Identity management
IM-1: Use centralized identity and authentication system
Feature: Azure AD Authentication Required for Data Plane Access
Description: Service supports using Azure AD authentication for data plane access.
Configuration Guidance: Use Azure Active Directory (Azure AD) as the default authentication method for API Management where possible.
- Configure your Azure API Management Developer Portal to authenticate developer accounts by using Azure AD.
- Configure your Azure API Management instance to protect your APIs by using the OAuth 2.0 protocol with Azure AD.
Feature: Local Authentication Methods for Data Plane Access
Description: Local authentications methods supported for data plane access, such as a local username and password.
Feature notes: Avoid the usage of local authentication methods or accounts, these should be disabled wherever possible. Instead use Azure AD to authenticate where possible.
Configuration Guidance: Restrict the use of local authentication methods for data plane access, maintain inventory of API Management user accounts and reconcile access as needed. In API Management, developers are the consumers of the APIs that exposed with API Management. By default, newly created developer accounts are Active, and associated with the Developers group. Developer accounts that are in an active state can be used to access all of the APIs for which they have subscriptions.
Also, Azure API Management subscriptions are one means of securing access to APIs and come with a pair of generated subscription keys which support rotation.
Instead of using other auth methods, where possible use Azure Active Directory (Azure AD) as the default authentication method to control your data plane access.
IM-3: Manage application identities securely and automatically
Feature: Managed Identities
Description: Data plane actions support authentication using managed identities.
Configuration Guidance: Use a Managed Service Identity generated by Azure Active Directory (Azure AD) to allow your API Management instance to easily and securely access other Azure AD-protected resources, such as Azure Key Vault instead of using service principals. Managed identity credentials are fully managed, rotated, and protected by the platform, avoiding hard-coded credentials in source code or configuration files.
Feature: Service Principals
Description: Data plane supports authentication using service principals.
Configuration Guidance: There's no current Microsoft guidance for this feature configuration. Please review and determine if your organization wants to configure this security feature.
IM-5: Use single sign-on (SSO) for application access
Other guidance for IM-5: Azure API Management can be configured to leverage Azure Active Directory (Azure AD) as an identity provider for authenticating users on the Developer Portal in order to benefit from the SSO capabilities offered by Azure AD. Once configured, new Developer Portal users can choose to follow the out-of-the-box sign-up process by first authenticating through Azure AD and then completing the sign-up process on the portal once authenticated.
Alternatively, the sign-in/sign-up process can be further customized through delegation. Delegation allows you to use your existing website for handling developer sign in/sign up and subscription to products, as opposed to using the built-in functionality in the developer portal. It enables your website to own the user data and perform the validation of these steps in a custom way.
IM-7: Restrict resource access based on conditions
Features: Conditional Access for Data Plane
Description: Data plane access can be controlled using Azure AD Conditional Access Policies.
Configuration Guidance: This feature isn't supported to secure this service.
IM-8: Restrict the exposure of credential and secrets
Feature: Service Credential and Secrets Support Integration and Storage in Azure Key Vault
Description: Data plane supports native use of Azure Key Vault for credential and secrets store.
Configuration Guidance: Set up integration of API Management with Azure Key Vault. Ensure that secrets for API Management (Named values) are stored an Azure Key Vault so they can be securely accessed and updated.
Comments
Post a Comment