed

+439
-233
lines changed

articles/api-management/api-management-howto-app-insights.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ You can easily integrate Azure Application Insights with Azure API Management. A
4545

4646
* If you enable a user-assigned managed identity, take note of the identity's **Client ID**.
4747

48-
1. Assign the identity the **Monitoring Metrics Publisher** role, scoped to the Application Insights resource. To assign the role, use the [Azure portal](../role-based-access-control/role-assignments-portal.yml) or other Azure tools.
48+
1. Assign the identity the **Monitoring Metrics Publisher** role, scoped to the Application Insights resource. To assign the role, use the [Azure portal](/azure/role-based-access-control/role-assignments-portal) or other Azure tools.
4949

5050
## Scenario overview
5151

articles/api-management/api-management-howto-disaster-recovery-backup-restore.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Azure generates two 512-bit storage account access keys for each storage account
6565

6666
* If you enable a user-assigned managed identity, take note of the identity's **Client ID**.
6767
* If you will back up and restore to different API Management instances, enable a managed identity in both the source and target instances.
68-
1. Assign the identity the **Storage Blob Data Contributor** role, scoped to the storage account used for backup and restore. To assign the role, use the [Azure portal](../role-based-access-control/role-assignments-portal.yml) or other Azure tools.
68+
1. Assign the identity the **Storage Blob Data Contributor** role, scoped to the storage account used for backup and restore. To assign the role, use the [Azure portal](/azure/role-based-access-control/role-assignments-portal) or other Azure tools.
6969

7070

7171
## Back up an API Management service

articles/api-management/api-management-howto-log-event-hubs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ To log events to the event hub, you need to configure credentials for access fro
4646

4747
* If you enable a user-assigned managed identity, take note of the identity's **Object ID**.
4848

49-
1. Assign the identity the **Azure Event Hubs Data sender** role, scoped to the Event Hubs namespace or to the event hub used for logging. To assign the role, use the [Azure portal](../role-based-access-control/role-assignments-portal.yml) or another Azure tool.
49+
1. Assign the identity the **Azure Event Hubs Data sender** role, scoped to the Event Hubs namespace or to the event hub used for logging. To assign the role, use the [Azure portal](/azure/role-based-access-control/role-assignments-portal) or another Azure tool.
5050

5151

5252
### Option 2: Configure an Event Hubs connection string

articles/api-management/api-management-howto-send-service-bus.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ To send messages to the service bus, you need to configure a managed identity fo
5555

5656
* If you enable a user-assigned managed identity, take note of the identity's **Client ID**.
5757

58-
1. Assign the identity the **Azure Service Bus Data Sender** role, scoped to the service bus. To assign the role, use the [Azure portal](../role-based-access-control/role-assignments-portal.yml) or other Azure tools.
58+
1. Assign the identity the **Azure Service Bus Data Sender** role, scoped to the service bus. To assign the role, use the [Azure portal](/azure/role-based-access-control/role-assignments-portal) or other Azure tools.
5959

6060
## Configure send-service-bus-message policy
6161

articles/api-management/api-management-role-based-access-control.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Azure API Management relies on Azure role-based access control (Azure RBAC) to e
2323

2424
API Management currently provides three built-in service roles. These roles can be assigned at different scopes, including subscription, resource group, and individual API Management instance. For instance, if you assign the "API Management Service Reader" role to a user at the resource-group level, then the user has read access to all API Management instances inside the resource group.
2525

26-
The following table provides brief descriptions of the built-in roles. You can assign these roles by using the Azure portal or other tools, including Azure [PowerShell](../role-based-access-control/role-assignments-powershell.md), [Azure CLI](../role-based-access-control/role-assignments-cli.md), and [REST API](../role-based-access-control/role-assignments-rest.md). For details about how to assign built-in roles, see [Assign Azure roles to manage access to your Azure subscription resources](../role-based-access-control/role-assignments-portal.yml).
26+
The following table provides brief descriptions of the built-in roles. You can assign these roles by using the Azure portal or other tools, including Azure [PowerShell](../role-based-access-control/role-assignments-powershell.md), [Azure CLI](../role-based-access-control/role-assignments-cli.md), and [REST API](../role-based-access-control/role-assignments-rest.md). For details about how to assign built-in roles, see [Assign Azure roles to manage access to your Azure subscription resources](/azure/role-based-access-control/role-assignments-portal).
2727

2828
| Role | Read access<sup>[1]</sup> | Write access<sup>[2]</sup> | Service creation, deletion, scaling, VPN, and custom domain configuration | Access to the legacy publisher portal | Description
2929
| ------------- | ---- | ---- | ---- | ---- | ----
@@ -87,6 +87,6 @@ The [Azure Resource Manager resource provider operations](../role-based-access-c
8787

8888
To learn more about role-based access control in Azure, see the following articles:
8989
* [Get started with access management in the Azure portal](../role-based-access-control/overview.md)
90-
* [Assign Azure roles to manage access to your Azure subscription resources](../role-based-access-control/role-assignments-portal.yml)
90+
* [Assign Azure roles to manage access to your Azure subscription resources](/azure/role-based-access-control/role-assignments-portal)
9191
* [Custom roles in Azure RBAC](../role-based-access-control/custom-roles.md)
9292
* [Azure Resource Manager resource provider operations](../role-based-access-control/resource-provider-operations.md#microsoftapimanagement)

0 commit comments

Comments
 (0)