Skip to content

Commit 8e78c0a

Browse files
Merge branch 'enable-instance-feature' of https://github.com/SoniaLopezBravo/azure-docs-pr into enable-instance-feature
2 parents a5a7b3b + be7c2d4 commit 8e78c0a

File tree

1,591 files changed

+19490
-24100
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,591 files changed

+19490
-24100
lines changed

.openpublishing.redirection.json

Lines changed: 46 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6471,27 +6471,27 @@
64716471
},
64726472
{
64736473
"source_path": "articles/cloud-services/cloud-services-guestos-family-2-3-4-retirement.md",
6474-
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-guestos-family-2-3-4-retirement",
6474+
"redirect_url": "/azure/cloud-services-extended-support/cloud-services-guestos-family-2-3-4-retirement",
64756475
"redirect_document_id": false
64766476
},
64776477
{
64786478
"source_path": "articles/cloud-services/cloud-services-guestos-family1-retirement.md",
6479-
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-guestos-family1-retirement",
6479+
"redirect_url": "/azure/cloud-services-extended-support/cloud-services-guestos-family-1-retirement",
64806480
"redirect_document_id": false
64816481
},
64826482
{
64836483
"source_path": "articles/cloud-services/cloud-services-guestos-msrc-releases.md",
6484-
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-guestos-msrc-releases",
6484+
"redirect_url": "/azure/cloud-services-extended-support/cloud-services-guestos-microsoft-security-response-center-releases",
64856485
"redirect_document_id": false
64866486
},
64876487
{
64886488
"source_path": "articles/cloud-services/cloud-services-guestos-retirement-policy.md",
6489-
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-guestos-retirement-policy",
6489+
"redirect_url": "/azure/cloud-services-extended-support/cloud-services-guestos-retirement-policy",
64906490
"redirect_document_id": false
64916491
},
64926492
{
64936493
"source_path": "articles/cloud-services/cloud-services-guestos-update-matrix.md",
6494-
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-guestos-update-matrix",
6494+
"redirect_url": "/azure/cloud-services-extended-support/cloud-services-guestos-update-matrix",
64956495
"redirect_document_id": false
64966496
},
64976497
{
@@ -6739,10 +6739,50 @@
67396739
"redirect_url": "/dotnet/maui/data-cloud/push-notifications",
67406740
"redirect_document_id": false
67416741
},
6742+
{
6743+
"source_path": "articles/sentinel/work-with-styx-objects-and-indicators.md",
6744+
"redirect_url": "/azure/sentinel/work-with-styx-objects-indicators",
6745+
"redirect_document_id": false
6746+
},
67426747
{
67436748
"source_path": "articles/storage/files/geo-redundant-storage-for-large-file-shares.md",
67446749
"redirect_url": "/azure/storage/files/files-redundancy",
67456750
"redirect_document_id": false
6746-
}
6751+
},
6752+
{
6753+
"source_path": "articles/defender-for-iot/organizations/extra-deploy-enterprise-iot.md",
6754+
"redirect_url": "/azure/defender-for-iot/organizations/eiot-defender-for-endpoint",
6755+
"redirect_document_id": false
6756+
},
6757+
{
6758+
"source_path": "articles/sentinel/work-with-styx-objects-indicators.md",
6759+
"redirect_url": "/azure/sentinel/work-with-stix-objects-indicators",
6760+
"redirect_document_id": false
6761+
},
6762+
{
6763+
"source_path_from_root": "/articles/azure-functions/migration.md",
6764+
"redirect_url": "/azure/azure-functions/migration/migrate-lambda-workloads-overview",
6765+
"redirect_document_id": false
6766+
},
6767+
{
6768+
"source_path": "articles/azure-functions/migration/lambda-functions-migration-assess.md",
6769+
"redirect_url": "/azure/azure-functions/migration/assess-lambda-workloads",
6770+
"redirect_document_id": false
6771+
},
6772+
{
6773+
"source_path": "articles/azure-functions/migration/lambda-functions-migration-discover.md",
6774+
"redirect_url": "/azure/azure-functions/migration/discover-lambda-workloads",
6775+
"redirect_document_id": false
6776+
},
6777+
{
6778+
"source_path": "articles/azure-functions/migration/lambda-functions-migration-migrate.md",
6779+
"redirect_url": "/azure/azure-functions/migration/migrate-lambda-workloads",
6780+
"redirect_document_id": false
6781+
},
6782+
{
6783+
"source_path": "articles/azure-functions/migration/lambda-functions-migration-overview.md",
6784+
"redirect_url": "/azure/azure-functions/migration/migrate-lambda-workloads-overview",
6785+
"redirect_document_id": false
6786+
},
67476787
]
67486788
}

articles/active-directory-b2c/custom-policies-series-call-rest-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ You need to deploy an app, which serves as your external app. Your custom policy
9393
"requestId": "requestId",
9494
"userMessage" : "The access code you entered is incorrect. Please try again.",
9595
"developerMessage" : `The provided code ${req.body.accessCode} does not match the expected code for user.`,
96-
"moreInfo" :"https://docs.microsoft.com/en-us/azure/active-directory-b2c/string-transformations"
96+
"moreInfo" :"https://learn.microsoft.com/en-us/azure/active-directory-b2c/string-transformations"
9797
};
9898
res.status(409).send(errorResponse);
9999
}
@@ -138,7 +138,7 @@ You need to deploy an app, which serves as your external app. Your custom policy
138138
"requestId": "requestId",
139139
"userMessage": "The access code you entered is incorrect. Please try again.",
140140
"developerMessage": "The provided code 54321 does not match the expected code for user.",
141-
"moreInfo": "https://docs.microsoft.com/en-us/azure/active-directory-b2c/string-transformations"
141+
"moreInfo": "https://learn.microsoft.com/en-us/azure/active-directory-b2c/string-transformations"
142142
}
143143
```
144144
Your REST service can return HTTP 4xx status code, but the value of `status` in the JSON response must be `409`.

articles/active-directory-b2c/service-limits.md

Lines changed: 50 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -183,48 +183,63 @@ As a protection for our customers, Microsoft places some restrictions on telepho
183183

184184
| Region Code | Region Name | Limit per tenant per 60 minutes | Limit per tenant per 24 hours |
185185
|:----------- |:---------------------------------------------- |:------------------------------- | :----------------------------------------|
186-
| 228 | Togo | 10 | 30 |
187-
| 257 | Uzbek | 10 | 30 |
188-
| 970 | State of Plaestine | 10 | 30 |
189-
| 249 | Sudan | 10 | 30 |
190-
| 226 | Burina Faso | 10 | 30 |
191-
| 252 | Somalia | 10 | 30 |
192-
| 501 | Belize | 10 | 30 |
193-
| 855 | Cambodia | 50 | 200 |
194-
| 84 | Vietnam | 150 | 500 |
195-
| 94 | Sri Lanka | 100 | 500 |
196-
| 63 | Philippines | 50 | 200 |
197-
| 62 | Indonesia | 50 | 200 |
198-
| 7 | Russia | 100 | 1000 |
199-
| 258 | Mozambique | 50 | 200 |
200-
| 92 | Pakistan | 100 | 1000 |
201-
| 994 | Azerbaijan | 50 | 200 |
202-
| 880 | Bangladesh | 50 | 200 |
203186
| 20 | Egypt | 50 | 200 |
204-
| 260 | Zambia | 50 | 200 |
205-
| 502 | Guatemala | 10 | 50
206-
| 255 | Tanzania | 10 | 50
207-
| 261 | Madagascar | 10 | 30
208-
| 998 | Uzbekistan | 10 | 30
209-
| 223 | Mali | 20 | 100
210-
| 52 | Mexico | 100 | 500
211-
| 60 | Malaysia | 50 | 200 |
212-
| 221 | Senegal | 10 | 30 |
187+
| 211 | South Sudan | 10 | 30 |
188+
| 212 | Morocco | 20 | 100 |
213189
| 216 | Tunisia | 20 | 100 |
214-
| 503 | El Salvador | 10 | 30 |
190+
| 221 | Senegal | 10 | 30 |
191+
| 223 | Mali | 20 | 100 |
192+
| 224 | Guinea | 20 | 100 |
193+
| 225 | Ivory Coast| 10 | 30 |
194+
| 226 | Burina Faso | 10 | 30 |
195+
| 228 | Togo | 10 | 30 |
196+
| 233 | Ghana| 10 | 30 |
215197
| 234 | Nigeria | 20 | 100 |
198+
| 236 | Central African Republic  | 10 | 30 |
199+
| 238 | Cape Verde | 10 | 30 |
200+
| 249 | Sudan | 10 | 30 |
201+
| 251 | Ethiopia  | 10 | 30 |
202+
| 252 | Somalia | 10 | 30 |
203+
| 255 | Tanzania | 10 | 50 |
204+
| 256 | Uganda | 20 | 100 |
205+
| 257 | Uzbek | 10 | 30 |
206+
| 258 | Mozambique| 50 | 200 |
207+
| 260 | Zambia | 50 | 200 |
208+
| 261 | Madagascar | 10 | 30 |
209+
| 263 | Zimbabwe | 10 | 30 |
210+
| 265 | Malawi  | 10 | 30 |
211+
| 375 | Belarus   | 10 | 30 |
216212
| 386 | Slovenia | 10 | 50 |
213+
| 501 | Belize| 10 | 30 |
214+
| 502 | Guatemala | 10 | 50
215+
| 503 | El Salvador | 10 | 30 |
216+
| 52 | Mexico | 100 | 500
217+
| 58 | Venezuela| 10 | 30 |
217218
| 591 | Bolivia | 10 | 30 |
218-
| 263 | Zimbabwe | 10 | 30 |
219-
| 261 | Madagascar | 10 | 30 |
220-
| 995 | Georgia | 10 | 30 |
221-
| 993 | Turkmenistan | 10 | 30 |
222-
| 256 | Uganda | 20 | 100 |
223-
| 212 | Moroccoa | 20 | 100 |
219+
| 60 | Malaysia | 50 | 200 |
220+
| 62 | Indonesia | 50 | 200 |
221+
| 63 | Philippines | 50 | 200 |
222+
| 670 | East Timor (Timor-Leste)  | 10 | 30 |
223+
| 7 | Russia | 100 | 1000 |
224+
| 84 | Vietnam | 150 | 500 |
225+
| 855 | Cambodia | 50 | 200 |
224226
| 856 | Laos | 50 | 200 |
225-
| 224 | Guinea | 20 | 100 |
227+
| 880 | Bangladesh | 50 | 200 |
228+
| 92 | Pakistan| 100 | 1000 |
229+
| 93 | Afghanistan  | 10 | 30 |
230+
| 94 | Sri Lanka | 100 | 500 |
231+
| 95 | Myanmar (Burma) | 10 | 30 |
232+
| 961 | Lebanon  | 10 | 30 |
233+
| 967 | Yemen |10 | 30 |
234+
| 970 | State of Palestine| 10 | 30 |
235+
| 972 | Israel  | 50 | 200 |
236+
| 976 | Mongolia  | 10 | 30 |
226237
| 992 | Tajikistan | 10 | 30 |
227-
| 238 | Cape Verde | 10 | 30 |
238+
| 993 | Turkmenistan | 10 | 30 |
239+
| 994 | Azerbaijan | 50 | 200 |
240+
| 995 | Georgia | 10 | 30 |
241+
| 996 | Kyrgyzstan  | 10 | 30 |
242+
| 998 | Uzbekistan | 10 | 30
228243

229244
## Next steps
230245

articles/api-center/enable-managed-api-analysis-linting.md

Lines changed: 37 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Managed API linting and analysis - Azure API Center
33
description: Automatic linting of API definitions in your API center helps you analyze compliance of APIs with the organization's API style guide.
44
ms.service: azure-api-center
55
ms.topic: how-to
6-
ms.date: 12/03/2024
6+
ms.date: 03/31/2025
77
ms.author: danlep
88
author: dlepow
99
ms.custom:
@@ -18,17 +18,15 @@ With API analysis:
1818

1919
* Azure API Center automatically analyzes your API definitions whenever you add or update an API definition. API definitions are linted by default with a [spectral:oas ruleset](https://docs.stoplight.io/docs/spectral/4dec24461f3af-open-api-rules) (API style guide).
2020
* API analysis reports are generated in the Azure portal, showing how your API definitions conform to the style guide.
21-
* You can use the Azure API Center extension for Visual Studio Code to customize and test your own API style guide locally and then deploy it to your API center.
22-
21+
* Use analysis profiles to specify the ruleset and filter conditions for the APIs that are analyzed. Customize a profile's ruleset using the Azure API Center extension for Visual Studio Code.
2322

2423
> [!IMPORTANT]
2524
> If you prefer, you can enable [self-managed](enable-api-analysis-linting.md) linting and analysis using a custom Azure function, overriding the built-in capabilities. **Disable any function used for self-managed linting before using managed API analysis.**
2625
2726
## Limitations
2827

2928
* Currently, only OpenAPI and AsyncAPI specification documents in JSON or YAML format are analyzed.
30-
* Currently, you configure a single ruleset, and it's applied to all OpenAPI definitions in your API center.
31-
* There are [limits](../azure-resource-manager/management/azure-subscription-service-limits.md?toc=/azure/api-center/toc.json&bc=/azure/api-center/breadcrumb/toc.json#azure-api-center-limits) for the maximum number of API definitions analyzed. Analysis can take a few minutes to up to 24 hours to complete.
29+
* There are [limits](../azure-resource-manager/management/azure-subscription-service-limits.md?toc=/azure/api-center/toc.json&bc=/azure/api-center/breadcrumb/toc.json#azure-api-center-limits) for the number of analysis profiles and the maximum number of API definitions analyzed. Analysis can take a few minutes to up to 24 hours to complete.
3230

3331
## Prerequisites
3432

@@ -57,27 +55,50 @@ To view an analysis summary in your API center:
5755
> [!TIP]
5856
> You can also view the API analysis report by selecting **Analysis** from the API definition's menu bar.
5957
60-
## Customize ruleset
58+
## Manage analysis profiles
59+
60+
Azure API Center uses *analysis profiles* for linting and analyzing APIs. An analysis profile specifies a ruleset and optionally filter conditions for APIs that are analyzed. The default analysis profile applies the `spectral:oas` ruleset to all OpenAPI and AsyncAPI definitions.
61+
62+
You can customize the ruleset and define filter conditions in the default profile, or you can create a new profile. For example, you might want to use one profile for APIs that are in development and a different one for APIs that are in production.
63+
64+
> [!NOTE]
65+
> In the Standard plan of API Center, you can create up to 3 analysis profiles. Only a single profile is supported in the Free plan.
66+
67+
To create an analysis profile:
68+
69+
1. In the Azure portal, navigate to your API center.
70+
1. In the left-hand menu, under **Governance**, select **API Analysis** > **Manage analysis profiles** > **+ Create analysis profile**.
71+
1. In the **Create new analysis profile** pane, enter a **Name** and **Description** for the profile.
72+
1. In **Ruleset**, the analyzer type (linting engine) for the ruleset appears. Currently only Spectral is supported.
73+
1. Under **Define filter conditions**, add one or more filter conditions for API definitions that the profile is applied to.
74+
1. Select **Create**.
75+
76+
77+
:::image type="content" source="media/enable-managed-api-analysis-linting/create-analysis-profile.png" alt-text="Screenshot of creating an analysis profile in the portal.":::
78+
79+
The profile is created and a ruleset scaffold is created. To view the current ruleset, select the profile, and in the context (...) menu, select **View the ruleset**.
80+
81+
Continue to the following sections to customize the ruleset.
6182

62-
You can use the Azure API Center extension for Visual Studio Code to customize the default ruleset for your API center or replace it as your organization's API style guide. For example, you can [extend the ruleset](https://docs.stoplight.io/docs/spectral/83527ef2dd8c0-extending-rulesets) or add [custom functions](https://docs.stoplight.io/docs/spectral/a781e290eb9f9-custom-functions).
83+
### Customize the profile's ruleset
6384

64-
To customize or replace the ruleset:
85+
Use the Visual Studio Code extension for Azure API Center to customize a profile's ruleset. After customizing the ruleset and testing it locally, you can deploy it back to your API center.
6586

6687
1. In Visual Studio Code, select the Azure API Center icon from the Activity Bar.
67-
1. Open the `.api-center-rules` folder at the root of your working folder.
68-
1. In the folder for your API center resource, open the `ruleset.yml` file.
88+
1. In the API Center pane, expand the API center resource you are working with, and expand **Profiles**.
89+
1. Expand the profile you want to modify, and select `ruleset.yaml`.
6990
1. Modify or replace the content as needed.
70-
1. Save your changes to `ruleset.yml`.
91+
1. Save your changes to `ruleset.yaml`.
7192

7293
### Test ruleset locally
7394

7495
Before deploying the custom ruleset to your API center, validate it locally. The Azure API Center extension for Visual Studio Code provides integrated support for API specification linting with Spectral.
7596

7697
1. In Visual Studio Code, use the **Ctrl+Shift+P** keyboard shortcut to open the Command Palette.
7798
1. Type **Azure API Center: Set active API Style Guide** and hit **Enter**.
78-
1. Choose **Select Local File** and specify the `ruleset.yml` file that you customized. Hit **Enter**.
99+
1. Choose **Select Local File** and specify the `ruleset.yaml` file that you customized. Hit **Enter**.
79100

80-
This step makes the custom ruleset the active API style guide for linting.
101+
This step makes the custom ruleset the active API style guide for local linting.
81102

82103
Now, when you open an OpenAPI-based API definition file, a local linting operation is automatically triggered in Visual Studio Code. Results are displayed inline in the editor and in the **Problems** window (**View > Problems** or **Ctrl+Shift+M**).
83104

@@ -94,9 +115,10 @@ To deploy the custom ruleset to your API center:
94115

95116
1. In Visual Studio Code, select the Azure API Center icon from the Activity Bar.
96117
1. In the API Center pane, expand the API center resource in which you customized the ruleset.
97-
1. Right-click **Rules** and select **Deploy Rules to API Center**.
118+
1. Expand **Profiles**.
119+
1. Right-click the profile in which you customized the ruleset, and select **Deploy Rules to API Center**.
98120

99-
A message notifies you after the rules are successfully deployed to your API center. The linting engine uses the updated ruleset to analyze API definitions.
121+
A message notifies you after the rules are successfully deployed to your API center. The linting engine uses the updated ruleset to analyze API definitions in the profile.
100122

101123
To see the results of linting with the updated ruleset, view the API analysis reports in the portal.
102124

articles/api-center/includes/api-center-service-limits.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ ms.custom: Include file
2323
| Maximum number of child properties in custom metadata property of type "object" | 10 |10 |
2424
| Maximum requests per minute (data plane) | 3,000 | 6,000 |
2525
| Maximum number of API definitions [analyzed](../enable-managed-api-analysis-linting.md) | 10 | 2,000<sup>4</sup> |
26+
| Maximum number of analysis profiles | 1 | 3 |
2627
| Maximum number of linked API sources<sup>5</sup> | 1 | 3 |
2728
| Maximum number of APIs synchronized from a linked API source | 200 | 2,000<sup>4</sup> |
2829

4.93 KB
Loading
123 KB
Loading

articles/api-management/api-management-authenticate-authorize-azure-openai.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Options to authenticate and authorize to Azure OpenAI APIs using Az
55
author: dlepow
66
ms.service: azure-api-management
77
ms.topic: concept-article
8-
ms.date: 01/23/2025
8+
ms.date: 04/01/2025
99
ms.author: danlep
1010
ms.collection: ce-skilling-ai-copilot
1111
---
@@ -101,6 +101,9 @@ Following are steps to configure your API Management instance to use a managed i
101101
</set-header>
102102
```
103103

104+
> [!TIP]
105+
> An alternative to using the `authentication-managed-identity` and `set-header` policies shown in this example is to configure a [backend](backends.md) resource that directs API requests to the Azure OpenAI Service endpoint. In the backend configuration, enable managed identity authentication to the Azure OpenAI Service. Azure API Management automates these steps when importing an API directly from Azure OpenAI Service. For more information, see [Import API from Azure OpenAI Service](azure-openai-api-from-specification.md#option-1-import-api-from-azure-openai-service).
106+
104107
## OAuth 2.0 authorization using identity provider
105108

106109
To enable more fine-grained access to OpenAPI APIs by particular users or clients, you can preauthorize access to the Azure OpenAI API using OAuth 2.0 authorization with Microsoft Entra ID or another identity provider. For background, see [Protect an API in Azure API Management using OAuth 2.0 authorization with Microsoft Entra ID](api-management-howto-protect-backend-with-aad.md).

0 commit comments

Comments
 (0)