Skip to content

Commit 1b4d22b

Browse files
committed
Merge branch 'main' of https://github.com/microsoftdocs/azure-docs-pr into dtl3
2 parents d9dc983 + e76fe58 commit 1b4d22b

File tree

252 files changed

+2201
-1816
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

252 files changed

+2201
-1816
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5450,6 +5450,11 @@
54505450
"redirect_url": "/azure/virtual-wan/virtual-wan-about",
54515451
"redirect_document_id": false
54525452
},
5453+
{
5454+
"source_path_from_root": "/articles/virtual-wan/azure-vpn-client-optional-configurations-windows.md",
5455+
"redirect_url": "/azure/virtual-wan/azure-vpn-client-optional-configurations",
5456+
"redirect_document_id": false
5457+
},
54535458
{
54545459
"source_path_from_root": "/articles/virtual-wan/openvpn-azure-ad-client.md",
54555460
"redirect_url": "/azure/virtual-wan/point-to-site-entra-vpn-client-windows",

articles/active-directory-b2c/openid-connect-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ The technical profile also returns claims that aren't returned by the identity p
8989
| HttpBinding | No | The expected HTTP binding to the access token and claims token endpoints. Possible values: `GET` or `POST`. |
9090
| ValidTokenIssuerPrefixes | No | A key that can be used to sign in to each of the tenants when using a multi-tenant identity provider such as Microsoft Entra ID. |
9191
| UsePolicyInRedirectUri | No | Indicates whether to use a policy when constructing the redirect URI. When you configure your application in the identity provider, you need to specify the redirect URI. The redirect URI points to Azure AD B2C, `https://{your-tenant-name}.b2clogin.com/{your-tenant-name}.onmicrosoft.com/oauth2/authresp`. If you specify `true`, you need to add a redirect URI for each policy you use. For example: `https://{your-tenant-name}.b2clogin.com/{your-tenant-name}.onmicrosoft.com/{policy-name}/oauth2/authresp`. |
92-
| MarkAsFailureOnStatusCode5xx | No | Indicates whether a request to an external service should be marked as a failure if the Http status code is in the 5xx range. The default is `false`. |
92+
| MarkAsFailureOnStatusCode5xx | No | Indicates whether a request to an external service should be marked as a failure if the HTTP status code is in the 5xx range. The default is `false`. |
9393
| DiscoverMetadataByTokenIssuer | No | Indicates whether the OIDC metadata should be discovered by using the issuer in the JWT.If you need to build the metadata endpoint URL based on Issuer, set this to `true`.|
9494
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
9595
|token_endpoint_auth_method| No | Specifies how Azure AD B2C sends the authentication header to the token endpoint. Possible values: `client_secret_post` (default), and `client_secret_basic`, `private_key_jwt`. For more information, see [OpenID Connect client authentication section](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication). |

articles/api-center/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,12 +68,14 @@
6868
href: set-up-notification-workflow.md
6969
- name: API discovery and consumption
7070
items:
71+
- name: Enable API Center portal
72+
href: set-up-api-center-portal.md
73+
- name: Self-host Azure API Center portal
74+
href: self-host-api-center-portal.md
7175
- name: Discover and consume APIs - VS Code extension
7276
href: discover-apis-vscode-extension.md
7377
- name: Enable platform API catalog - VS Code extension
7478
href: enable-platform-api-catalog-vscode-extension.md
75-
- name: Self-host Azure API Center portal
76-
href: enable-api-center-portal.md
7779
- name: Check API calls use minimal permissions with Dev Proxy
7880
href: check-minimal-api-permissions-dev-proxy.md
7981
- name: API center management and operations

articles/api-center/enable-api-center-portal.md

Lines changed: 0 additions & 194 deletions
This file was deleted.
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: Include file
3+
description: Include file
4+
services: api-center
5+
author: dlepow
6+
7+
ms.service: azure-api-center
8+
ms.topic: include
9+
ms.date: 03/04/2025
10+
ms.author: danlep
11+
ms.custom: Include file
12+
---
13+
14+
## Create Microsoft Entra app registration
15+
16+
First configure an app registration in your Microsoft Entra ID tenant. The app registration enables the API Center portal to access data from your API center on behalf of a signed-in user.
17+
18+
1. In the [Azure portal](https://portal.azure.com), navigate to **Microsoft Entra ID** > **App registrations**.
19+
1. Select **+ New registration**.
20+
1. On the **Register an application** page, set the values as follows:
21+
22+
1. Set **Name** to a meaningful name such as *api-center-portal*
23+
1. Under **Supported account types**, select **Accounts in this organizational directory (Single tenant)**.
24+
1. In **Redirect URI**, select **Single-page application (SPA)** and set the URI.
25+
Enter the URI of your API Center portal deployment, in the following form: `https://<service-name>.portal.<location>.azure-api-center.ms`. Replace `<service name>` and `<location>` with the name of your API center and the location where it's deployed, Example: `https://myapicenter.portal.eastus.azure-api-center.ms`.
26+
1. Select **Register**.
27+
1. On the **Overview** page, copy the **Application (client) ID**. You set this value when you publish the portal.
28+
29+
1. On the **API permissions** page, select **+ Add a permission**.
30+
1. On the **Request API permissions** page, select the **APIs my organization uses** tab. Search for and select **Azure API Center**. You can also search for and select application ID `c3ca1a77-7a87-4dba-b8f8-eea115ae4573`.
31+
1. On the **Request permissions** page, select **user_impersonation**.
32+
1. Select **Add permissions**.
33+
34+
The Azure API Center permissions appear under **Configured permissions**.
35+
36+
:::image type="content" source="media/api-center-portal-app-registration/configure-app-permissions.png" alt-text="Screenshot of required permissions in Microsoft Entra ID app registration in the portal." lightbox="media/api-center-portal-app-registration/configure-app-permissions.png":::
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: Include file
3+
description: Include file
4+
services: api-center
5+
author: dlepow
6+
7+
ms.service: azure-api-center
8+
ms.topic: include
9+
ms.date: 03/05/2025
10+
ms.author: danlep
11+
ms.custom: Include file
12+
---
13+
14+
## API Management and API Center portals
15+
16+
The [Azure API Management](../../api-management/api-management-key-concepts.md) and [Azure API Center](../overview.md) services both provide portals for developers to discover and consume APIs:
17+
18+
* The *API Management developer portal* allows users to find managed APIs, learn how to use them, request access, and test them.
19+
* The *API Center portal* (preview) is a multi-gateway portal where users can discover and filter the organization's complete API inventory.
20+
21+
While the two portals share some features, they also have distinct differences. The following table compares current capabilities to help determine which portal to use. Some organizations may prefer one portal, while others may need both.
22+
23+
| Feature | API Management developer portal | API Center portal (preview) |
24+
| --- | --- | --- |
25+
| Search and filter API inventory | API Management instance only | All APIs<sup>1</sup> |
26+
| View API details and definitions | ✔️ | ✔️ |
27+
| View API documentation | ✔️ | ✔️ |
28+
| Customize with branding | ✔️ | Name only |
29+
| Integrate with Microsoft Entra ID | ✔️ | ✔️ |
30+
| Add custom widgets | ✔️ ||
31+
| Customize with WordPress | ✔️ ||
32+
| Test APIs in test console | ✔️ ||
33+
| Subscribe to APIs | ✔️ ||
34+
| View API usage analytics | ✔️ ||
35+
36+
<sup>1</sup> The API Center portal can contain all APIs in your organization, including those managed in Azure API Management and other platforms, as well as unmanaged APIs and APIs under development.
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
title: Include file
3+
description: Include file
4+
services: api-center
5+
author: dlepow
6+
7+
ms.service: azure-api-center
8+
ms.topic: include
9+
ms.date: 03/04/2025
10+
ms.author: danlep
11+
ms.custom: Include file
12+
---
13+
14+
## Prerequisites
15+
16+
* An API center in your Azure subscription. If you haven't created one already, see [Quickstart: Create your API center](../set-up-api-center.md).
17+
18+
* Permissions to create an app registration in a Microsoft Entra tenant associated with your Azure subscription, and permissions to grant access to data in your API center.

0 commit comments

Comments
 (0)