Skip to content

Commit 2632e9a

Browse files
author
gitName
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into mcpp
2 parents 80b32b9 + 2140205 commit 2632e9a

File tree

777 files changed

+8352
-3337
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

777 files changed

+8352
-3337
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6894,6 +6894,11 @@
68946894
"redirect_url": "/azure/governance/policy/samples/hipaa-hitrust",
68956895
"redirect_document_id": false
68966896
},
6897+
{
6898+
"source_path": "articles/reliability/migrate-workload-aks-mysql.md",
6899+
"redirect_url": "/azure/reliability/availability-zones-migration-overview",
6900+
"redirect_document_id": true
6901+
},
68976902
{
68986903
"source_path": "articles/private-5g-core/disconnected-mode.md",
68996904
"redirect_url": "/azure/private-5g-core/azure-stack-edge-disconnects",
@@ -6904,6 +6909,7 @@
69046909
"redirect_url": "/azure/signups/overview",
69056910
"redirect_document_id": false
69066911
}
6912+
69076913
]
69086914
}
69096915

articles/api-management/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -686,6 +686,8 @@
686686
href: breaking-changes/git-configuration-retirement-march-2025.md
687687
- name: Direct management API retirement (March 2025)
688688
href: breaking-changes/direct-management-api-retirement-march-2025.md
689+
- name: Managed certificates suspension (August 2025)
690+
href: breaking-changes/managed-certificates-suspension-august-2025.md
689691
- name: ADAL-based identity provider retirement (September 2025)
690692
href: breaking-changes/identity-provider-adal-retirement-sep-2025.md
691693
- name: CAPTCHA endpoint update (September 2025)

articles/api-management/api-management-capacity.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,6 @@ In the v2 tiers, the following metrics are available:
4242

4343
* **Memory Percentage of Gateway** - The percentage of memory capacity used by the gateway units.
4444

45-
> [!NOTE]
46-
> Currently, the Memory Percentage of Gateway metric isn't supported in the Premium v2 tier.
47-
4845
Available aggregations for these metrics are as follows.
4946

5047
* **Avg** - Average percentage of capacity used across gateway processes in every [unit](upgrade-and-scale.md) of an API Management instance.

articles/api-management/api-management-howto-deploy-multi-region.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ This section provides considerations for multi-region deployments when the API M
168168
* Configure each regional network independently. The [connectivity requirements](virtual-network-reference.md) such as required network security group rules for a virtual network in an added region are generally the same as those for a network in the primary region.
169169
* Virtual networks in the different regions don't need to be peered.
170170
> [!IMPORTANT]
171-
> When configured in internal virtual network mode, each regional gateway must also have outbound connectivity on port 1433 to the Azure SQL database configured for your API Management instance, which is only in the *primary* region. Ensure that you allow connectivity to the FQDN or IP address of this Azure SQL database in any routes or firewall rules you configure for networks in your secondary regions; the Azure SQL service tag can't be used in this scenario. To find the Azure SQL database name in the primary region, go to the **Network** > **Network status** page of your API Management instance in the portal.
171+
> When configured in internal virtual network mode, each regional gateway must also have outbound connectivity on port 1433 to the Azure SQL database configured for your API Management instance, which is only in the *primary* region. Ensure that you allow connectivity to the FQDN or IP address of this Azure SQL database in any routes or firewall rules you configure for networks in your secondary regions; the Azure SQL service endpoint can't be used in this scenario. To find the Azure SQL database name in the primary region, go to the **Network** > **Network status** page of your API Management instance in the portal.
172172

173173
### IP addresses
174174

articles/api-management/api-management-region-availability.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: concept-article
9-
ms.date: 06/17/2025
9+
ms.date: 07/21/2025
1010
ms.author: danlep
1111
ms.custom:
1212
- references_regions
@@ -32,6 +32,7 @@ Information in the following table is updated regularly. Capacity availability i
3232
| Australia Southeast ||| | |
3333
| Brazil South ||| | |
3434
| Central India ||| | |
35+
| Central US ||| | |
3536
| East Asia ||| ||
3637
| East US ||| | |
3738
| East US 2 |||||
@@ -49,6 +50,7 @@ Information in the following table is updated regularly. Capacity availability i
4950
| Sweden Central ||| | |
5051
| South India ||| | |
5152
| Switzerland North ||| | |
53+
| UAE North ||| | |
5254
| UK South |||||
5355
| UK West ||| | |
5456
| West Europe ||| ||
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
---
2+
title: Azure API Management - Managed certificates suspension for new custom domains (August 2025)
3+
description: Azure API Management is temporarily suspending managed certificates for new custom domains from August 15, 2025 to March 15, 2026 due to industry-wide changes in domain validation.
4+
services: api-management
5+
author: dlepow
6+
ms.service: azure-api-management
7+
ms.topic: reference
8+
ai-usage: ai-assisted
9+
ms.date: 07/18/2025
10+
ms.author: danlep
11+
---
12+
13+
# Managed certificates suspension for new custom domains (August 2025)
14+
15+
[!INCLUDE [premium-dev-standard-basic.md](../../../includes/api-management-availability-premium-dev-standard-basic.md)]
16+
17+
Azure managed certificates for new custom domains in API Management will be temporarily turned off from August 15, 2025 to March 15, 2026. Existing managed certificates will be autorenewed and remain unaffected.
18+
19+
In the classic service tiers, Azure API Management offers [free, managed TLS certificates for custom domains](../configure-custom-domain.md#domain-certificate-options), allowing customers to secure their endpoints without purchasing and managing their own certificates. Because of an industry-wide deprecation of CNAME-based Domain Control Validation (DCV), our Certificate Authority (CA), DigiCert, will migrate to a new validation platform to meet Multi-Perspective Issuance Corroboration (MPIC) requirements. This migration requires a temporary suspension of managed certificates for new custom domains.
20+
21+
## Is my service affected by this?
22+
23+
You're affected if you plan to create new managed certificates for new custom domains in Azure API Management between August 15, 2025 and March 15, 2026. Existing managed certificates will be autorenewed before August 15, 2025 and will continue to function normally. There's no impact to existing managed certificates or custom domains already using them.
24+
25+
## What is the deadline for the change?
26+
27+
The suspension of managed certificates for new custom domains will be enforced from August 15, 2025 to March 15, 2026. The capability to create managed certificates will resume after the migration to the new validation platform is complete.
28+
29+
## What do I need to do?
30+
31+
No action is required if you already have managed certificates for your custom domains. If you need to add new managed certificates, plan to do so before August 15, 2025 or after March 15, 2026. During the suspension period, you can still configure custom domains with certificates you manage from other sources.
32+
33+
## Help and support
34+
35+
If you have questions, get answers from community experts in [Microsoft Q&A](https://aka.ms/apim/azureqa/change/captcha-2022). If you have a support plan and need technical help, create a [support request](https://portal.azure.com/#view/Microsoft_Azure_Support/HelpAndSupportBlade/~/overview).
36+
37+
## Related content
38+
39+
See all [upcoming breaking changes and feature retirements](overview.md).

articles/api-management/breaking-changes/overview.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: reference
9-
ms.date: 05/30/2025
9+
ms.date: 07/17/2025
1010
ms.author: danlep
1111
---
1212

@@ -30,6 +30,7 @@ The following table lists all the upcoming breaking changes and feature retireme
3030
| [Git repository retirement][git2025] | March 15, 2025 |
3131
| [Direct management API retirement][mgmtapi2025] | March 15, 2025 |
3232
| [Workspaces preview breaking changes, part 2][workspaces2025march] | March 31, 2025 |
33+
| [Managed certificates suspension][managed-certificates-suspension-august-2025] | August 15, 2025 |
3334
| [ADAL-based Microsoft Entra ID identity provider retirement][msal2025] | September 30, 2025 |
3435
| [CAPTCHA endpoint update][captcha2025] | September 30, 2025 |
3536
| [Built-in analytics dashboard retirement][analytics2027] | March 15, 2027 |
@@ -50,3 +51,4 @@ The following table lists all the upcoming breaking changes and feature retireme
5051
[mgmtapi2025]: ./direct-management-api-retirement-march-2025.md
5152
[workspaces2024]: ./workspaces-breaking-changes-june-2024.md
5253
[workspaces2025march]: ./workspaces-breaking-changes-march-2025.md
54+
[managed-certificates-suspension-august-2025]: ./managed-certificates-suspension-august-2025.md

articles/app-service/app-service-web-configure-tls-mutual-auth.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ ms.custom: devx-track-csharp, devx-track-extended-java, devx-track-js, devx-trac
1515

1616
# Configure TLS mutual authentication in Azure App Service
1717

18+
[!INCLUDE [app-service-managed-certificate](./includes/managed-certs/managed-certs-note.md)]
19+
1820
You can restrict access to your Azure App Service app by enabling various types of authentication for the app. One way to set up authentication is to request a client certificate when the client request is sent by using Transport Layer Security (TLS) / Secure Sockets Layer (SSL) and to validate the certificate. This mechanism is called *mutual authentication* or *client certificate authentication*. This article shows how to set up your app to use client certificate authentication.
1921

2022
> [!NOTE]

articles/app-service/app-service-web-tutorial-custom-domain.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ author: msangapu-msft
1313

1414
# Set up an existing custom domain in Azure App Service
1515

16+
[!INCLUDE [app-service-managed-certificate](./includes/managed-certs/managed-certs-note.md)]
17+
1618
[Azure App Service](overview.md) provides a highly scalable, self-patching web hosting service. This guide shows you how to map an existing custom Domain Name System (DNS) name to App Service. To migrate a live site and its DNS domain name to App Service with no downtime, see [Migrate an active DNS name to Azure App Service](manage-custom-dns-migrate-domain.md).
1719

1820
The DNS record type you need to add with your domain provider depends on the domain you want to add to App Service.

articles/app-service/configure-authentication-provider-aad.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -301,7 +301,7 @@ Requests that fail these built-in checks get an HTTP `403 Forbidden` response.
301301

302302
[fic-config]: #use-a-managed-identity-instead-of-a-secret-preview
303303

304-
Instead of configuring a client secret for your app registration, you can [configure an application to trust a managed identity (preview)][entra-fic]. Using an identity instead of a secret means you don't have to manage a secret. You don't have secret expiration events to handle, and you don't have the same level of risk associated with possibly disclosing or leaking that secret.
304+
Instead of configuring a client secret for your app registration, you can [configure an application to trust a managed identity][entra-fic]. Using an identity instead of a secret means you don't have to manage a secret. You don't have secret expiration events to handle, and you don't have the same level of risk associated with possibly disclosing or leaking that secret.
305305

306306
The identity allows you to create a *federated identity credential*, which can be used instead of a client secret as a *client assertion*. This approach is available only for workforce configurations. The built-in authentication feature currently supports federated identity credentials as a preview.
307307

@@ -313,6 +313,7 @@ You can use the steps in this section to configure your App Service or Azure Fun
313313

314314
> [!IMPORTANT]
315315
> The user-assigned managed identity that you create should only be assigned to the App Service or Azure Functions application through this registration. If you assign the identity to another resource, you're giving that resource unnecessary access to your app registration.
316+
316317
1. Note down the **Object ID** and **Client ID** values of the managed identity. You'll need the object ID to create a federated identity credential in the next step. You'll use the managed identity's client ID in a later step.
317318

318319
1. Follow the Microsoft Entra ID [instructions to configure a federated identity credential on an existing application](/entra/workload-id/workload-identity-federation-config-app-trust-managed-identity#configure-a-federated-identity-credential-on-an-existing-application). Those instructions also include sections for updating application code, which you can skip.

0 commit comments

Comments
 (0)