API Management authorizations (preview) simplify the process of managing authorization tokens to OAuth 2.0 backend services. By configuring any of the supported identity providers and creating an authorization using the standardized OAuth 2.0 flow, API Management can retrieve and refresh access tokens to be used inside of API management or sent back to a client. This feature enables APIs to be exposed with or without a subscription key, and the authorization to the backend service uses OAuth 2.0.
Some example scenarios that will be possible through this feature are:
- Citizen/low code developers using Power Apps or Power Automate can easily connect to SaaS providers that are using OAuth 2.0.
- Unattended scenarios such as an Azure function using a timer trigger can utilize this feature to connect to a backend API using OAuth 2.0.
- A marketing team in an enterprise company could use the same authorization for interacting with a social media platform using OAuth 2.0.
- Exposing APIs in API Management as a custom connector in Logic Apps where the backend service requires OAuth 2.0 flow.
- On behalf of a scenario where a service such as Dropbox or any other service protected by OAuth 2.0 flow is used by multiple clients.
- Connect to different services that require OAuth 2.0 authorization using synthetic GraphQL in API Management.
- Enterprise Application Integration (EAI) patterns using service-to-service authorization can use the client credentials grant type against backend APIs that use OAuth 2.0.
- Single-page applications that only want to retrieve an access token to be used in a client's SDK against an API using OAuth 2.0.
The feature consists of two parts, management and runtime:
The management part takes care of configuring identity providers, enabling the consent flow for the identity provider, and managing access to the authorizations.
The runtime part uses the
get-authorization-contextpolicy to fetch and store access and refresh tokens. When a call comes into API Management, and the
get-authorization-contextpolicy is executed, it will first validate if the existing authorization token is valid. If the authorization token has expired, the refresh token is used to try to fetch a new authorization and refresh token from the configured identity provider. If the call to the backend provider is successful, the new authorization token will be used, and both the authorization token and refresh token will be stored encrypted.
During the policy execution, access to the tokens is also validated using access policies.
- Managed system-assigned identity must be enabled for the API Management instance.
- API Management instance must have outbound connectivity to internet on port
For public preview the following limitations exist:
- Authorizations feature will be available in the Consumption tier in the coming weeks.
- Authorizations feature is not supported in the following regions: swedencentral, australiacentral, australiacentral2, jioindiacentral.
- Supported identity providers: Azure AD, DropBox, Generic OAuth 2.0, GitHub, Google, LinkedIn, Spotify
- Maximum configured number of authorization providers per API Management instance: 50
- Maximum configured number of authorizations per authorization provider: 500
- Maximum configured number of access policies per authorization: 100
- Maximum requests per minute per authorization: 100
- Authorization code PKCE flow with code challenge isn't supported.
- Authorizations feature isn't supported on self-hosted gateways.
- API documentation is not available yet. Please see this GitHub repository with samples.
Authorization provider configuration includes which identity provider and grant type are used. Each identity provider requires different configurations.
- An authorization provider configuration can only have one grant type.
- One authorization provider configuration can have multiple authorizations.
The following identity providers are supported for public preview:
- Azure AD, DropBox, Generic OAuth 2.0, GitHub, Google, LinkedIn, Spotify
With the Generic OAuth 2.0 provider, other identity providers that support the standards of OAuth 2.0 flow can be used.
To use an authorization provider, at least one authorization is required. The process of configuring an authorization differs based on the used grant type. Each authorization provider configuration only supports one grant type. For example, if you want to configure Azure AD to use both grant types, two authorization provider configurations are needed.
Authorization code grant type
Authorization code grant type is bound to a user context, meaning a user needs to consent to the authorization. As long as the refresh token is valid, API Management can retrieve new access and refresh tokens. If the refresh token becomes invalid, the user needs to reauthorize. All identity providers support authorization code. Read more about Authorization code grant type.
Client credentials grant type
Client credentials grant type isn't bound to a user and is often used in application-to-application scenarios. No consent is required for client credentials grant type, and the authorization doesn't become invalid. Read more about Client Credentials grant type.
Access policies determine which identities can use the authorization that the access policy is related to. The supported identities are managed identities, user identities, and service principals. The identities must belong to the same tenant as the API Management tenant.
- Managed identities - System- or user-assigned identity for the API Management instance that is being used.
- User identities - Users in the same tenant as the API Management instance.
- Service principals - Applications in the same Azure AD tenant as the API Management instance.
Process flow for creating authorizations
The following image shows the process flow for creating an authorization in API Management using the grant type authorization code. For public preview no API documentation is available.
- Client sends a request to create an authorization provider.
- Authorization provider is created, and a response is sent back.
- Client sends a request to create an authorization.
- Authorization is created, and a response is sent back with the information that the authorization is not "connected".
- Client sends a request to retrieve a login URL to start the OAuth 2.0 consent at the identity provider. The request includes a post-redirect URL to be used in the last step.
- Response is returned with a login URL that should be used to start the consent flow.
- Client opens a browser with the login URL that was provided in the previous step. The browser is redirected to the identity provider OAuth 2.0 consent flow.
- After the consent is approved, the browser is redirected with an authorization code to the redirect URL configured at the identity provider.
- API Management uses the authorization code to fetch access and refresh tokens.
- API Management receives the tokens and encrypts them.
- API Management redirects to the provided URL from step 5.
Process flow for runtime
The following image shows the process flow to fetch and store authorization and refresh tokens based on a configured authorization. After the tokens have been retrieved a call is made to the backend API.
- Client sends request to API Management instance.
- The policy
get-authorization-contextchecks if the access token is valid for the current authorization.
- If the access token has expired but the refresh token is valid, API Management tries to fetch new access and refresh tokens from the configured identity provider.
- The identity provider returns both an access token and a refresh token, which are encrypted and saved to API Management.
- After the tokens have been retrieved, the access token is attached using the
set-headerpolicy as an authorization header to the outgoing request to the backend API.
- Response is returned to API Management.
- Response is returned to the client.
If acquiring the authorization context results in an error, the outcome depends on how the attribute
ignore-error is configured in the policy
get-authorization-context. If the value is set to
false (default), an error with
500 Internal Server Error will be returned. If the value is set to
true, the error will be ignored and execution will proceed with the context variable set to
If the value is set to
false, and the on-error section in the policy is configured, the error will be available in the property
context.LastError. By using the on-error section, the error that is sent back to the client can be adjusted. Errors from API Management can be caught using standard Azure alerts. Read more about handling errors in policies.
How can I provide feedback and influence the roadmap for this feature?
Please use this form to provide feedback.
How are the tokens stored in API Management?
The access token and other secrets (for example, client secrets) are encrypted with an envelope encryption and stored in an internal, multitenant storage. The data are encrypted with AES-128 using a key that is unique per data; those keys are encrypted asymmetrically with a master certificate stored in Azure Key Vault and rotated every month.
When are the access tokens refreshed?
When the policy
get-authorization-context is executed at runtime, API Management checks if the stored access token is valid. If the token has expired or is near expiry, API Management uses the refresh token to fetch a new access token and a new refresh token from the configured identity provider. If the refresh token has expired, an error is thrown, and the authorization needs to be reauthorized before it will work.
What happens if the client secret expires at the identity provider?
At runtime API Management can't fetch new tokens, and an error will occur.
If the authorization is of type authorization code, the client secret needs to be updated on authorization provider level.
If the authorization is of type client credentials, the client secret needs to be updated on authorizations level.
Is this feature supported using API Management running inside a VNet?
Yes, as long as API Management gateway has outbound internet connectivity on port
What happens when an authorization provider is deleted?
All underlying authorizations and access policies are also deleted.
Are the access tokens cached by API Management?
The access token is cached by the API management until 3 minutes before the token expiration time.
What grant types are supported?
For public preview, the Azure AD identity provider supports authorization code and client credentials.
The other identity providers support authorization code. After public preview, more identity providers and grant types will be added.
다음에 대한 사용자 의견 제출 및 보기