Skip to content

Commit 5887785

Browse files
authored
Merge pull request #294173 from MicrosoftDocs/main
2/6/2025 11:00 AM IST Publish
2 parents c7215a9 + 5951eaf commit 5887785

File tree

18 files changed

+1424
-1392
lines changed

18 files changed

+1424
-1392
lines changed

articles/app-service/monitor-instances-health-check.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -74,16 +74,18 @@ If you're using your own authentication system, the Health check path must allow
7474

7575
```C#
7676
using System;
77+
using System.Security.Cryptography;
7778
using System.Text;
7879

7980
/// <summary>
8081
/// Method <c>HeaderMatchesEnvVar</c> returns true if <c>headerValue</c> matches WEBSITE_AUTH_ENCRYPTION_KEY.
8182
/// </summary>
82-
public Boolean HeaderMatchesEnvVar(string headerValue) {
83-
var sha = System.Security.Cryptography.SHA256.Create();
84-
String envVar = Environment.GetEnvironmentVariable("WEBSITE_AUTH_ENCRYPTION_KEY");
85-
String hash = System.Convert.ToBase64String(sha.ComputeHash(Encoding.UTF8.GetBytes(envVar)));
86-
return hash == headerValue;
83+
public bool HeaderMatchesEnvVar(string headerValue)
84+
{
85+
var sha = SHA256.Create();
86+
string envVar = Environment.GetEnvironmentVariable("WEBSITE_AUTH_ENCRYPTION_KEY");
87+
string hash = Convert.ToBase64String(sha.ComputeHash(Encoding.UTF8.GetBytes(envVar)));
88+
return string.Equals(hash, headerValue, StringComparison.Ordinal);
8789
}
8890
```
8991

articles/azure-cache-for-redis/cache-remove-tls-10-11.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to remove TLS 1.0 and 1.1 from your application when comm
44

55

66
ms.topic: conceptual
7-
ms.date: 12/09/2024
7+
ms.date: 02/05/2025
88

99
ms.custom: devx-track-azurepowershell, devx-track-azurecli
1010

@@ -25,15 +25,14 @@ TLS versions 1.0 and 1.1 also don't support the modern encryption methods and ci
2525
As a part of this effort, you can expect the following changes to Azure Cache for Redis:
2626

2727
- _Phase 1_: Azure Cache for Redis stops offering TLS 1.0/1.1 as an option for _MinimumTLSVersion_ setting for new cache creates. Existing cache instances won't be updated at this point. You can't set the _MinimumTLSVersion_ to 1.0 or 1.1 for your existing cache.
28-
- _Phase 2_: Azure Cache for Redis stops supporting TLS 1.1 and TLS 1.0 starting March 1, 2025. After this change, your application must use TLS 1.2 or later to communicate with your cache. The Azure Cache for Redis service remains available while we update the _MinimumTLSVersion_ for all caches to 1.2.
29-
28+
- _Phase 2_: Azure Cache for Redis stops supporting TLS 1.1 and TLS 1.0 starting April 1, 2025. After this change, your application must use TLS 1.2 or later to communicate with your cache. The Azure Cache for Redis service remains available while we update the _MinimumTLSVersion_ for all caches to 1.2.
3029

3130
| Date | Description |
3231
|--|--|
3332
| September 2023 | TLS 1.0/1.1 retirement announcement |
34-
| March 1, 2024 | Beginning March 1, 2024, you can't create new caches with the Minimum TLS version set to 1.0 or 1.1 and you can't set the _MinimumTLSVersion_ to 1.0 or 1.1 for your existing cache. The minimum TLS version aren't updated automatically for existing caches at this point. |
33+
| March 1, 2024 | Beginning March 1, 2024, you can't create new caches with the Minimum TLS version set to 1.0 or 1.1 and you can't set the _MinimumTLSVersion_ to 1.0 or 1.1 for your existing cache. The minimum TLS versions aren't updated automatically for existing caches at this point. |
3534
| March 31, 2025 | Ensure that all your applications are connecting to Azure Cache for Redis using TLS 1.2 and Minimum TLS version on your cache settings is set to 1.2. |
36-
| Starting April 1, 2025 | Minimum TLS version for all cache instances is updated to 1.2. This means Azure Cache for Redis instances *reject* connections using TLS 1.0 or 1.1 at this point. |
35+
| Starting April 1, 2025 | Minimum TLS version for all cache instances is updated to 1.2. This means Azure Cache for Redis instances reject connections using TLS 1.0 or 1.1 at this point. |
3736

3837
As part of this change, Azure Cache for Redis removes support for older cipher suites that aren't secure. Supported cipher suites are restricted to the following suites when the cache is configured with a minimum of TLS 1.2:
3938

@@ -44,9 +43,9 @@ The following sections provide guidance about how to detect dependencies on thes
4443

4544
## Check TLS versions supported by your Azure Cache for Redis
4645

47-
You can verify that **Minimum TLS version** value is set to TLS 1.2 in the [Advanced settings](cache-configure.md#advanced-settings) of your cache in the Azure portal. If it is any value other than TLS 1.2, then ensure you follow the instructions to [Configure your Azure Cache for Redis to use TLS 1.2](#configure-your-azure-cache-for-redis-to-use-tls-12). If the value is TLS 1.2, and your client application is able to connect without any errors, then no action is needed.
46+
You can verify that **Minimum TLS version** value is set to TLS 1.2 in the [Advanced settings](cache-configure.md#advanced-settings) of your cache in the Azure portal. If it is any value other than TLS 1.2, then ensure you follow the instructions in section [Configure your Azure Cache for Redis to use TLS 1.2](#configure-your-azure-cache-for-redis-to-use-tls-12). If the value is TLS 1.2, and your client application is able to connect without any errors, then no action is needed.
4847

49-
You can also use this PowerShell script to verify the minimum TLS version supported by your Azure Cache for Redis endpoint. If your Redis instance is virtual network (VNet) injected, you have to run this script from a Virtual Machine in your VNet that has access to the Azure Cache for Redis endpoint. If the result shows `Tls Enabled` and/or `Tls 11 Enabled`, then ensure you follow the instructions to [Configure your Azure Cache for Redis to use TLS 1.2](#configure-your-azure-cache-for-redis-to-use-tls-12). If the result shows only `Tls12 Enabled` and your client application is able to connect without any errors, then no action is needed.
48+
You can also use this PowerShell script to verify the minimum TLS version supported by your Azure Cache for Redis endpoint. If your Redis instance is virtual network (VNet) injected, you have to run this script from a Virtual Machine in your VNet that has access to the Azure Cache for Redis endpoint. If the result shows `Tls Enabled` and/or `Tls 11 Enabled`, then ensure you follow the instructions in section [Configure your Azure Cache for Redis to use TLS 1.2](#configure-your-azure-cache-for-redis-to-use-tls-12). If the result shows only `Tls12 Enabled` and your client application is able to connect without any errors, then no action is needed.
5049

5150
```powershell
5251
param(
@@ -106,8 +105,6 @@ You can configure TLS 1.2 on the cache by setting the **Minimum TLS version** va
106105

107106
1. Select **1.2** in the **Minimum TLS version** in the working pane. Then, select **Save**.
108107

109-
:::image type="content" source="media/cache-remove-tls-10-11/change-redis-tls-version.png" alt-text="Screenshot showing the Set TLS 1.2 for cache on Azure portal":::
110-
111108
You can also do the same using PowerShell. You need the Az.RedisCache module already installed before running the command.
112109

113110
```powershell

articles/azure-government/compare-azure-government-global-azure.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -333,11 +333,7 @@ Application Insights (part of Azure Monitor) enables the same features in both A
333333
>[!NOTE]
334334
>Although these addresses are static, it's possible that we'll need to change them from time to time. All Application Insights traffic represents outbound traffic except for availability monitoring and webhooks, which require inbound firewall rules.
335335
336-
You need to open some **outgoing ports** in your server's firewall to allow the Application Insights SDK and/or Status Monitor to send data to the portal:
337-
338-
|Purpose|URL|IP address|Ports|
339-
|-------|---|----------|-----|
340-
|Telemetry|dc.applicationinsights.us|23.97.4.113|443|
336+
To allow the Application Insights SDK/agent to send data to the Application Insights resource, you need to allow access to the regional endpoint defined in your connection string and open the **outgoing port 443** in your firewall. To learn more about the endpoint suffix, see [Connection strings in Application Insights](/azure/azure-monitor/app/connection-strings#connection-string-with-an-endpoint-suffix).
341337

342338
### [Cost Management and Billing](../cost-management-billing/index.yml)
343339

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
title: Services available in Azure Communication Services
3+
description: Learn about the services provided by Azure Communication Services.
4+
author: sroons
5+
ms.author: serooney
6+
ms.service: azure-communication-services
7+
ms.topic: conceptual
8+
ms.date: 01/01/2024
9+
ms.custom: template-concept
10+
---
11+
12+
# Services
13+
14+
Azure Communication Services provides the following cloud-based communication and customer engagement features you can integrate with your applications.
15+
16+
- [Identity](./identity-model.md) – The identity-agnostic model maps your existing users to Azure Communication Services identities.
17+
- [Chat](./chat/concepts.md) – Add real-time text communication to your cross-platform application.
18+
- [Email](./email/email-overview.md) – Integrate email into your application for high-volume transactional, bulk, and marketing emails.
19+
- [Short Message Service (SMS)](./sms/concepts.md) – Send and receive SMS text messages using SMS SDKs.
20+
- [Advanced messaging with WhatsApp](./advanced-messaging/whatsapp/whatsapp-overview.md) – Send and receive WhatsApp messages using the Messaging SDK.
21+
- [Voice and video calling](./voice-video-calling/calling-sdk-features.md) – Embed voice and video calls into websites and native applications.
22+
- [Phone calling](./telephony/telephony-concept.md) – Add telephony and Public Switched Telephone Network (PSTN) access to your application.
23+
- [Call Automation](./call-automation/call-automation.md) – Build personalized customer interaction call workflows and call recording for voice and PSTN channels.
24+
- [Teams interoperability](./teams-interop.md) – Enable interaction between Microsoft Teams and Azure Communication Services.
25+
- [Job Router](./router/concepts.md) – Manage and optimize customer interactions between different communication applications.
26+
- [Artificial Intelligence (AI)](./ai.md) – Add AI features such as voice bots and voice data transformation to your applications.
27+
- [User Interface (UI) Library](./ui-library/ui-library-overview.md) – Build modern communications user experiences using a library of production-ready UI components.
28+
29+
## Related topics
30+
31+
- [Common Scenarios including virtual appointments](interop/virtual-visits/overview.md)
32+
- [Troubleshooting in Azure Communication Services](troubleshooting-info.md)

0 commit comments

Comments
 (0)