Skip to content

Commit 2d29316

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into afd-logs
2 parents 9925724 + 8a2ec1a commit 2d29316

File tree

159 files changed

+1683
-430
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

159 files changed

+1683
-430
lines changed

articles/active-directory-b2c/billing.md

Lines changed: 1 addition & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kengaderdus
55
manager: CelesteDG
66
ms.service: azure-active-directory
77
ms.topic: reference
8-
ms.date: 03/10/2025
8+
ms.date: 05/20/2025
99
ms.author: kengaderdus
1010
ms.subservice: b2c
1111
ms.custom: fasttrack-edit
@@ -36,18 +36,6 @@ Also, if you choose to provide higher levels of assurance by using multifactor a
3636
> [!IMPORTANT]
3737
> This article does not contain pricing details. For the latest information about usage billing and pricing, see [Azure Active Directory B2C pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/). See also [Azure AD B2C region availability and data residency](data-residency.md) for details about where the Azure AD B2C service is available and where user data is stored.
3838
39-
## What do I need to do?
40-
41-
To take advantage of MAU billing, your Azure AD B2C tenant must be linked to an Azure subscription. You might also need to switch your Azure AD B2C tenant to another pricing tier if you want to use Azure AD B2C Premium P2 features, like risk-based Conditional Access policies.
42-
43-
|If your tenant is: |You need to: |
44-
|---------|---------|
45-
| An Azure AD B2C tenant already billed on a per-MAU basis | Do nothing. When users authenticate to your Azure AD B2C tenant, you'll be automatically billed using the MAU-based billing model. |
46-
| An Azure AD B2C tenant not yet linked to a subscription | [Link your Azure AD B2C tenant to a subscription](#link-an-azure-ad-b2c-tenant-to-a-subscription) to activate MAU billing. |
47-
| An Azure AD B2C tenant that was linked to a subscription before November 1, 2019 | [Switch to MAU billing (recommended)](#switch-to-mau-billing-pre-november-2019-azure-ad-b2c-tenants), or stay on the per-authentication billing model. |
48-
| An Azure AD B2C tenant and you want to use premium features (like risk-based Conditional Access policies) | [Change to a Microsoft Entra pricing tier](#change-your-azure-ad-pricing-tier) that supports the features you want to use. |
49-
| | |
50-
5139
## About the monthly active users (MAU) billing model
5240

5341
MAU billing went into effect for Azure AD B2C tenants on **November 1, 2019**. Any Azure AD B2C tenants that you created and linked to a subscription on or after that date have been billed on a per-MAU basis.

articles/active-directory-b2c/conditional-access-identity-protection-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ description: Learn how Identity Protection gives you visibility into risky sign-
44
ms.service: azure-active-directory
55
ms.subservice: b2c
66
ms.topic: overview
7-
ms.date: 01/11/2024
7+
ms.date: 05/20/2025
88
ms.author: kengaderdus
99
author: kengaderdus
10-
manager: CelesteDG
10+
manager: mwongerapk
1111
ms.collection: M365-identity-device-management
1212

1313
#Customer intent: As an Azure AD B2C application owner, I want to enhance the security of my applications by using Identity Protection and Conditional Access, so that I can detect and respond to risky authentications and enforce organizational policies.

articles/active-directory-b2c/find-help-open-support-ticket.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: azure-active-directory
1010

1111
ms.topic: troubleshooting
12-
ms.date: 01/11/2024
12+
ms.date: 05/20/2025
1313
ms.author: kengaderdus
1414
ms.subservice: b2c
1515

articles/active-directory-b2c/identity-protection-investigate-risk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to investigate risky users, and detections in Azure AD B2
44
ms.service: entra-id
55
ms.subservice: conditional-access
66
ms.topic: overview
7-
ms.date: 01/24/2025
7+
ms.date: 05/24/2025
88
ms.author: godonnell
99
author: garrodonnell
1010
manager: CelesteDG

articles/active-directory-b2c/supported-azure-ad-features.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@ title: Supported Microsoft Entra ID features
33
description: Learn about Microsoft Entra ID features, which are still supported in Azure AD B2C.
44

55
author: kengaderdus
6-
manager: CelesteDG
6+
manager: mwongerapk
77

88
ms.service: azure-active-directory
99

1010
ms.topic: overview
11-
ms.date: 01/11/2024
11+
ms.date: 05/20/2025
1212
ms.author: kengaderdus
1313
ms.subservice: b2c
1414

@@ -36,4 +36,4 @@ An Azure Active Directory B2C (Azure AD B2C) tenant is different than a Microsof
3636
| [Go-Local add-on](data-residency.md#go-local-add-on) | Microsoft Entra Go-Local add-on enables you to store data in the country/region you choose when your Microsoft Entra tenant.| Just like Microsoft Entra ID, Azure AD B2C supports [Go-Local add-on](data-residency.md#go-local-add-on). |
3737

3838
> [!NOTE]
39-
> **Other Azure resources in your tenant:** <br>In an Azure AD B2C tenant, you can't provision other Azure resources such as virtual machines, Azure web apps, or Azure functions. You must create these resources in your Microsoft Entra tenant.
39+
> **Other Azure resources in your tenant:** <br>In an Azure AD B2C tenant, you can't provision other Azure resources such as virtual machines, Azure web apps, or Azure functions. You must create these resources in your Microsoft Entra tenant.

articles/application-gateway/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -289,6 +289,8 @@
289289
href: ../reliability/migrate-app-gateway-v2.md?toc=/azure/application-gateway/toc.json
290290
- name: Proxy buffer configuration
291291
href: proxy-buffers.md
292+
- name: Using Server-sent events
293+
href: use-server-sent-events.md
292294
- name: Custom error pages
293295
href: custom-error.md
294296
- name: Migrate to v2 SKU
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
---
2+
title: Using Server-sent events with Application Gateway (Preview)
3+
description: This article provides guidance for using Server-sent events with your Azure Application Gateway.
4+
services: application-gateway
5+
author: jaesoni
6+
ms.service: azure-application-gateway
7+
ms.topic: concept-article
8+
ms.date: 05/15/2025
9+
ms.author: jaysoni
10+
---
11+
12+
# Using Server-sent events with Application Gateway (Preview)
13+
14+
Azure Application Gateway offers support for Server-sent events (SSE). This document provides guidelines to ensure the seamless operation of this feature when used with Azure Application Gateway.
15+
16+
> [!Note]
17+
> - The SSE support with Azure Application Gateway is currently in Preview phase.
18+
> - The response time recorded in [Access logs](monitor-application-gateway-reference.md#resource-logs) represents the total duration for which the connection was established. Multiple event streams may pass through during this connection period.
19+
20+
## Configuring Application Gateway
21+
22+
### Response Buffer
23+
24+
The [Response Buffers on Application Gateway resource](proxy-buffers.md) should be disabled. This configuration enables your application gateway resource to send responses to clients as streams from the backend server are received.
25+
26+
### Backend Setting - Request timeout
27+
28+
Ensure that the [Request time-out (seconds) in Backend Settings](configuration-http-settings.md?tabs=backendhttpsettings#request-timeout) is configured to exceed the idle time between events. Otherwise, your application gateway resource terminates the connection prematurely.
29+
30+
31+
## Configuring backend server
32+
33+
The backend server should send the following Response headers to ensure proper stream handling by the clients and any intermediaries. Note, these headers aren't a requirement for Application Gateway as a proxy.
34+
35+
### Content-Type: text/event-stream
36+
This header notifies the client that the response will be a stream of events, enabling them to correctly handle the Server-sent events (SSE) protocol.
37+
38+
### Connection: keep-alive
39+
This header maintains the TCP connection, allowing the backend server to send events to the client continuously.
40+
41+
### Transfer-Encoding: chunked
42+
This header allows the server to send responses in chunks without requiring a Content-Length header. It's necessary for streaming responses through SSE when the total size can't be determined in advance.
43+
44+
### Cache-Control: no-cache
45+
It's advisable to use this header to prevent intermediaries like CDNs from caching the SSE response.
46+
47+
## Next steps
48+
Learn about [Request and Response Proxy Buffers](proxy-buffers.md) in Application Gateway.

articles/azure-app-configuration/enable-dynamic-configuration-azure-kubernetes-service.md

Lines changed: 2 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -23,22 +23,9 @@ If you use Azure Kubernetes Service (AKS), this tutorial shows you how to enable
2323

2424
Finish the quickstart: [Use Azure App Configuration in Azure Kubernetes Service](./quickstart-azure-kubernetes-service.md).
2525

26-
> [!TIP]
27-
> The Azure Cloud Shell is a free, interactive shell that you can use to run the command line instructions in this article. It has common Azure tools preinstalled, including the .NET Core SDK. If you're logged in to your Azure subscription, launch your [Azure Cloud Shell](https://shell.azure.com) from shell.azure.com. You can learn more about Azure Cloud Shell by [reading our documentation](../cloud-shell/overview.md).
28-
>
29-
## Add a sentinel key
30-
31-
A *sentinel key* is a key that you update after you complete the change of all other keys. Your app monitors the sentinel key. When a change is detected, your app refreshes all configuration values. This approach helps to ensure the consistency of configuration in your app and reduces the overall number of requests made to your App Configuration store, compared to monitoring all keys for changes.
32-
33-
Add the following key-value to your App Configuration store. For more information about how to add key-values to a store using the Azure portal or the CLI, go to [Create a key-value](./quickstart-azure-app-configuration-create.md#create-a-key-value).
34-
35-
| Key | Value |
36-
|---|---|
37-
| Settings:Sentinel | 1 |
38-
3926
## Reload data from App Configuration
4027

41-
1. Open the *appConfigurationProvider.yaml* file located in the *Deployment* directory. Then, add the `refresh` section under the `configuration` property. It enables configuration refresh by monitoring the sentinel key.
28+
1. Open the *appConfigurationProvider.yaml* file located in the *Deployment* directory. Then, add the `refresh` section under the `configuration` property. It enables the Kubernetes provider to reload the entire configuration whenever it detects a change in any of the selected key-values (those starting with *Settings:* and having no label). For more information about monitoring configuration changes, see [Best practices for configuration refresh](./howto-best-practices.md#configuration-refresh).
4229

4330
```yaml
4431
apiVersion: azconfig.io/v1
@@ -58,13 +45,10 @@ Add the following key-value to your App Configuration store. For more informatio
5845
configuration:
5946
refresh:
6047
enabled: true
61-
monitoring:
62-
keyValues:
63-
- key: Settings:Sentinel
6448
```
6549
6650
> [!TIP]
67-
> By default, the Kubernetes provider polls the monitoring key-values every 30 seconds for change detection. However, you can change this behavior by setting the `interval` property of the `refresh`. If you want to reduce the number of requests to your App Configuration store, you can adjust it to a higher value.
51+
> You can set the `interval` property of the `refresh` to specify the minimum time between configuration refreshes. In this example, you use the default value of 30 seconds. Adjust to a higher value if you need to reduce the number of requests made to your App Configuration store.
6852

6953
1. Open the *deployment.yaml* file in the *Deployment* directory and add the following content to the `spec.containers` section. Your application loads configuration from a volume-mounted file the App Configuration Kubernetes provider generates. By setting this environment variable, your application can [use polling to monitor changes in mounted files](/dotnet/api/microsoft.extensions.fileproviders.physicalfileprovider.usepollingfilewatcher).
7054

@@ -90,7 +74,6 @@ Add the following key-value to your App Configuration store. For more informatio
9074
| Key | Value |
9175
|---|---|
9276
| Settings:Message | Hello from Azure App Configuration - now with live updates! |
93-
| Settings:Sentinel | 2 |
9477

9578
1. After refreshing the browser a few times, you'll see the updated content once the ConfigMap is updated in 30 seconds.
9679

articles/azure-app-configuration/howto-best-practices.md

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,24 @@ const appConfig = await load(endpoint, credential, {
8484
});
8585
```
8686

87+
#### [Kubernetes](#tab/kubernetes)
88+
89+
```yaml
90+
apiVersion: azconfig.io/v1
91+
kind: AzureAppConfigurationProvider
92+
metadata:
93+
name: appconfigurationprovider-sample
94+
spec:
95+
endpoint: <your-app-configuration-store-endpoint>
96+
target:
97+
configMapName: configmap-created-by-appconfig-provider
98+
configuration:
99+
selectors:
100+
- keyFilter: TestApp*
101+
refresh:
102+
enabled: true
103+
```
104+
87105
---
88106
89107
### Monitoring a sentinel key
@@ -118,6 +136,27 @@ const appConfig = await load(endpoint, credential, {
118136
});
119137
```
120138

139+
#### [Kubernetes](#tab/kubernetes)
140+
141+
```yaml
142+
apiVersion: azconfig.io/v1
143+
kind: AzureAppConfigurationProvider
144+
metadata:
145+
name: appconfigurationprovider-sample
146+
spec:
147+
endpoint: <your-app-configuration-store-endpoint>
148+
target:
149+
configMapName: configmap-created-by-appconfig-provider
150+
configuration:
151+
selectors:
152+
- keyFilter: TestApp*
153+
refresh:
154+
enabled: true
155+
monitoring:
156+
keyValues:
157+
- key: SentinelKey
158+
```
159+
121160
---
122161
123162
Both approaches are available through App Configuration providers across supported languages and platforms.

articles/azure-app-configuration/reference-kubernetes-provider.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -383,9 +383,7 @@ spec:
383383

384384
### Configuration refresh
385385

386-
When you make changes to your data in Azure App Configuration, you might want those changes to be refreshed automatically in your Kubernetes cluster. It's common to update multiple key-values, but you don't want the cluster to pick up a change midway through the update. To maintain configuration consistency, you can use a key-value to signal the completion of your update. This key-value is known as the sentinel key. The Kubernetes provider can monitor this key-value, and the ConfigMap and Secret will only be regenerated with updated data once a change is detected in the sentinel key.
387-
388-
In the following sample, a key-value named `app1_sentinel` is polled every minute, and the configuration is refreshed whenever changes are detected in the sentinel key.
386+
When you make changes to your data in Azure App Configuration, you might want those changes to be refreshed automatically in your Kubernetes cluster. In the following sample, the Kubernetes provider checks Azure App Configuration for updates every minute. The associated ConfigMap and Secret are regenerated only when changes are detected. For more information about monitoring configuration changes, see [Best practices for configuration refresh](./howto-best-practices.md#configuration-refresh).
389387

390388
``` yaml
391389
apiVersion: azconfig.io/v1
@@ -403,10 +401,6 @@ spec:
403401
refresh:
404402
enabled: true
405403
interval: 1m
406-
monitoring:
407-
keyValues:
408-
- key: app1_sentinel
409-
label: common
410404
```
411405

412406
### Key Vault references

0 commit comments

Comments
 (0)