An Azure service that provides a hybrid, multi-cloud management platform for APIs.
Hi Alon, thanks for the detailed breakdown, you've already ruled out the most common culprits. Here are the specific things to check that go beyond portalsettings/signup and identity provider credentials:
- Check
portalsettings/delegation
This is separate fromportalsettings/signupand is the most overlooked cause of "User Registration Not Supported." APIM has a delegation settings block underportalsettings/delegationwith auserRegistration.enabledproperty. If this is set totruein UAT (perhaps from a past pipeline experiment or manual test), APIM will try to forward user registration to an external delegation URL. If that URL is absent, broken, or not reachable in UAT, the portal surfaces exactly this 400 error. Compare the delegation settings across environments via REST or CLI:
You're looking for:az rest --method GET \ --url "https://management.azure.com/subscriptions/{sub}/resourceGroups/{rg}/providers/Microsoft.ApiManagement/service/{apim}/portalsettings/delegation?api-version=2024-05-01"
If UAT has{ "properties": { "userRegistration": { "enabled": false }, "subscriptions": { "enabled": false }, "url": null } }userRegistration.enabled: trueand/or a stale URL, that's your issue. Set it tofalse(or fix the delegation endpoint) and republish the portal. - Verify the Entra ID identity provider is actually saved and active in UAT
Even though credentials are valid, confirm the identity provider is in a healthy state in UAT specifically:
Cross-check the response with a working environment. Pay attention to theaz rest --method GET \ --url "https://management.azure.com/subscriptions/{sub}/resourceGroups/{rg}/providers/Microsoft.ApiManagement/service/{apim}/identityProviders/aad?api-version=2024-05-01"clientId,signinTenant, andallowedTenantsfields - a mismatched tenant domain (e.g., an unverified domain vs. the.onmicrosoft.comcanonical name) can break user creation even if authentication succeeds. - Confirm MSAL migration was applied to UAT
If you use Microsoft Entra ID identity providers, you need to update the identity provider configuration to use the Microsoft Authentication Library (MSAL), following the September 2025 breaking change. If your pipeline deployed the UAT identity provider config before that migration was applied, UAT may still be on the old ADAL client library while your other environments were updated. In the portal, go to Developer portal → Identities → your Entra ID provider and check that the Client library field is set to MSAL, not ADAL. - Republish the developer portal after any configuration change
After you configure an identity provider (for example, Microsoft Entra ID), you need to republish the portal for the changes to take effect. Most configuration changes (for example, VNet, sign-in, product terms) require republishing the portal. This applies even to pipeline-deployed config - if the portal content was last published before the identity provider config was pushed, the portal is still serving stale behavior. - Verify the Redirect URI in the shared app registration
Since UAT shares an app registration with another APIM instance, confirm that the UAT developer portal's callback URL is registered under Authentication → Redirect URIs in the Entra app:
https://{uat-apim-name}.developer.azure-api.net/signin-aad
If it's missing (and only the other instance's URL is registered), authentication will succeed but the subsequent user-creation call can fail depending on how the token is validated server-side.
Please check above and let me know in comments if it works or any other issues.
Note: This response was drafted with the help of AI system.