Skip to content

Commit 0fb6651

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into avesanRefresh
2 parents a77c04b + a166b48 commit 0fb6651

File tree

189 files changed

+7602
-1270
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

189 files changed

+7602
-1270
lines changed

articles/api-management/applications.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Protect Access to Product APIs with Microsoft Entra Application - Azure API Management
2+
title: Securely Access Products and APIs - Microsoft Entra Applications - Azure API Management
33
titleSuffix: Azure API Management
44
description: Configure OAuth 2.0 access to product APIs in Azure API Management with Microsoft Entra ID applications.
55
services: api-management
@@ -11,7 +11,7 @@ ms.date: 05/19/2025
1111
ms.author: danlep
1212
ms.custom:
1313
---
14-
# Secure product API access with Microsoft Entra applications
14+
# Securely access products and APIs with Microsoft Entra applications
1515

1616
[!INCLUDE [api-management-availability-premium-dev-standard-basic](../../includes/api-management-availability-premium-dev-standard-basic.md)]
1717

@@ -64,14 +64,14 @@ The following example uses the **Starter** product, but choose any published pro
6464
1. In the left menu, under **APIs**, select **Products**.
6565
1. Choose the product that you want to configure, such as the **Starter** product.
6666
1. In the left menu, under **Product**, select **Properties**.
67-
1. Enable the **Application based access** setting.
68-
1. Optionally, enable the **Requires subscription** setting. If you enable both application based access and a subscription requirement, the API Management gateway can accept either OAuth 2.0 authorization or a subscription key for access to the product's APIs.
67+
1. In the **Application based access** section, enable the **OAuth 2.0 token (most secure)** setting.
68+
1. Optionally, enable the **Subscription key** setting. If you enable both application based access and a subscription requirement, the API Management gateway can accept either an OAuth 2.0 token or a subscription key for access to the product's APIs.
6969
1. Select **Save**.
7070

7171
:::image type="content" source="media/applications/enable-application-based-access.png" alt-text="Screenshot of enabling application based access in the portal.":::
7272

7373
> [!TIP]
74-
> You can also enable the **Application based access** setting when creating a new product.
74+
> You can also enable the **OAuth 2.0 token** setting when creating a new product.
7575
7676
Enabling application based access creates a backend enterprise application in Microsoft Entra ID to represent the product. The backend application ID is displayed in the product's **Properties** page.
7777

42.4 KB
Loading
9.03 KB
Loading

articles/app-service/app-service-key-vault-references.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,6 +95,8 @@ If the secret version isn't specified in the reference, the app uses the latest
9595

9696
The delay is because App Service caches the values of the Key Vault references and refetches them every 24 hours. Any configuration change to the app causes an app restart and an immediate refetch of all referenced secrets.
9797

98+
To force resolution of your app's Key Vault references, make an authenticated POST request to the API endpoint `https://management.azure.com/[Resource ID]/config/configreferences/appsettings/refresh?api-version=2022-03-01`.
99+
98100
## <a name = "source-app-settings-from-key-vault"></a> Understand source app settings from Key Vault
99101

100102
To use a Key Vault reference, set the reference as the value of the setting. Your app can reference the secret through its key as normal. No code changes are required.

articles/app-service/includes/tutorial-sidecar/common-faqs.md

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,3 +18,29 @@ No. App Service routes internet requests only to the main container. For code-ba
1818

1919
For more information on configuring `IsMain`, see [Microsoft.Web sites/sitecontainers](/azure/templates/microsoft.web/sites/sitecontainers).
2020

21+
### How do I use volume mounts?
22+
23+
The Volume mounts feature enables you to share non-persistent files and directories between containers within your Web App.
24+
25+
:::image type="content" source="../../media/tutorial-custom-container-sidecar/configure-volume-mounts.png" alt-text="Screenshot showing a volume mount configuration for a sidecar container.":::
26+
27+
**Volume sub path:** This is a logical directory path that is automatically created, and is not referenced within the container. Containers that are configured with the same volume sub path can share files and directories with each other.
28+
29+
**Container mount path:** This corresponds to a directory path that you reference within the container. The container mount path is mapped to the volume sub path.
30+
31+
For example, suppose the following volume mounts are configured:
32+
33+
| Sidecar name | Volume sub path | Container mount path | Read-only |
34+
| ------------ | --------------- | -------------------- | --------- |
35+
| Container1 | /directory1/directory2 | /container1Vol | False |
36+
| Container2 | /directory1/directory2 | /container2Vol | True |
37+
| Container3 | /directory1/directory2/directory3 | /container3Vol | False |
38+
| Container4 | /directory4 | /container1Vol | False |
39+
40+
Based on these settings, the following conditions apply:
41+
- If Container1 creates **/container1Vol/myfile.txt**, Container2 can read the file via **/container2Vol/myfile.txt**.
42+
- If Container1 creates **/container1Vol/directory3/myfile.txt**, Container2 can read the file via **/container2Vol/directory3/myfile.txt**, and Container3 can read and write to the file via **/container3Vol/myfile.txt**.
43+
- Container4 does not share a volume mount in common with any of the other containers.
44+
45+
> [!Note]
46+
> For code-based Linux apps, the built-in Linux container cannot use volume mounts.
1.84 KB
Loading

articles/application-gateway/for-containers/prometheus-grafana.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Configure Application Gateway for Containers metrics to be sent to
44
services: application-gateway
55
author: greg-lindsay
66
ms.service: azure-appgw-for-containers
7-
ms.topic: article
7+
ms.topic: how-to
88
ms.date: 10/21/2024
99
ms.author: greglin
1010
---

articles/application-gateway/for-containers/siem-integration-with-sentinel.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Configure Application Gateway for Containers for SIEM integration w
44
services: application-gateway
55
author: greg-lindsay
66
ms.service: azure-appgw-for-containers
7-
ms.topic: article
7+
ms.topic: how-to
88
ms.date: 07/11/2024
99
ms.author: greglin
1010
---

articles/application-gateway/resource-health-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article is an overview of the resource health feature for Azur
44
services: application-gateway
55
author: greg-lindsay
66
ms.service: azure-application-gateway
7-
ms.topic: article
7+
ms.topic: overview
88
ms.date: 7/9/2019
99
ms.author: greglin
1010
---
@@ -56,4 +56,4 @@ The **Degraded** health status indicates your gateway has detected a loss in per
5656

5757
## Next steps
5858

59-
To learn about troubleshooting Application Gateway Web Application Firewall (WAF), see [Troubleshoot Web Application Firewall (WAF) for Azure Application Gateway](../web-application-firewall/ag/web-application-firewall-troubleshoot.md).
59+
To learn about troubleshooting Application Gateway Web Application Firewall (WAF), see [Troubleshoot Web Application Firewall (WAF) for Azure Application Gateway](../web-application-firewall/ag/web-application-firewall-troubleshoot.md).

articles/azure-app-configuration/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -166,6 +166,10 @@
166166
href: concept-soft-delete.md
167167
- name: Recover or purge deleted stores
168168
href: howto-recover-deleted-stores-in-azure-app-configuration.md
169+
- name: AI configuration
170+
items:
171+
- name: Overview
172+
href: concept-ai-configuration.md
169173
- name: Feature management
170174
items:
171175
- name: Overview

0 commit comments

Comments
 (0)