Skip to content

Commit 2d00e73

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into us356678-dks-4
2 parents c5bd70f + 54a6f46 commit 2d00e73

File tree

1,738 files changed

+29531
-11175
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,738 files changed

+29531
-11175
lines changed

.openpublishing.redirection.json

Lines changed: 66 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,30 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/cdn/cdn-http-variables.md",
5+
"redirect_url": "/previous-versions/azure/cdn/cdn-http-variables",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/cdn/cdn-advanced-http-reports.md",
10+
"redirect_url": "/previous-versions/azure/cdn/cdn-advanced-http-reports",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/cdn/cdn-preload-endpoint.md",
15+
"redirect_url": "/previous-versions/azure/cdn/cdn-preload-endpoint",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/cdn/cdn-real-time-stats.md",
20+
"redirect_url": "/previous-versions/azure/cdn/cdn-real-time-stats",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/cdn/cdn-token-auth.md",
25+
"redirect_url": "/previous-versions/azure/cdn/cdn-token-auth",
26+
"redirect_document_id": false
27+
},
328
{
429
"source_path": "articles/cdn/edgio-retirement-faq.md",
530
"redirect_url": "/previous-versions/azure/cdn/edgio-retirement-faq",
@@ -6471,27 +6496,27 @@
64716496
},
64726497
{
64736498
"source_path": "articles/cloud-services/cloud-services-guestos-family-2-3-4-retirement.md",
6474-
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-guestos-family-2-3-4-retirement",
6499+
"redirect_url": "/azure/cloud-services-extended-support/cloud-services-guestos-family-2-3-4-retirement",
64756500
"redirect_document_id": false
64766501
},
64776502
{
64786503
"source_path": "articles/cloud-services/cloud-services-guestos-family1-retirement.md",
6479-
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-guestos-family1-retirement",
6504+
"redirect_url": "/azure/cloud-services-extended-support/cloud-services-guestos-family-1-retirement",
64806505
"redirect_document_id": false
64816506
},
64826507
{
64836508
"source_path": "articles/cloud-services/cloud-services-guestos-msrc-releases.md",
6484-
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-guestos-msrc-releases",
6509+
"redirect_url": "/azure/cloud-services-extended-support/cloud-services-guestos-microsoft-security-response-center-releases",
64856510
"redirect_document_id": false
64866511
},
64876512
{
64886513
"source_path": "articles/cloud-services/cloud-services-guestos-retirement-policy.md",
6489-
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-guestos-retirement-policy",
6514+
"redirect_url": "/azure/cloud-services-extended-support/cloud-services-guestos-retirement-policy",
64906515
"redirect_document_id": false
64916516
},
64926517
{
64936518
"source_path": "articles/cloud-services/cloud-services-guestos-update-matrix.md",
6494-
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-guestos-update-matrix",
6519+
"redirect_url": "/azure/cloud-services-extended-support/cloud-services-guestos-update-matrix",
64956520
"redirect_document_id": false
64966521
},
64976522
{
@@ -6739,6 +6764,11 @@
67396764
"redirect_url": "/dotnet/maui/data-cloud/push-notifications",
67406765
"redirect_document_id": false
67416766
},
6767+
{
6768+
"source_path": "articles/sentinel/work-with-styx-objects-and-indicators.md",
6769+
"redirect_url": "/azure/sentinel/work-with-styx-objects-indicators",
6770+
"redirect_document_id": false
6771+
},
67426772
{
67436773
"source_path": "articles/storage/files/geo-redundant-storage-for-large-file-shares.md",
67446774
"redirect_url": "/azure/storage/files/files-redundancy",
@@ -6748,6 +6778,36 @@
67486778
"source_path": "articles/defender-for-iot/organizations/extra-deploy-enterprise-iot.md",
67496779
"redirect_url": "/azure/defender-for-iot/organizations/eiot-defender-for-endpoint",
67506780
"redirect_document_id": false
6751-
}
6781+
},
6782+
{
6783+
"source_path": "articles/sentinel/work-with-styx-objects-indicators.md",
6784+
"redirect_url": "/azure/sentinel/work-with-stix-objects-indicators",
6785+
"redirect_document_id": false
6786+
},
6787+
{
6788+
"source_path_from_root": "/articles/azure-functions/migration.md",
6789+
"redirect_url": "/azure/azure-functions/migration/migrate-lambda-workloads-overview",
6790+
"redirect_document_id": false
6791+
},
6792+
{
6793+
"source_path": "articles/azure-functions/migration/lambda-functions-migration-assess.md",
6794+
"redirect_url": "/azure/azure-functions/migration/assess-lambda-workloads",
6795+
"redirect_document_id": false
6796+
},
6797+
{
6798+
"source_path": "articles/azure-functions/migration/lambda-functions-migration-discover.md",
6799+
"redirect_url": "/azure/azure-functions/migration/discover-lambda-workloads",
6800+
"redirect_document_id": false
6801+
},
6802+
{
6803+
"source_path": "articles/azure-functions/migration/lambda-functions-migration-migrate.md",
6804+
"redirect_url": "/azure/azure-functions/migration/migrate-lambda-workloads",
6805+
"redirect_document_id": false
6806+
},
6807+
{
6808+
"source_path": "articles/azure-functions/migration/lambda-functions-migration-overview.md",
6809+
"redirect_url": "/azure/azure-functions/migration/migrate-lambda-workloads-overview",
6810+
"redirect_document_id": false
6811+
},
67526812
]
67536813
}

articles/active-directory-b2c/api-connectors-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Using Azure AD B2C, you can add your own business logic to a user journey by cal
8585
![Diagram of a RESTful service claims exchange](media/api-connectors-overview/restful-service-claims-exchange.png)
8686

8787
> [!NOTE]
88-
> If there is slow or no response from the RESTful service to Azure AD B2C, the timeout is 30 seconds and the retry count is two times (meaning there are 3 tries in total). Currently, you can't configure the timeout and retry count settings.
88+
> HTTP requests may be cancelled if there is a slow or no response from the RESTful service to Azure AD B2C. The default timeout is 10 seconds and the default retry count is one (meaning there are 2 tries in total).
8989
9090
## Calling a RESTful service
9191

articles/active-directory-b2c/manage-custom-policies-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: kengaderdus
66
manager: CelesteDG
77

88
ms.service: azure-active-directory
9-
ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done
9+
ms.custom: no-azure-ad-ps-ref
1010
ms.topic: how-to
1111
ms.date: 01/11/2024
1212
ms.author: kengaderdus
@@ -16,7 +16,7 @@ ms.subservice: b2c
1616

1717
# Manage Azure AD B2C custom policies with Microsoft Graph PowerShell
1818

19-
Microsoft Graph PowerShell provides several cmdlets for command line- and script-based custom policy management in your Azure AD B2C tenant. Learn how to use the Azure AD PowerShell module to:
19+
Microsoft Graph PowerShell provides several cmdlets for command line- and script-based custom policy management in your Azure AD B2C tenant. Learn how to use the Microsoft Graph PowerShell SDK to:
2020

2121
* List the custom policies in an Azure AD B2C tenant
2222
* Download a policy from a tenant

articles/active-directory-b2c/service-limits.md

Lines changed: 50 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -183,48 +183,63 @@ As a protection for our customers, Microsoft places some restrictions on telepho
183183

184184
| Region Code | Region Name | Limit per tenant per 60 minutes | Limit per tenant per 24 hours |
185185
|:----------- |:---------------------------------------------- |:------------------------------- | :----------------------------------------|
186-
| 228 | Togo | 10 | 30 |
187-
| 257 | Uzbek | 10 | 30 |
188-
| 970 | State of Plaestine | 10 | 30 |
189-
| 249 | Sudan | 10 | 30 |
190-
| 226 | Burina Faso | 10 | 30 |
191-
| 252 | Somalia | 10 | 30 |
192-
| 501 | Belize | 10 | 30 |
193-
| 855 | Cambodia | 50 | 200 |
194-
| 84 | Vietnam | 150 | 500 |
195-
| 94 | Sri Lanka | 100 | 500 |
196-
| 63 | Philippines | 50 | 200 |
197-
| 62 | Indonesia | 50 | 200 |
198-
| 7 | Russia | 100 | 1000 |
199-
| 258 | Mozambique | 50 | 200 |
200-
| 92 | Pakistan | 100 | 1000 |
201-
| 994 | Azerbaijan | 50 | 200 |
202-
| 880 | Bangladesh | 50 | 200 |
203186
| 20 | Egypt | 50 | 200 |
204-
| 260 | Zambia | 50 | 200 |
205-
| 502 | Guatemala | 10 | 50
206-
| 255 | Tanzania | 10 | 50
207-
| 261 | Madagascar | 10 | 30
208-
| 998 | Uzbekistan | 10 | 30
209-
| 223 | Mali | 20 | 100
210-
| 52 | Mexico | 100 | 500
211-
| 60 | Malaysia | 50 | 200 |
212-
| 221 | Senegal | 10 | 30 |
187+
| 211 | South Sudan | 10 | 30 |
188+
| 212 | Morocco | 20 | 100 |
213189
| 216 | Tunisia | 20 | 100 |
214-
| 503 | El Salvador | 10 | 30 |
190+
| 221 | Senegal | 10 | 30 |
191+
| 223 | Mali | 20 | 100 |
192+
| 224 | Guinea | 20 | 100 |
193+
| 225 | Ivory Coast| 10 | 30 |
194+
| 226 | Burina Faso | 10 | 30 |
195+
| 228 | Togo | 10 | 30 |
196+
| 233 | Ghana| 10 | 30 |
215197
| 234 | Nigeria | 20 | 100 |
198+
| 236 | Central African Republic  | 10 | 30 |
199+
| 238 | Cabo Verde | 10 | 30 |
200+
| 249 | Sudan | 10 | 30 |
201+
| 251 | Ethiopia  | 10 | 30 |
202+
| 252 | Somalia | 10 | 30 |
203+
| 255 | Tanzania | 10 | 50 |
204+
| 256 | Uganda | 20 | 100 |
205+
| 257 | Uzbek | 10 | 30 |
206+
| 258 | Mozambique| 50 | 200 |
207+
| 260 | Zambia | 50 | 200 |
208+
| 261 | Madagascar | 10 | 30 |
209+
| 263 | Zimbabwe | 10 | 30 |
210+
| 265 | Malawi  | 10 | 30 |
211+
| 375 | Belarus   | 10 | 30 |
216212
| 386 | Slovenia | 10 | 50 |
213+
| 501 | Belize| 10 | 30 |
214+
| 502 | Guatemala | 10 | 50
215+
| 503 | El Salvador | 10 | 30 |
216+
| 52 | Mexico | 100 | 500
217+
| 58 | Venezuela| 10 | 30 |
217218
| 591 | Bolivia | 10 | 30 |
218-
| 263 | Zimbabwe | 10 | 30 |
219-
| 261 | Madagascar | 10 | 30 |
220-
| 995 | Georgia | 10 | 30 |
221-
| 993 | Turkmenistan | 10 | 30 |
222-
| 256 | Uganda | 20 | 100 |
223-
| 212 | Moroccoa | 20 | 100 |
219+
| 60 | Malaysia | 50 | 200 |
220+
| 62 | Indonesia | 50 | 200 |
221+
| 63 | Philippines | 50 | 200 |
222+
| 670 | East Timor (Timor-Leste)  | 10 | 30 |
223+
| 7 | Russia | 100 | 1000 |
224+
| 84 | Vietnam | 150 | 500 |
225+
| 855 | Cambodia | 50 | 200 |
224226
| 856 | Laos | 50 | 200 |
225-
| 224 | Guinea | 20 | 100 |
227+
| 880 | Bangladesh | 50 | 200 |
228+
| 92 | Pakistan| 100 | 1000 |
229+
| 93 | Afghanistan  | 10 | 30 |
230+
| 94 | Sri Lanka | 100 | 500 |
231+
| 95 | Myanmar (Burma) | 10 | 30 |
232+
| 961 | Lebanon  | 10 | 30 |
233+
| 967 | Yemen |10 | 30 |
234+
| 970 | State of Palestine| 10 | 30 |
235+
| 972 | Israel  | 50 | 200 |
236+
| 976 | Mongolia  | 10 | 30 |
226237
| 992 | Tajikistan | 10 | 30 |
227-
| 238 | Cape Verde | 10 | 30 |
238+
| 993 | Turkmenistan | 10 | 30 |
239+
| 994 | Azerbaijan | 50 | 200 |
240+
| 995 | Georgia | 10 | 30 |
241+
| 996 | Kyrgyzstan  | 10 | 30 |
242+
| 998 | Uzbekistan | 10 | 30
228243

229244
## Next steps
230245

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ The sign-up and sign-in user flow handles both experiences with a single configu
5858
1. Sign in to the [Azure portal](https://portal.azure.com).
5959
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
6060
1. In the Azure portal, search for and select **Azure AD B2C**.
61-
1. Under **Policies**, select **User flows**, and then select **New user flow**.
61+
1. <a name="new_user_flow"></a>Under **Policies**, select **User flows**, and then select **New user flow**.
6262

6363
![Screenshot of the User flows page from the Azure portal with New user flow button highlighted.](./media/tutorial-create-user-flows/sign-up-sign-in-user-flow.png)
6464

articles/api-center/enable-api-center-portal-vs-code-extension.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,6 @@ Enterprise developers must sign in with a Microsoft account to see the API Cente
4646

4747
[!INCLUDE [api-center-portal-user-sign-in](includes/api-center-portal-user-sign-in.md)]
4848

49-
### For API center administrators
5049
## Steps for enterprise developers to access the API Center portal
5150

5251
Developers can follow these steps to connect and sign in to view an API Center portal using the Visual Studio Code extension. Settings to connect to the API center need to be provided by the API center administrator.

articles/api-center/enable-managed-api-analysis-linting.md

Lines changed: 37 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Managed API linting and analysis - Azure API Center
33
description: Automatic linting of API definitions in your API center helps you analyze compliance of APIs with the organization's API style guide.
44
ms.service: azure-api-center
55
ms.topic: how-to
6-
ms.date: 12/03/2024
6+
ms.date: 03/31/2025
77
ms.author: danlep
88
author: dlepow
99
ms.custom:
@@ -18,17 +18,15 @@ With API analysis:
1818

1919
* Azure API Center automatically analyzes your API definitions whenever you add or update an API definition. API definitions are linted by default with a [spectral:oas ruleset](https://docs.stoplight.io/docs/spectral/4dec24461f3af-open-api-rules) (API style guide).
2020
* API analysis reports are generated in the Azure portal, showing how your API definitions conform to the style guide.
21-
* You can use the Azure API Center extension for Visual Studio Code to customize and test your own API style guide locally and then deploy it to your API center.
22-
21+
* Use analysis profiles to specify the ruleset and filter conditions for the APIs that are analyzed. Customize a profile's ruleset using the Azure API Center extension for Visual Studio Code.
2322

2423
> [!IMPORTANT]
2524
> If you prefer, you can enable [self-managed](enable-api-analysis-linting.md) linting and analysis using a custom Azure function, overriding the built-in capabilities. **Disable any function used for self-managed linting before using managed API analysis.**
2625
2726
## Limitations
2827

2928
* Currently, only OpenAPI and AsyncAPI specification documents in JSON or YAML format are analyzed.
30-
* Currently, you configure a single ruleset, and it's applied to all OpenAPI definitions in your API center.
31-
* There are [limits](../azure-resource-manager/management/azure-subscription-service-limits.md?toc=/azure/api-center/toc.json&bc=/azure/api-center/breadcrumb/toc.json#azure-api-center-limits) for the maximum number of API definitions analyzed. Analysis can take a few minutes to up to 24 hours to complete.
29+
* There are [limits](../azure-resource-manager/management/azure-subscription-service-limits.md?toc=/azure/api-center/toc.json&bc=/azure/api-center/breadcrumb/toc.json#azure-api-center-limits) for the number of analysis profiles and the maximum number of API definitions analyzed. Analysis can take a few minutes to up to 24 hours to complete.
3230

3331
## Prerequisites
3432

@@ -57,27 +55,50 @@ To view an analysis summary in your API center:
5755
> [!TIP]
5856
> You can also view the API analysis report by selecting **Analysis** from the API definition's menu bar.
5957
60-
## Customize ruleset
58+
## Manage analysis profiles
59+
60+
Azure API Center uses *analysis profiles* for linting and analyzing APIs. An analysis profile specifies a ruleset and optionally filter conditions for APIs that are analyzed. The default analysis profile applies the `spectral:oas` ruleset to all OpenAPI and AsyncAPI definitions.
61+
62+
You can customize the ruleset and define filter conditions in the default profile, or you can create a new profile. For example, you might want to use one profile for APIs that are in development and a different one for APIs that are in production.
63+
64+
> [!NOTE]
65+
> In the Standard plan of API Center, you can create up to 3 analysis profiles. Only a single profile is supported in the Free plan.
66+
67+
To create an analysis profile:
68+
69+
1. In the Azure portal, navigate to your API center.
70+
1. In the left-hand menu, under **Governance**, select **API Analysis** > **Manage analysis profiles** > **+ Create analysis profile**.
71+
1. In the **Create new analysis profile** pane, enter a **Name** and **Description** for the profile.
72+
1. In **Ruleset**, the analyzer type (linting engine) for the ruleset appears. Currently only Spectral is supported.
73+
1. Under **Define filter conditions**, add one or more filter conditions for API definitions that the profile is applied to.
74+
1. Select **Create**.
75+
76+
77+
:::image type="content" source="media/enable-managed-api-analysis-linting/create-analysis-profile.png" alt-text="Screenshot of creating an analysis profile in the portal.":::
78+
79+
The profile is created and a ruleset scaffold is created. To view the current ruleset, select the profile, and in the context (...) menu, select **View the ruleset**.
80+
81+
Continue to the following sections to customize the ruleset.
6182

62-
You can use the Azure API Center extension for Visual Studio Code to customize the default ruleset for your API center or replace it as your organization's API style guide. For example, you can [extend the ruleset](https://docs.stoplight.io/docs/spectral/83527ef2dd8c0-extending-rulesets) or add [custom functions](https://docs.stoplight.io/docs/spectral/a781e290eb9f9-custom-functions).
83+
### Customize the profile's ruleset
6384

64-
To customize or replace the ruleset:
85+
Use the Visual Studio Code extension for Azure API Center to customize a profile's ruleset. After customizing the ruleset and testing it locally, you can deploy it back to your API center.
6586

6687
1. In Visual Studio Code, select the Azure API Center icon from the Activity Bar.
67-
1. Open the `.api-center-rules` folder at the root of your working folder.
68-
1. In the folder for your API center resource, open the `ruleset.yml` file.
88+
1. In the API Center pane, expand the API center resource you are working with, and expand **Profiles**.
89+
1. Expand the profile you want to modify, and select `ruleset.yaml`.
6990
1. Modify or replace the content as needed.
70-
1. Save your changes to `ruleset.yml`.
91+
1. Save your changes to `ruleset.yaml`.
7192

7293
### Test ruleset locally
7394

7495
Before deploying the custom ruleset to your API center, validate it locally. The Azure API Center extension for Visual Studio Code provides integrated support for API specification linting with Spectral.
7596

7697
1. In Visual Studio Code, use the **Ctrl+Shift+P** keyboard shortcut to open the Command Palette.
7798
1. Type **Azure API Center: Set active API Style Guide** and hit **Enter**.
78-
1. Choose **Select Local File** and specify the `ruleset.yml` file that you customized. Hit **Enter**.
99+
1. Choose **Select Local File** and specify the `ruleset.yaml` file that you customized. Hit **Enter**.
79100

80-
This step makes the custom ruleset the active API style guide for linting.
101+
This step makes the custom ruleset the active API style guide for local linting.
81102

82103
Now, when you open an OpenAPI-based API definition file, a local linting operation is automatically triggered in Visual Studio Code. Results are displayed inline in the editor and in the **Problems** window (**View > Problems** or **Ctrl+Shift+M**).
83104

@@ -94,9 +115,10 @@ To deploy the custom ruleset to your API center:
94115

95116
1. In Visual Studio Code, select the Azure API Center icon from the Activity Bar.
96117
1. In the API Center pane, expand the API center resource in which you customized the ruleset.
97-
1. Right-click **Rules** and select **Deploy Rules to API Center**.
118+
1. Expand **Profiles**.
119+
1. Right-click the profile in which you customized the ruleset, and select **Deploy Rules to API Center**.
98120

99-
A message notifies you after the rules are successfully deployed to your API center. The linting engine uses the updated ruleset to analyze API definitions.
121+
A message notifies you after the rules are successfully deployed to your API center. The linting engine uses the updated ruleset to analyze API definitions in the profile.
100122

101123
To see the results of linting with the updated ruleset, view the API analysis reports in the portal.
102124

0 commit comments

Comments
 (0)