Skip to content

Commit 21f9790

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into avesanRefresh
2 parents 894c655 + a9cf31d commit 21f9790

File tree

1,887 files changed

+11450
-8156
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,887 files changed

+11450
-8156
lines changed

.openpublishing.redirection.json

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,30 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/cloud-services/cloud-services-application-and-service-availability-faq.yml",
5+
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-application-and-service-availability-faq",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/cloud-services/cloud-services-configuration-and-management-faq.yml",
10+
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-configuration-and-management-faq",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/cloud-services/cloud-services-connectivity-and-networking-faq.yml",
15+
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-connectivity-and-networking-faq",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/cloud-services/cloud-services-deployment-faq.yml",
20+
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-deployment-faq",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/cloud-services/index.yml",
25+
"redirect_url": "/previous-versions/azure/cloud-services/index",
26+
"redirect_document_id": false
27+
},
328
{
429
"source_path": "articles/private-multi-access-edge-compute-mec/index.yml",
530
"redirect_url": "/previous-versions/azure/private-multi-access-edge-compute-mec/index",
@@ -6978,6 +7003,26 @@
69787003
"source_path": "articles/defender-for-iot/organizations/eiot-sensor.md",
69797004
"redirect_url": "/azure/defender-for-iot/organizations/concept-enterprise",
69807005
"redirect_document_id": false
7006+
},
7007+
{
7008+
"source_path": "articles/cyclecloud/release-notes/ccws/2024.09.18.md",
7009+
"redirect_url": "/azure/cyclecloud/release-notes/ccws/2024-09-18",
7010+
"redirect_document_id": false
7011+
},
7012+
{
7013+
"source_path": "articles/cyclecloud/release-notes/ccws/2024.11.08.md",
7014+
"redirect_url": "/azure/cyclecloud/release-notes/ccws/2024-11-08",
7015+
"redirect_document_id": false
7016+
},
7017+
{
7018+
"source_path": "articles/cyclecloud/release-notes/ccws/2024.12.18.md",
7019+
"redirect_url": "/azure/cyclecloud/release-notes/ccws/2024-12-18",
7020+
"redirect_document_id": false
7021+
},
7022+
{
7023+
"source_path": "articles/cyclecloud/release-notes/ccws/2025.02.06.md",
7024+
"redirect_url": "/azure/cyclecloud/release-notes/ccws/2025-02-06",
7025+
"redirect_document_id": false
69817026
}
69827027
]
69837028
}

articles/active-directory-b2c/policy-keys-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ If an Azure AD B2C keyset has multiple keys, only one of the keys is active at a
7575
- When the current date and time is greater than a key's activation date, Azure AD B2C activates the key and stop using the prior active key.
7676
- When the current key's expiration time has elapsed and the key container contains a new key with valid *nbf (not before)* and *exp (expiration)* times, the new key becomes active automatically. New tokens are signed with the newly active key. It's possible to keep an expired key published for token validation until disabled by an admin, but this must be requested by [filing a support request](/azure/active-directory-b2c/find-help-open-support-ticket).
7777

78-
- When the current key's expiration time has elapsed and the key container *doesn't* contain a new key with valid *not before* and *expiration* times, Azure AD B2C won't be able to use the expired key. Azure AD B2C raises an error message within a dependant component of your custom policy. To avoid this issue, you can create a default key without activation and expiration dates as a safety net.
78+
- When the current key's expiration time has elapsed and the key container *doesn't* contain a new key with valid *not before* and *expiration* times, Azure AD B2C won't be able to use the expired key. Azure AD B2C raises an error message within a dependent component of your custom policy. To avoid this issue, you can create a default key without activation and expiration dates as a safety net.
7979
- The key's endpoint (JWKS URI) of the OpenId Connect well-known configuration endpoint reflects the keys configured in the Key Container, when the Key is referenced in the [JwtIssuer Technical Profile](./jwt-issuer-technical-profile.md). An application using an OIDC library will automatically fetch this metadata to ensure it uses the correct keys to validate tokens. For more information, learn how to use [Microsoft Authentication Library](../active-directory/develop/msal-b2c-overview.md), which always fetches the latest token signing keys automatically.
8080

8181
:::image type="content" source="media/policy-keys-overview/key-rollover.png" alt-text="A diagram describing the process for key rollover in Azure AD B2C." lightbox="media/policy-keys-overview/key-rollover.png":::

articles/active-directory-b2c/service-limits.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,8 @@ zone_pivot_groups: b2c-policy-type
1414

1515

1616
#Customer intent: As an Azure AD B2C user, I want to understand the service limits and restrictions, so that I can ensure that my application stays within the allowed usage constraints and request limits.
17-
17+
ms.custom:
18+
- build-2025
1819
---
1920

2021
# Azure Active Directory B2C service limits and restrictions

articles/api-center/authorize-api-access.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure access to APIs in the Azure API Center inven
44
author: dlepow
55
ms.service: azure-api-center
66
ms.topic: how-to
7-
ms.date: 04/30/2025
7+
ms.date: 06/02/2025
88
ms.author: danlep
99
ms.custom:
1010
# Customer intent: As an API program manager, I want to store API authorization information in my API center and enable authorized users to test APIs in the API Center portal.
@@ -57,12 +57,12 @@ To manage the API key securely, store it in Azure Key Vault, and access the key
5757

5858
| **Setting** | **Description** |
5959
|-------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------|
60-
| **Title** | A name for the authorization. |
61-
| **Description** | Optional description for the authorization. |
60+
| **Title** | Enter a name for the authorization. |
61+
| **Description** | Optionally, enter a description for the authorization. |
6262
| **Security scheme** | Select **API Key**. |
63-
|**API key location** | How the key is presented in API requests. Available values are **Header** (request header) and **Query** (query parameter). |
64-
| **API key parameter name** | Name of the HTTP header or query parameter that contains the API key. Example: `x-api-key` |
65-
| **API key Key Vault secret reference** | Secret identifier of the API key in Azure Key Vault. Example: `https://<key-vault-name>.vault.azure.net/secrets/<secret-name>/<version>` |
63+
|**API key location** | Select how the key is presented in API requests. Available values are **Header** (request header) and **Query** (query parameter). |
64+
| **API key parameter name** | Enter the name of the HTTP header or query parameter that contains the API key. Example: `x-api-key` |
65+
| **API key Key Vault secret reference** | Click **Select** and select the subscription, key vault, and secret that you stored. Example: `https://<key-vault-name>.vault.azure.net/secrets/<secret-name>` |
6666

6767
1. Select **Create**.
6868

@@ -114,24 +114,24 @@ To manage the secret securely, store it in Azure Key Vault, and access the key v
114114
1. In the left menu, under **Governance**, select **Authorization (preview)** > **+ Add configuration**.
115115
1. In the **Add configuration** page, set the values as follows:
116116

117-
:::image type="content" source="media/authorize-api-access/configure-oauth.png" alt-text="Screenshot of configuring OAuth 2.0 in the portal.":::
117+
:::image type="content" source="media/authorize-api-access/configure-oauth.png" lightbox="media/authorize-api-access/configure-oauth.png" alt-text="Screenshot of configuring OAuth 2.0 in the portal.":::
118118

119119

120120
> [!NOTE]
121121
> Configure settings based on the app registration you created previously in your identity provider. If you're using Microsoft Entra ID, find the **Client ID** on the **Overview** page of the app registration, and find the URL endpoints on the **Overview** > **Endpoints** page.
122122
123123
| **Setting** | **Description** |
124124
|-------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------|
125-
| **Title** | A name for the authorization. |
126-
| **Description** | Optional description for the authorization. |
125+
| **Title** | Enter a name for the authorization. |
126+
| **Description** | Optionally, enter a description for the authorization. |
127127
| **Security scheme** | Select **OAuth2**. |
128-
| **Client ID** | Client ID (GUID) of the app that you created in your identity provider. |
129-
| **Client secret** | Secret identifier of the client secret in Azure Key Vault.<br/><br/>Example: `https://<key-vault-name>.vault.azure.net/secrets/<secret-name>/<version>` |
130-
| **Authorization URL** | OAuth 2.0 authorization endpoint for the identity provider.<br/><br/>Example for Microsoft Entra ID: `https://login.microsoftonline.com/<tenant>/oauth2/v2.0/authorize` |
131-
| **Token URL** | OAuth 2.0 token endpoint for the identity provider.<br/><br/>Example for Microsoft Entra ID: `https://login.microsoftonline.com/<tenant>/oauth2/v2.0/token` |
132-
| **Refresh URL** | OAuth 2.0 token refresh endpoint for the identity provider. For most providers, same as the **Token URL**<br/><br/>Example for Microsoft Entra ID: `https://login.microsoftonline.com/<tenant>/oauth2/v2.0/token` |
133-
| **OAuth2 flow** | One or both of the OAuth 2.0 flows that you want to use. Available values are **Authorization code (PKCE)** and **Client credentials**. |
134-
| **Scopes** | One or more API scopes configured for your API, separated by spaces. If no scopes are configured, enter `.default`. |
128+
| **Client ID** | Enter the client ID (GUID) of the app that you created in your identity provider. |
129+
| **Client secret** | Click **Select** and select the subscription, key vault, and client secret that you stored.<br/><br/>Example: `https://<key-vault-name>.vault.azure.net/secrets/<secret-name>` |
130+
| **Authorization URL** | Enter the OAuth 2.0 authorization endpoint for the identity provider.<br/><br/>Example for Microsoft Entra ID: `https://login.microsoftonline.com/<tenant>/oauth2/v2.0/authorize` |
131+
| **Token URL** | Enter the OAuth 2.0 token endpoint for the identity provider.<br/><br/>Example for Microsoft Entra ID: `https://login.microsoftonline.com/<tenant>/oauth2/v2.0/token` |
132+
| **Refresh URL** | Enter the OAuth 2.0 token refresh endpoint for the identity provider. For most providers, same as the **Token URL**<br/><br/>Example for Microsoft Entra ID: `https://login.microsoftonline.com/<tenant>/oauth2/v2.0/token` |
133+
| **OAuth2 flow** | Select one or both of the OAuth 2.0 flows that you want to use. Available values are **Authorization code (PKCE)** and **Client credentials**. |
134+
| **Scopes** | Enter one or more API scopes configured for your API, separated by spaces. If no scopes are configured, enter `.default`. |
135135

136136
1. Select **Create** to save the configuration.
137137

articles/api-center/includes/about-mcp-servers.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,9 @@ ms.service: azure-api-center
88
ms.topic: include
99
ms.date: 05/12/2025
1010
ms.author: danlep
11-
ms.custom: Include file
11+
ms.custom:
12+
- Include file
13+
- build-2025
1214
---
1315

1416
## About MCP servers

articles/api-center/includes/store-secret-key-vault.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,6 @@ ms.custom: Include file
1414

1515
To store the API key as a secret in the key vault, see [Set and retrieve secret in Key Vault](/azure/key-vault/secrets/quick-create-portal).
1616

17-
> [!NOTE]
18-
> The *secret identifier* of the secret appears on the secret's details page. This is a URI of the form `https://<key-vault-name>.vault.azure.net/secrets/<secret-name>/<version>`. You need this value when you configure the secret in your API center.
19-
2017
#### Enable a managed identity in your API center
2118

2219
For this scenario, your API center uses a [managed identity](/entra/identity/managed-identities-azure-resources/overview) to access the key vault. Depending on your needs, enable either a system-assigned or one or more user-assigned managed identities.
-2.35 KB
Loading
-2.64 KB
Loading
-7.49 KB
Loading

articles/api-center/register-discover-mcp-server.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,12 @@ title: Inventory and Discover MCP Servers in Your API Center
33
description: Learn about how Azure API Center can be a centralized registry for MCP servers in your organization. Developers and other stakeholders can use the API Center portal to discover MCP servers.
44
author: dlepow
55
ms.service: azure-api-center
6-
ms.custom:
76
ms.topic: concept-article
87
ms.date: 04/28/2025
98
ms.author: danlep
109
# Customer intent: As an API program manager, I want to register and discover MCP servers as APIs in my API Center inventory.
10+
ms.custom:
11+
- build-2025
1112
---
1213

1314
# Register and discover remote MCP servers in your API inventory

0 commit comments

Comments
 (0)