Skip to content

Commit 4eb4ed4

Browse files
committed
Merge branch 'main' into release-storage-discovery-2025
2 parents 2bbf261 + 0c35066 commit 4eb4ed4

File tree

356 files changed

+10361
-5684
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

356 files changed

+10361
-5684
lines changed

articles/active-directory-b2c/service-limits.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: azure-active-directory
99

1010
ms.topic: reference
11-
ms.date: 07/15/2025
11+
ms.date: 07/29/2025
1212
ms.subservice: b2c
1313
zone_pivot_groups: b2c-policy-type
1414

@@ -211,17 +211,22 @@ As a protection for our customers, Microsoft places some restrictions on telepho
211211
| 261 | Madagascar | 10 | 30 |
212212
| 263 | Zimbabwe | 10 | 30 |
213213
| 265 | Malawi  | 10 | 30 |
214+
| 266 | Lesotho | 10 | 30 |
215+
| 359 | Bulgaria | 20 | 100
214216
| 373 | Moldova | 20 | 100 |
215217
| 375 | Belarus   | 10 | 30 |
218+
| 380 | Ukraine | 50 | 200 |
216219
| 381 | Serbia | 50 | 200 |
217220
| 386 | Slovenia | 10 | 50 |
218221
| 501 | Belize| 10 | 30 |
219-
| 502 | Guatemala | 10 | 50
222+
| 502 | Guatemala | 10 | 50 |
220223
| 503 | El Salvador | 10 | 30 |
224+
| 504 | Honduras | 50 | 200 |
221225
| 52 | Mexico | 100 | 500 |
222226
| 53 | Cuba | 10 | 30 |
223227
| 58 | Venezuela| 10 | 30 |
224228
| 591 | Bolivia | 10 | 30 |
229+
| 593 | Ecuador | 20 | 100 |
225230
| 60 | Malaysia | 50 | 200 |
226231
| 62 | Indonesia | 50 | 200 |
227232
| 63 | Philippines | 50 | 200 |
@@ -239,6 +244,7 @@ As a protection for our customers, Microsoft places some restrictions on telepho
239244
| 961 | Lebanon  | 10 | 30 |
240245
| 963 | Syria  | 10 | 30 |
241246
| 964 | Iraq | 50 | 200 |
247+
| 965 | Kuwait | 50 | 200 |
242248
| 967 | Yemen |10 | 30 |
243249
| 970 | State of Palestine| 10 | 30 |
244250
| 972 | Israel  | 50 | 200 |
@@ -250,7 +256,7 @@ As a protection for our customers, Microsoft places some restrictions on telepho
250256
| 994 | Azerbaijan | 50 | 200 |
251257
| 995 | Georgia | 10 | 30 |
252258
| 996 | Kyrgyzstan  | 10 | 30 |
253-
| 998 | Uzbekistan | 10 | 30
259+
| 998 | Uzbekistan | 10 | 30 |
254260

255261
## Next steps
256262

articles/api-management/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -680,7 +680,7 @@
680680
href: breaking-changes/git-configuration-retirement-march-2025.md
681681
- name: Direct management API retirement (March 2025)
682682
href: breaking-changes/direct-management-api-retirement-march-2025.md
683-
- name: Managed certificates suspension (August 2025)
683+
- name: Managed certificates suspension (August 2025 - March 2026)
684684
href: breaking-changes/managed-certificates-suspension-august-2025.md
685685
- name: ADAL-based identity provider retirement (September 2025)
686686
href: breaking-changes/identity-provider-adal-retirement-sep-2025.md
@@ -695,4 +695,4 @@
695695
- name: Stack Overflow
696696
href: https://stackoverflow.com/questions/tagged/azure-api-management
697697
- name: aka.ms/apimlove
698-
href: https://aka.ms/apimlove
698+
href: https://aka.ms/apimlove

articles/api-management/breaking-changes/managed-certificates-suspension-august-2025.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,13 +10,15 @@ ms.date: 07/18/2025
1010
ms.author: danlep
1111
---
1212

13-
# Creation of managed certificates temporarily suspended for custom domains (August 2025)
13+
# Creation of managed certificates temporarily suspended for custom domains (August 2025 - March 2026)
1414

1515
[!INCLUDE [premium-dev-standard-basic.md](../../../includes/api-management-availability-premium-dev-standard-basic.md)]
1616

1717
Creation of Azure-managed certificates for custom domains in API Management will be temporarily turned off from August 15, 2025 to March 15, 2026. Existing managed certificates will be autorenewed and remain unaffected.
1818

19-
In the classic service tiers, Azure API Management offers [free, managed TLS certificates for custom domains](../configure-custom-domain.md#domain-certificate-options) (preview), allowing customers to secure their endpoints without purchasing and managing their own certificates. Because of an industry-wide deprecation of CNAME-based Domain Control Validation (DCV), our Certificate Authority (CA), DigiCert, will migrate to a new validation platform to meet Multi-Perspective Issuance Corroboration (MPIC) requirements for issuing certificates. This migration requires us to temporarily suspend the creation of managed certificates for custom domains.
19+
In the classic service tiers, Azure API Management offers [free, managed TLS certificates for custom domains](../configure-custom-domain.md#domain-certificate-options) (preview), allowing customers to secure their endpoints without purchasing and managing their own certificates. Because of an industry-wide deprecation of CNAME-based Domain Control Validation (DCV), our Certificate Authority (CA), DigiCert, is moving to a new open-source software (OSS) domain control validation (DCV) platform that provides transparency and accountability increasing the trustworthiness of domain validation. As part of this transition, DigiCert will deprecate support for the legacy CNAME Delegation DCV workflow. This migration requires us to temporarily suspend the creation of managed certificates for custom domains.
20+
21+
Note that this does not impact the standard CNAME DCV workflow (where DigiCert validates a random value in the CNAME record) which is still supported in the OSS validation system. This change affects several Azure services that currently rely on the soon-to-be deprecated CNAME for automated certificate issuance and renewal.
2022

2123
## Is my service affected by this?
2224

articles/api-management/breaking-changes/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ The following table lists all the upcoming breaking changes and feature retireme
3030
| [Git repository retirement][git2025] | March 15, 2025 |
3131
| [Direct management API retirement][mgmtapi2025] | March 15, 2025 |
3232
| [Workspaces preview breaking changes, part 2][workspaces2025march] | March 31, 2025 |
33-
| [Managed certificates suspension][managed-certificates-suspension-august-2025] | August 15, 2025 |
33+
| [Managed certificates suspension][managed-certificates-suspension-august-2025] | August 15, 2025 - March 15, 2026|
3434
| [ADAL-based Microsoft Entra ID identity provider retirement][msal2025] | September 30, 2025 |
3535
| [CAPTCHA endpoint update][captcha2025] | September 30, 2025 |
3636
| [Built-in analytics dashboard retirement][analytics2027] | March 15, 2027 |

articles/api-management/export-rest-mcp-server.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ In this article, you learn how to:
3737
+ Make sure that your instance manages a REST API that you'd like to expose as an MCP server. To import a sample API, see [Import and publish your first API](import-and-publish.md).
3838
> [!NOTE]
3939
> Only HTTP APIs from API Management can be exposed as MCP servers.
40+
+ If you’ve enabled diagnostic logging via Application Insights or Azure Monitor at the global scope (All APIs) for your API Management service instance, ensure that the “Number of payload bytes to log” setting for Frontend Response is set to 0. This prevents unintended logging of response bodies across all APIs and helps ensure proper functioning of MCP servers. To log payloads selectively for specific APIs, configure the setting individually at the API scope, allowing targeted control over response logging.
4041
+ To test the MCP server, you can use Visual Studio Code with access to [GitHub Copilot](https://code.visualstudio.com/docs/copilot/setup).
4142

4243

@@ -62,6 +63,8 @@ The MCP server is created and the API operations are exposed as tools. The MCP s
6263
:::image type="content" source="media/export-rest-mcp-server/mcp-server-list.png" alt-text="Screenshot of the MCP server list in the portal.":::
6364
6465
## Configure policies for the MCP server
66+
> [!IMPORTANT]
67+
> Do not access the response body using `context.Response.Body` within MCP server policies. Doing so triggers response buffering, which interferes with the streaming behavior required by MCP servers and may cause them to malfunction.
6568
6669
Configure one or more API Management [policies](api-management-howto-policies.md) to help manage the MCP server. The policies are applied to all API operations exposed as tools in the MCP server and can be used to control access, authentication, and other aspects of the tools.
6770

articles/application-gateway/retirement-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: application-gateway
66
author: mbender-ms
77
ms.service: azure-application-gateway
88
ms.topic: how-to
9-
ms.date: 04/18/2024
9+
ms.date: 07/31/2025
1010
ms.author: mbender
1111
# Customer intent: "As an existing Application Gateway V1 customer, I want to understand the migration process to V2 and its timeline, so that I can ensure my services remain operational and avoid disruptions before the retirement of V1 on April 28, 2026."
1212
---
@@ -41,7 +41,7 @@ On April 28, 2026, the V1 gateways are fully retired and all active AppGateway V
4141

4242
### Does the retirement of Basic SKU Public IPs in September 2025 affect my existing V1 Application Gateways?
4343

44-
Existing V1 Application Gateways will continue to function normally until April 2026. However, creation of new V1 Application Gateways will be disabled after August 2024. We strongly recommend that you plan and migrate your existing V1 Application Gateways to V2 as soon as possible to ensure a smooth transition.
44+
While the Basic SKU Public IPs are scheduled for retirement by September 2025, the Basic IP resources linked to Application Gateway V1 deployments will not be impacted until the retirement of V1 Application Gateways. This will be handled by Microsoft and needs no customer intervention.
4545

4646
### How do I migrate my application gateway V1 to V2 SKU?
4747

articles/application-gateway/understanding-pricing.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -54,16 +54,13 @@ You can also pre-provision resources by specifying the **Instance Count**. Each
5454

5555
Manually defined scale and limits set for autoscaling (minimum or maximum) are set in terms of instance count. The manually set scale for instance count and the minimum instance count in autoscale config reserves 10 capacity units/instance. These reserved capacity units are billed as long as the application gateway is active regardless of the actual resource consumption. If actual consumption crosses the 10 capacity units/instance threshold, additional capacity units are billed under the variable component.
5656

57-
> [!NOTE]
58-
> An **Instance** is a physical deployment unit of Application Gateway. Users aren't billed directly for the number of instances, but rather for the capacity units reserved or consumed by the instances.
59-
6057
#### Total capacity units
6158

6259
Total capacity units are calculated based on the higher of the capacity units by utilization or by instance count.
6360

6461
### Compute unit
6562

66-
**Compute Unit** is the measure of compute capacity consumed. Factors affecting compute unit consumption are TLS connections/second, URL Rewrite computations, and WAF rule processing. The number of requests a compute unit can handle depends on various criteria like TLS certificate key size, key exchange algorithm, header rewrites, and in case of WAF: incoming request size.
63+
**Compute units** are an entirely different concept from capacity units. Compute units are a measure of compute capacity consumed, while capacity units are a measure of capacity utilization across multiple parameters. Compute units are one of three parameters used to calculate capacity units. Factors affecting compute unit consumption are TLS connections/second, URL Rewrite computations, and WAF rule processing. The number of requests a compute unit can handle depends on various criteria like TLS certificate key size, key exchange algorithm, header rewrites, and in case of WAF: incoming request size.
6764

6865
Compute unit guidance:
6966
* Basic_v2 (preview) - Each compute unit is capable of approximately 10 connections per second with RSA 2048-bit key TLS certificate.
@@ -72,9 +69,6 @@ Compute unit guidance:
7269

7370
The following table shows example prices using Application Gateway Standard v2 SKU. These prices are based on a snapshot of East US pricing and are for illustration purposes only.
7471

75-
> [!NOTE]
76-
> Compute units are an entirely different concept from capacity units. Compute units are a measure of compute capacity consumed, while capacity units are a measure of capacity utilization across multiple parameters. Compute units are one of three parameters used to calculate capacity units.
77-
7872
### How much traffic can an instance handle?
7973

8074
Each instance of Application Gateway Standard_v2 can handle the following traffic:

articles/azure-maps/migrate-find-location-by-point.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ https://dev.virtualearth.net/REST/v1/Locations/48.830345,2.338166&key={BingMapsK
5959
Azure Maps _Get Reverse Geocoding_ API request:
6060

6161
``` http
62-
http://atlas.microsoft.com/reverseGeocode?api-version=2023-06-01&coordinates=2.338166,48.830345&subscription-key={Your-Azure-Maps-Subscription-key}
62+
https://atlas.microsoft.com/reverseGeocode?api-version=2023-06-01&coordinates=2.338166,48.830345&subscription-key={Your-Azure-Maps-Subscription-key}
6363
```
6464

6565
## Response fields

articles/azure-netapp-files/azure-government.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Azure NetApp Files for Azure Government | Microsoft Docs
2+
title: Azure NetApp Files for Azure Government
33
description: Learn how to connect to Azure Government to use Azure NetApp Files and the Azure NetApp Files feature availability in Azure Government.
44
services: azure-netapp-files
55
author: b-hchen
66
ms.service: azure-netapp-files
77
ms.custom: devx-track-azurecli, no-azure-ad-ps-ref
88
ms.topic: concept-article
9-
ms.date: 05/21/2025
9+
ms.date: 07/28/2025
1010
ms.author: anfdocs
1111
# Customer intent: As a government IT administrator, I want to understand how to access and utilize Azure NetApp Files in Azure Government, so that I can effectively manage mission-critical workloads within the dedicated cloud environment.
1212
---
@@ -26,7 +26,7 @@ All [Azure NetApp Files features](whats-new.md) available on Azure public cloud
2626
| Azure NetApp Files features | Azure public cloud availability | Azure Government availability |
2727
|:--- |:--- |:--- |
2828
| Azure NetApp Files customer-managed key with managed Hardware Security Module | Generally available | No |
29-
| Azure NetApp Files file access logs | Public preview | No |
29+
| Azure NetApp Files file access logs | Public preview | [Limited regional support](manage-file-access-logs.md#supported-regions) |
3030

3131
## Portal access
3232

0 commit comments

Comments
 (0)