Skip to content

Commit 5b40f36

Browse files
committed
Merge branch 'main' into release-esan-backup
2 parents 340d97f + b376541 commit 5b40f36

File tree

82 files changed

+764
-520
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

82 files changed

+764
-520
lines changed

articles/active-directory-b2c/string-transformations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -446,7 +446,7 @@ The following example generates an error message when an account is already in t
446446
</Localization>
447447
```
448448

449-
The claims transformation creates a response message based on the localized string. The message contains the user's email address embedded into the localized sting *ResponseMessage_EmailExists*.
449+
The claims transformation creates a response message based on the localized string. The message contains the user's email address embedded into the localized string *ResponseMessage_EmailExists*.
450450

451451
```xml
452452
<ClaimsTransformation Id="SetResponseMessageForEmailAlreadyExists" TransformationMethod="FormatLocalizedString">

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -211,8 +211,8 @@ Next, specify that the application should be treated as a public client:
211211
1. In the left menu, under **Manage**, select **Authentication**.
212212
1. Under **Advanced settings**, in the **Allow public client flows** section, set **Enable the following mobile and desktop flows** to **Yes**.
213213
1. Select **Save**.
214-
1. Ensure that **"isFallbackPublicClient": true** is set in the application manifest:
215-
1. In the left menu, under **Manage**, select **Manifest** to open application manifest.
214+
1. Ensure that **"isFallbackPublicClient": true** is set in the Microsoft Graph App Manifest(New):
215+
1. In the left menu, under **Manage**, select **Manifest** to open Microsoft Graph App Manifest(New)
216216
1. Switch from the **Microsoft Graph App Manifest (New)** tab to the **AAD Graph App Manifest (Deprecating Soon)** tab.
217217
1. Find **isFallbackPublicClient** key and ensure its value is set to **true**.
218218

articles/api-management/applications.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Protect Access to Product APIs with Microsoft Entra Application - Azure API Management
2+
title: Securely Access Products and APIs - Microsoft Entra Applications - Azure API Management
33
titleSuffix: Azure API Management
44
description: Configure OAuth 2.0 access to product APIs in Azure API Management with Microsoft Entra ID applications.
55
services: api-management
@@ -11,7 +11,7 @@ ms.date: 05/19/2025
1111
ms.author: danlep
1212
ms.custom:
1313
---
14-
# Secure product API access with Microsoft Entra applications
14+
# Securely access products and APIs with Microsoft Entra applications
1515

1616
[!INCLUDE [api-management-availability-premium-dev-standard-basic](../../includes/api-management-availability-premium-dev-standard-basic.md)]
1717

@@ -64,14 +64,14 @@ The following example uses the **Starter** product, but choose any published pro
6464
1. In the left menu, under **APIs**, select **Products**.
6565
1. Choose the product that you want to configure, such as the **Starter** product.
6666
1. In the left menu, under **Product**, select **Properties**.
67-
1. Enable the **Application based access** setting.
68-
1. Optionally, enable the **Requires subscription** setting. If you enable both application based access and a subscription requirement, the API Management gateway can accept either OAuth 2.0 authorization or a subscription key for access to the product's APIs.
67+
1. In the **Application based access** section, enable the **OAuth 2.0 token (most secure)** setting.
68+
1. Optionally, enable the **Subscription key** setting. If you enable both application based access and a subscription requirement, the API Management gateway can accept either an OAuth 2.0 token or a subscription key for access to the product's APIs.
6969
1. Select **Save**.
7070

7171
:::image type="content" source="media/applications/enable-application-based-access.png" alt-text="Screenshot of enabling application based access in the portal.":::
7272

7373
> [!TIP]
74-
> You can also enable the **Application based access** setting when creating a new product.
74+
> You can also enable the **OAuth 2.0 token** setting when creating a new product.
7575
7676
Enabling application based access creates a backend enterprise application in Microsoft Entra ID to represent the product. The backend application ID is displayed in the product's **Properties** page.
7777

42.4 KB
Loading
9.03 KB
Loading

articles/api-management/self-hosted-gateway-overview.md

Lines changed: 14 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -95,18 +95,20 @@ Self-hosted gateways require outbound TCP/IP connectivity to Azure on port 443.
9595

9696
To operate properly, each self-hosted gateway needs outbound connectivity on port 443 to the following endpoints associated with its cloud-based API Management instance:
9797

98-
| Description | Required for v1 | Required for v2 | Notes |
99-
|:------------|:---------------------|:---------------------|:------|
100-
| Hostname of the configuration endpoint | `<apim-service-name>.management.azure-api.net` | `<apim-service-name>.configuration.azure-api.net`<sup>1</sup> | Custom hostnames are also supported and can be used instead of the default hostname. |
101-
| Public IP address of the API Management instance | ✔️ | ✔️ | IP address of primary location is sufficient. |
102-
| Public IP addresses of Azure Storage [service tag](../virtual-network/service-tags-overview.md) | ✔️ | Optional<sup>2</sup> | IP addresses must correspond to primary location of API Management instance. |
103-
| Hostname of Azure Blob Storage account | ✔️ | Optional<sup>2</sup> | Account associated with instance (`<blob-storage-account-name>.blob.core.windows.net`) |
104-
| Hostname of Azure Table Storage account | ✔️ | Optional<sup>2</sup> | Account associated with instance (`<table-storage-account-name>.table.core.windows.net`) |
105-
| Endpoints for Azure Resource Manager | ✔️ | Optional<sup>3</sup> | Required endpoints are `management.azure.com`. |
106-
| Endpoints for Microsoft Entra integration | ✔️ | Optional<sup>4</sup> | Required endpoints are `<region>.login.microsoft.com` and `login.microsoftonline.com`. |
107-
| Endpoints for [Azure Application Insights integration](api-management-howto-app-insights.md) | Optional<sup>5</sup> | Optional<sup>5</sup> | Minimal required endpoints are:<ul><li>`rt.services.visualstudio.com:443`</li><li>`dc.services.visualstudio.com:443`</li><li>`{region}.livediagnostics.monitor.azure.com:443`</li></ul>Learn more in [Azure Monitor docs](/azure/azure-monitor/ip-addresses#outgoing-ports) |
108-
| Endpoints for [Event Hubs integration](api-management-howto-log-event-hubs.md) | Optional<sup>5</sup> | Optional<sup>5</sup> | Learn more in [Azure Event Hubs docs](../event-hubs/network-security.md) |
109-
| Endpoints for [external cache integration](api-management-howto-cache-external.md) | Optional<sup>5</sup> | Optional<sup>5</sup> | This requirement depends on the external cache that is being used |
98+
99+
| Endpoint | Required? | Notes |
100+
|:------------|:---------------------|:------|
101+
| Hostname of the configuration endpoint | `<apim-service-name>.configuration.azure-api.net`<sup>1</sup> | Custom hostnames are also supported and can be used instead of the default hostname. |
102+
| Public IP address of the API Management instance | ✔️ | IP address of primary location is sufficient. |
103+
| Public IP addresses of Azure Storage [service tag](../virtual-network/service-tags-overview.md) | Optional<sup>2</sup> | IP addresses must correspond to primary location of API Management instance. |
104+
| Hostname of Azure Blob Storage account | Optional<sup>2</sup> | Account associated with instance (`<blob-storage-account-name>.blob.core.windows.net`) |
105+
| Hostname of Azure Table Storage account | Optional<sup>2</sup> | Account associated with instance (`<table-storage-account-name>.table.core.windows.net`) |
106+
| Endpoints for Azure Resource Manager | Optional<sup>3</sup> | Required endpoints are `management.azure.com`. |
107+
| Endpoints for Microsoft Entra integration | Optional<sup>4</sup> | Required endpoints are `<region>.login.microsoft.com` and `login.microsoftonline.com`. |
108+
| Endpoints for [Azure Application Insights integration](api-management-howto-app-insights.md) | Optional<sup>5</sup> | Minimal required endpoints are:<ul><li>`rt.services.visualstudio.com:443`</li><li>`dc.services.visualstudio.com:443`</li><li>`{region}.livediagnostics.monitor.azure.com:443`</li></ul>Learn more in [Azure Monitor docs](/azure/azure-monitor/ip-addresses#outgoing-ports) |
109+
| Endpoints for [Event Hubs integration](api-management-howto-log-event-hubs.md) | Optional<sup>5</sup> | Learn more in [Azure Event Hubs docs](../event-hubs/network-security.md) |
110+
| Endpoints for [external cache integration](api-management-howto-cache-external.md) | Optional<sup>5</sup> | This requirement depends on the external cache that is being used |
111+
110112

111113
<sup>1</sup>For an API Management instance in an internal virtual network, see [Connectivity in an internal virtual network](#connectivity-in-internal-virtual-network).<br/>
112114
<sup>2</sup>Only required in v2 when API inspector or quotas are used in policies.<br/>
@@ -167,9 +169,6 @@ The following functionality found in the managed gateways is **not available** i
167169

168170
### Transport Layer Security (TLS)
169171

170-
> [!IMPORTANT]
171-
> This overview is only applicable to the self-hosted gateway v1 & v2.
172-
173172
#### Supported protocols
174173

175174
The self-hosted gateway provides support for TLS v1.2 by default.
@@ -178,9 +177,6 @@ Customers using custom domains can enable TLS v1.0 and/or v1.1 [in the control p
178177

179178
#### Available cipher suites
180179

181-
> [!IMPORTANT]
182-
> This overview is only applicable to the self-hosted gateway v2.
183-
184180
The self-hosted gateway uses the following cipher suites for both client and server connections:
185181

186182
- `TLS_AES_256_GCM_SHA384`

articles/api-management/self-hosted-gateway-settings-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -71,8 +71,8 @@ This guidance helps you provide the required information to define how to authen
7171
7272
| Name | Description | Required | Default | Availability |
7373
|-------------------------|------------------------|----------|-------------------| ----|
74-
| k8s.ingress.enabled | Enable Kubernetes Ingress integration. | No | `false` | v1.2+ |
75-
| k8s.ingress.namespace | Kubernetes namespace to watch Kubernetes Ingress resources in. | No | `default` | v1.2+ |
74+
| k8s.ingress.enabled | Enable Kubernetes Ingress integration. | No | `false` | v2.0+ |
75+
| k8s.ingress.namespace | Kubernetes namespace to watch Kubernetes Ingress resources in. | No | `default` | v2.0+ |
7676
| k8s.ingress.dns.suffix | DNS suffix to build DNS hostname for services to send requests to. | No | `svc.cluster.local` | v2.4+ |
7777
| k8s.ingress.config.path | Path to Kubernetes configuration (Kubeconfig). | No | N/A | v2.4+ |
7878

articles/app-service/includes/quickstart-custom-container/quickstart-custom-container-linux-azure-portal-pivot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ For more information about containerized applications in a serverless environmen
1515
## Prerequisites
1616

1717
- An [Azure account](https://azure.microsoft.com/free/?utm_source=campaign&utm_campaign=vscode-tutorial-docker-extension&mktingSource=vscode-tutorial-docker-extension)
18-
- An [Azure container registry](/azure/container-registry/container-registry-get-started-portal)
18+
- An [Azure Container Registry](/azure/container-registry/container-registry-get-started-portal)
1919
- [Azure CLI](/cli/azure/install-azure-cli)
2020
- [Docker](https://www.docker.com/community-edition)
2121

@@ -91,7 +91,7 @@ Sign in to the [Azure portal](https://portal.azure.com).
9191

9292
1. At the top of the page, select the **Container** tab.
9393

94-
1. In the **Container** tab, for **Image Source**, select **Azure Container Registry**. Under **Azure container registry options**, set the following values:
94+
1. In the **Container** tab, for **Image Source**, select **Azure Container Registry**. Under **Azure Container Registry options**, set the following values:
9595

9696
- **Registry**: Select your Azure Container Registry.
9797
- **Image**: Select **dotnetcore-docs-hello-world-linux**.

articles/app-service/includes/quickstart-custom-container/quickstart-custom-container-linux-visual-studio-code-pivot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ This quickstart uses Azure Container Registry as the registry. You can use other
2727
Create a container registry by following the instructions in [Quickstart: Create a private container registry using the Azure portal](/azure/container-registry/container-registry-get-started-portal).
2828

2929
> [!IMPORTANT]
30-
> Be sure to set the **Admin User** option to **Enable** when you create the Azure container registry. You can also set it from the **Access keys** section of your registry page in the Azure portal. This setting is required for App Service access. For managed identity, see [Deploy from ACR tutorial](../../tutorial-custom-container.md?pivots=container-linux#vi-configure-the-web-app).
30+
> Be sure to set the **Admin User** option to **Enable** when you create the Azure Container Registry. You can also set it from the **Access keys** section of your registry page in the Azure portal. This setting is required for App Service access. For managed identity, see [Deploy from ACR tutorial](../../tutorial-custom-container.md?pivots=container-linux#vi-configure-the-web-app).
3131
3232
## Sign in
3333

@@ -132,7 +132,7 @@ docker --version
132132
1. Make sure the image tag begins with `<acr-name>.azurecr.io` and press **Enter**.
133133
1. When Visual Studio Code finishes pushing the image to your container registry, select **Refresh** at the top of the **REGISTRIES** explorer and verify that the image is pushed successfully.
134134

135-
:::image type="content" source="../../media/quickstart-docker/image-in-registry.png" alt-text="Screenshot shows the image deployed to Azure container registry.":::
135+
:::image type="content" source="../../media/quickstart-docker/image-in-registry.png" alt-text="Screenshot shows the image deployed to Azure Container Registry.":::
136136

137137
## Deploy to App Service
138138

articles/app-service/includes/quickstart-custom-container/quickstart-custom-container-windows-azure-portal-pivot.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ This quickstart shows you how to deploy an ASP.NET app in a Windows image from A
1414
## Prerequisites
1515

1616
- An [Azure account](https://azure.microsoft.com/free/?utm_source=campaign&utm_campaign=vscode-tutorial-docker-extension&mktingSource=vscode-tutorial-docker-extension)
17-
- An [Azure container registry](/azure/container-registry/container-registry-get-started-portal)
17+
- An [Azure Container Registry](/azure/container-registry/container-registry-get-started-portal)
1818
- [Azure CLI](/cli/azure/install-azure-cli)
1919
- [Install Docker for Windows](https://docs.docker.com/docker-for-windows/install/)
2020
- [Switch Docker to run Windows containers](/virtualization/windowscontainers/quick-start/quick-start-windows-10)
@@ -94,7 +94,7 @@ Sign in to the [Azure portal](https://portal.azure.com).
9494
9595
1. At the top of the page, select the **Container** tab.
9696
97-
1. In the **Container** tab, for **Image Source**, select **Azure Container Registry** . Under **Azure container registry options**, set the following values:
97+
1. In the **Container** tab, for **Image Source**, select **Azure Container Registry** . Under **Azure Container Registry options**, set the following values:
9898
9999
- **Registry**: Select your Azure Container Registry.
100100
- **Image**: Select **dotnetcore-docs-hello-world-linux**.
@@ -137,7 +137,7 @@ The App Service app pulls from the container registry each time it starts. If yo
137137
- [Secure with custom domain and certificate](../../tutorial-secure-domain-certificate.md)
138138
- [Integrate your app with an Azure virtual network](../../overview-vnet-integration.md)
139139
- [Use Private Endpoints for App Service apps](../../networking/private-endpoint.md)
140-
- [Use Azure container registry with Private Link](/azure/container-registry/container-registry-private-link)
140+
- [Use Azure Container Registry with Private Link](/azure/container-registry/container-registry-private-link)
141141
- [Migrate to Windows container in Azure](../../tutorial-custom-container.md)
142142
- [Deploy a container with Azure Pipelines](../../deploy-container-azure-pipelines.md)
143143
- [Deploy a container with GitHub Actions](../../deploy-container-github-action.md)

0 commit comments

Comments
 (0)