I have a backend API that is hosted in Azure app service. I want to use Azure API management as the front end to this backend API and have successfully configured this in Azure. I have configured API management to use OAuth when accessing this backend API which works when clients access the API through the Azure API management endpoints, but how do I prevent people from accessing the backend API endpoints directly so that only calls from the API management endpoints are allowed?
相关问题
- running headless chrome in an microsoft azure web
- Debugging two Azure Functions projects locally
- How to attach Public Static IP to Azure App Servic
- How do I automatically install New Relic extension
- Scripting WebApp VNET integration with Azure Power
相关文章
- How to add simple authentication to azure mobile/w
- how to get 'code' for getting access_token
- VNet Integration For Azure Web App and Azure SQL S
- Azure App service can't start because it can
- “Create App Service” Dialogue not retrieving info,
- Azure API Management Import API always says: API w
- Azure API Management > CORS and POST
- ThreadPool SetMinThreads - the impact of setting i
There are a few options of various levels of security:
I've personally used IP restrictions to great success. APIM is given a static IP, so you can setup an IP restriction in the "root API" that allows only the APIM calls. This results in a 403 if you call the root API directly.
If you don't want a 403 coming from the root API, you can use policies to change that, or you can setup authentication at the APIM level and you'll get a 401 before even hitting that 403.