An Azure service that provides a hybrid, multi-cloud management platform for APIs.
Hi @Abhishek Bose ,
Thanks for reaching out to MicrosoftQ&A.
Your self-hosted gateway primarily needs outbound HTTPS (TCP 443) only to your APIM instance’s private endpoints plus a handful of Azure service endpoints for auth/telemetry.
Here’s how you can scope it down:
- Minimum required destinations
- <your-apim>.configuration.azure-api.net (config sync)
- <your-apim>.management.azure-api.net (status reporting & metrics)
- <your-apim>.gateway.azure-api.net (runtime metadata and token validation) Each of these will resolve to a private IP in your APIM VNet/subnet. You can lock your firewall to TCP 443 solely to those three IPs rather than opening the entire subnet.
- IP stability
- Those private IPs are “sticky” as long as you don’t delete/recreate the APIM instance, resize the subnet, or move the service to a different VNet. Normal updates or scaling operations won’t change them. If you need absolute certainty, you can periodically verify DNS→IP mapping or leverage Azure Resource Manager templates to pin the subnet.
- Other outbound endpoints to consider
- login.microsoftonline.com / login.windows.net (Azure AD token issuance)
- management.azure.com (if your gateway uses the ARM API for any management-plane calls)
- Azure Monitor/Application Insights ingestion (if you’ve hooked up App Insights – e.g. *.monitoring.azure.com or dc.applicationinsights.azure.com)
- Azure Key Vault (vault-name.vault.azure.net) if you’re fetching secrets/certs
- Azure Storage/*.core.windows.net if you’re writing any diagnostic blobs or using the cache store
Hope that helps!
References:
- Self-hosted gateway overview
- APIM network architecture
- Firewall and proxy requirements for Azure services
Hope this helps!
If the resolution was helpful, kindly take a moment to click on and click on Yes for was this answer helpful. And, if you have any further query do let us know.