Skip to content

Commit 3d27f73

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into afd-rules
2 parents aa09159 + 89bbc5a commit 3d27f73

File tree

980 files changed

+10786
-8154
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

980 files changed

+10786
-8154
lines changed

.openpublishing.redirection.json

Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,65 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/cdn/cdn-traffic-manager.md",
5+
"redirect_url": "/previous-versions/azure/cdn/cdn-traffic-manager",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/frontdoor/quickstart-create-front-door.md",
10+
"redirect_url": "/previous-versions/azure/frontdoor/quickstart-create-front-door",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/frontdoor/quickstart-create-front-door-terraform.md",
15+
"redirect_url": "/previous-versions/azure/frontdoor/quickstart-create-front-door-terraform",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/frontdoor/quickstart-create-front-door-template.md",
20+
"redirect_url": "/previous-versions/azure/frontdoor/quickstart-create-front-door-template",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/frontdoor/quickstart-create-front-door-powershell.md",
25+
"redirect_url": "/previous-versions/azure/frontdoor/quickstart-create-front-door-powershell",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/frontdoor/quickstart-create-front-door-cli.md",
30+
"redirect_url": "/previous-versions/azure/frontdoor/quickstart-create-front-door-cli",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "articles/frontdoor/quickstart-create-front-door-bicep.md",
35+
"redirect_url": "/previous-versions/azure/frontdoor/quickstart-create-front-door-bicep",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "articles/cloud-services/cloud-services-application-and-service-availability-faq.yml",
40+
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-application-and-service-availability-faq",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path": "articles/cloud-services/cloud-services-configuration-and-management-faq.yml",
45+
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-configuration-and-management-faq",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path": "articles/cloud-services/cloud-services-connectivity-and-networking-faq.yml",
50+
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-connectivity-and-networking-faq",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "articles/cloud-services/cloud-services-deployment-faq.yml",
55+
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-deployment-faq",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "articles/cloud-services/index.yml",
60+
"redirect_url": "/previous-versions/azure/cloud-services/index",
61+
"redirect_document_id": false
62+
},
363
{
464
"source_path": "articles/private-multi-access-edge-compute-mec/index.yml",
565
"redirect_url": "/previous-versions/azure/private-multi-access-edge-compute-mec/index",
@@ -6978,6 +7038,26 @@
69787038
"source_path": "articles/defender-for-iot/organizations/eiot-sensor.md",
69797039
"redirect_url": "/azure/defender-for-iot/organizations/concept-enterprise",
69807040
"redirect_document_id": false
7041+
},
7042+
{
7043+
"source_path": "articles/cyclecloud/release-notes/ccws/2024.09.18.md",
7044+
"redirect_url": "/azure/cyclecloud/release-notes/ccws/2024-09-18",
7045+
"redirect_document_id": false
7046+
},
7047+
{
7048+
"source_path": "articles/cyclecloud/release-notes/ccws/2024.11.08.md",
7049+
"redirect_url": "/azure/cyclecloud/release-notes/ccws/2024-11-08",
7050+
"redirect_document_id": false
7051+
},
7052+
{
7053+
"source_path": "articles/cyclecloud/release-notes/ccws/2024.12.18.md",
7054+
"redirect_url": "/azure/cyclecloud/release-notes/ccws/2024-12-18",
7055+
"redirect_document_id": false
7056+
},
7057+
{
7058+
"source_path": "articles/cyclecloud/release-notes/ccws/2025.02.06.md",
7059+
"redirect_url": "/azure/cyclecloud/release-notes/ccws/2025-02-06",
7060+
"redirect_document_id": false
69817061
}
69827062
]
69837063
}

articles/active-directory-b2c/identity-provider-adfs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ zone_pivot_groups: b2c-policy-type
3131

3232
To enable sign-in for users with an AD FS account in Azure Active Directory B2C (Azure AD B2C), create an Application Group in your AD FS. For more information, see [Build a web application using OpenID Connect with AD FS 2016 and later](../active-directory/develop/msal-migration.md)
3333

34-
To create an Application Group, follow theses steps:
34+
To create an Application Group, follow these steps:
3535

3636
1. In **Server Manager**, select **Tools**, and then select **AD FS Management**.
3737
1. In AD FS Management, right-click on **Application Groups** and select **Add Application Group**.

articles/active-directory-b2c/password-complexity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ Allows you to control the different character types used in the password.
8383

8484
- **2 of 4: Lowercase character, Uppercase character, Number (0-9), Symbol** ensures the password contains at least two character types. For example, a number and a lowercase character.
8585
- **3 of 4: Lowercase character, Uppercase character, Number (0-9), Symbol** ensures the password contains at least three character types. For example, a number, a lowercase character and an uppercase character.
86-
- **4 of 4: Lowercase character, Uppercase character, Number (0-9), Symbol** ensures the password contains all for character types.
86+
- **4 of 4: Lowercase character, Uppercase character, Number (0-9), Symbol** ensures the password contains all four character types.
8787

8888
> [!NOTE]
8989
> Requiring **4 of 4** can result in end-user frustration. Some studies have shown that this requirement doesn't improve password entropy. See [NIST Password Guidelines](https://pages.nist.gov/800-63-3/sp800-63b.html#appA)

articles/active-directory-b2c/policy-keys-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ If an Azure AD B2C keyset has multiple keys, only one of the keys is active at a
7575
- When the current date and time is greater than a key's activation date, Azure AD B2C activates the key and stop using the prior active key.
7676
- When the current key's expiration time has elapsed and the key container contains a new key with valid *nbf (not before)* and *exp (expiration)* times, the new key becomes active automatically. New tokens are signed with the newly active key. It's possible to keep an expired key published for token validation until disabled by an admin, but this must be requested by [filing a support request](/azure/active-directory-b2c/find-help-open-support-ticket).
7777

78-
- When the current key's expiration time has elapsed and the key container *doesn't* contain a new key with valid *not before* and *expiration* times, Azure AD B2C won't be able to use the expired key. Azure AD B2C raises an error message within a dependant component of your custom policy. To avoid this issue, you can create a default key without activation and expiration dates as a safety net.
78+
- When the current key's expiration time has elapsed and the key container *doesn't* contain a new key with valid *not before* and *expiration* times, Azure AD B2C won't be able to use the expired key. Azure AD B2C raises an error message within a dependent component of your custom policy. To avoid this issue, you can create a default key without activation and expiration dates as a safety net.
7979
- The key's endpoint (JWKS URI) of the OpenId Connect well-known configuration endpoint reflects the keys configured in the Key Container, when the Key is referenced in the [JwtIssuer Technical Profile](./jwt-issuer-technical-profile.md). An application using an OIDC library will automatically fetch this metadata to ensure it uses the correct keys to validate tokens. For more information, learn how to use [Microsoft Authentication Library](../active-directory/develop/msal-b2c-overview.md), which always fetches the latest token signing keys automatically.
8080

8181
:::image type="content" source="media/policy-keys-overview/key-rollover.png" alt-text="A diagram describing the process for key rollover in Azure AD B2C." lightbox="media/policy-keys-overview/key-rollover.png":::

articles/api-management/TOC.yml

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -204,24 +204,6 @@
204204
href: sap-api.md
205205
- name: Import gRPC API
206206
href: grpc-api.md
207-
- name: Azure OpenAI and LLM APIs
208-
items:
209-
- name: AI gateway capabilities in API Management
210-
href: genai-gateway-capabilities.md
211-
- name: Import Azure AI Foundry API
212-
href: azure-ai-foundry-api.md
213-
- name: Import Azure OpenAI API
214-
href: azure-openai-api-from-specification.md
215-
- name: Import OpenAI-compatible LLM API
216-
href: openai-compatible-llm-api.md
217-
- name: Authenticate and authorize to Azure OpenAI
218-
href: api-management-authenticate-authorize-azure-openai.md
219-
- name: Expose REST API as MCP server
220-
href: export-rest-mcp-server.md
221-
- name: Semantic caching for Azure OpenAI API requests
222-
href: azure-openai-enable-semantic-caching.md
223-
- name: Protect Azure OpenAI keys
224-
href: /semantic-kernel/deploy/use-ai-apis-with-api-management?toc=%2Fazure%2Fapi-management%2Ftoc.json&bc=/azure/api-management/breadcrumb/toc.json
225207
- name: Configure API for SSE
226208
href: how-to-server-sent-events.md
227209
- name: API import restrictions
@@ -250,6 +232,24 @@
250232
href: api-management-howto-cache.md
251233
- name: Custom caching
252234
href: api-management-sample-cache-by-key.md
235+
- name: API management for AI
236+
items:
237+
- name: AI gateway capabilities in API Management
238+
href: genai-gateway-capabilities.md
239+
- name: Import Azure AI Foundry API
240+
href: azure-ai-foundry-api.md
241+
- name: Import Azure OpenAI API
242+
href: azure-openai-api-from-specification.md
243+
- name: Import OpenAI-compatible LLM API
244+
href: openai-compatible-llm-api.md
245+
- name: Authenticate and authorize to Azure OpenAI
246+
href: api-management-authenticate-authorize-azure-openai.md
247+
- name: Expose REST API as MCP server
248+
href: export-rest-mcp-server.md
249+
- name: Semantic caching for Azure OpenAI API requests
250+
href: azure-openai-enable-semantic-caching.md
251+
- name: Protect Azure OpenAI keys
252+
href: /semantic-kernel/deploy/use-ai-apis-with-api-management?toc=%2Fazure%2Fapi-management%2Ftoc.json&bc=/azure/api-management/breadcrumb/toc.json
253253
- name: Manage APIs with policies
254254
items:
255255
- name: API Management policies overview

articles/api-management/api-management-howto-autoscale.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: how-to
9-
ms.date: 02/06/2024
9+
ms.date: 06/03/2025
1010
ms.author: danlep
1111
ms.custom: engagement-fy23
1212
---
@@ -22,7 +22,6 @@ The article walks through the process of configuring autoscale and suggests opti
2222
> [!NOTE]
2323
> * In service tiers that support multiple scale units, you can also [manually scale](upgrade-and-scale.md) your API Management instance.
2424
> * An API Management service in the **Consumption** tier scales automatically based on the traffic - without any additional configuration needed.
25-
> * Currently, autoscale is not supported for the [workspace gateway](workspaces-overview.md#workspace-gateway) in API Management workspaces.
2625
2726
[!INCLUDE [api-management-service-update-behavior](../../includes/api-management-service-update-behavior.md)]
2827

@@ -41,15 +40,15 @@ Certain limitations and consequences of scaling decisions need to be considered
4140

4241
+ The [pricing tier](api-management-features.md) of your API Management instance determines the [maximum number of units](upgrade-and-scale.md#upgrade-and-scale) you may scale to. For example, the **Standard tier** can be scaled to 4 units. You can add any number of units to the **Premium** tier.
4342
+ If the service is locked by another operation, the scaling request will fail and retry automatically.
44-
+ If your service instance is deployed in multiple regions (locations), only units in the **Primary location** can be autoscaled with Azure Monitor autoscale. Units in other locations can only be scaled manually.
45-
+ If your service instance is configured with [availability zones](zone-redundancy.md) in the **Primary location**, be aware of the number of zones when configuring autoscaling. The number of API Management units in autoscale rules and limits must be a multiple of the number of zones.
43+
+ If your service instance is deployed in multiple regions (locations), only units in the **Primary location** can be autoscaled with Azure Monitor autoscale. Units in other locations can be scaled manually or using custom scaling tools.
44+
+ If your service instance is configured with [availability zones](zone-redundancy.md) in the **Primary location**, we recommend leaving the default **Automatic** setting for availability zones. If you select specific zones, the number of API Management units in autoscale rules and limits must be a multiple of the number of zones configured.
4645

4746
## Enable and configure autoscale for an API Management instance
4847

4948
Follow these steps to configure autoscale for an Azure API Management service:
5049

5150
1. Sign in to the [Azure portal](https://portal.azure.com), and navigate to your API Management instance.
52-
1. In the left menu, select **Scale out (auto-scale)**, and then select **Custom autoscale**.
51+
1. In the left menu, select **Deployment + infrastructure** > **Scale out (auto-scale)**, and then select **Custom autoscale**.
5352

5453
:::image type="content" source="media/api-management-howto-autoscale/01.png" alt-text="Screenshot of scale-out options in the portal.":::
5554

articles/api-management/configure-custom-domain.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: azure-api-management
99
ms.topic: how-to
10-
ms.date: 05/09/2025
10+
ms.date: 05/30/2025
1111
ms.author: danlep
1212
ms.custom:
1313
- engagement-fy23
@@ -50,10 +50,10 @@ There are several API Management endpoints to which you can assign a custom doma
5050
| Endpoint | Default |
5151
| -------- | ----------- |
5252
| **Gateway** | Default is: `<apim-service-name>.azure-api.net`. Gateway is the only endpoint available for configuration in the Consumption tier.<br/><br/>The default Gateway endpoint configuration remains available after a custom Gateway domain is added. |
53-
| **Developer portal** | Default is: `<apim-service-name>.developer.azure-api.net` |
54-
| **Management** | Default is: `<apim-service-name>.management.azure-api.net` |
55-
| **Configuration API (v2)** | Default is: `<apim-service-name>.configuration.azure-api.net` |
56-
| **SCM** | Default is: `<apim-service-name>.scm.azure-api.net` |
53+
| **Developer portal** (all tiers except Consumption) | Default is: `<apim-service-name>.developer.azure-api.net` |
54+
| **Management** (classic tiers only) | Default is: `<apim-service-name>.management.azure-api.net` |
55+
| **Self-hosted gateway configuration API (v2)** | Default is: `<apim-service-name>.configuration.azure-api.net` |
56+
| **SCM** (classic tiers only) | Default is: `<apim-service-name>.scm.azure-api.net` |
5757

5858
### Considerations
5959

@@ -62,6 +62,7 @@ There are several API Management endpoints to which you can assign a custom doma
6262
* Only API Management instance owners can use **Management** and **SCM** endpoints internally. These endpoints are less frequently assigned a custom domain name.
6363
* The **Premium** and **Developer** tiers support setting multiple hostnames for the **Gateway** endpoint.
6464
* Wildcard domain names, like `*.contoso.com`, are supported in all tiers except the Consumption tier. A specific subdomain certificate (for example, api.contoso.com) would take precedence over a wildcard certificate (*.contoso.com) for requests to api.contoso.com.
65+
* When configuing a custom domain for the **Developer portal**, you can [enable CORS](enable-cors-developer-portal.md) for the new domain name. This is needed for developer portal visitors to use the interactive console in the API reference pages.
6566

6667
## Domain certificate options
6768

articles/api-management/configure-service-update-settings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,15 +15,15 @@ ms.author: danlep
1515

1616
This article shows you how to configure *service update* settings (preview) in your API Management instance. Azure periodically applies service updates automatically to API Management instances, using a phased rollout approach. These updates include new features, security enhancements, and reliability improvements.
1717

18-
You can't control exactly when Azure updates each API Management instance, but in select service tiers you can choose an *update group* for your instance so that it receives updates earlier or later than it usually would during an update rollout. You can also configure a *maintenance window* during the day when you want your instance to receive updates.
18+
You can't control exactly when Azure updates each API Management instance, but in select service tiers you can choose an *update group* (also called a *release channel*) for your instance so that it receives updates earlier or later than it usually would during an update rollout. You can also configure a *maintenance window* during the day when you want your instance to receive updates.
1919

2020
* **Update group** - A set of instances that receive API Management service updates during a production rollout, which can take from several days to several weeks to complete.
2121

2222
Choose from:
2323
* **Early** - Receive updates early in the rollout, for testing and early access to new features. This option is not recommended for production deployments.
2424
* **Default** - Receive updates as part of the regular release rollout. This option is recommended for most services, including production deployments.
2525
* **Late** - Receive updates later than the previous groups, typically weeks after the initial rollout. This option is recommended for mission-critical deployments only.
26-
* **AI Gateway Early** (GenAI release) - Get early access to the latest [AI gateway features and updates](genai-gateway-capabilities.md) before they reach other update groups. Receive other service updates as part of the **Late** rollout group.
26+
* **AI Gateway Early** (GenAI release channel) - Get early access to the latest [AI gateway features and updates](genai-gateway-capabilities.md) before they reach other update groups. Receive other service updates as part of the **Late** rollout group.
2727

2828
> [!NOTE]
2929
> Azure deploys all updates using a [safe deployment practices (SDP) framework](https://azure.microsoft.com/blog/advancing-safe-deployment-practices/). Updates released early in a rollout might be less stable and replaced later by stable releases. All instances are eventually updated to the most stable release builds.

0 commit comments

Comments
 (0)