Skip to content

Commit 971a9df

Browse files
Merge pull request #285914 from dlepow/relnote
[APIM] Release notes 46 updates
2 parents 8a32184 + 3d2a241 commit 971a9df

File tree

2 files changed

+5
-4
lines changed

2 files changed

+5
-4
lines changed

articles/api-management/validate-content-policy.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: article
9-
ms.date: 07/23/2024
9+
ms.date: 08/30/2024
1010
ms.author: danlep
1111
---
1212

@@ -47,7 +47,7 @@ The policy validates the following content in the request or response against th
4747
<content-type-map any-content-type-value="content type string" missing-content-type-value="content type string">
4848
<type from | when="content type string" to="content type string" />
4949
</content-type-map>
50-
<content type="content type string" validate-as="json | xml | soap" schema-id="schema id" schema-ref="#/local/reference/path" action="ignore | prevent | detect" allow-additional-properties="true | false" />
50+
<content type="content type string" validate-as="json | xml | soap" schema-id="schema id" schema-ref="#/local/reference/path" action="ignore | prevent | detect" allow-additional-properties="true | false" case-insensitive-property-names="true | false"/>
5151
</validate-content>
5252
```
5353

@@ -90,6 +90,7 @@ The policy validates the following content in the request or response against th
9090
| schema-id | Name of an existing schema that was [added](#schemas-for-content-validation) to the API Management instance for content validation. If not specified, the default schema from the API definition is used. | No | N/A |
9191
| schema-ref| For a JSON schema specified in `schema-id`, optional reference to a valid local reference path in the JSON document. Example: `#/components/schemas/address`. The attribute should return a JSON object that API Management handles as a valid JSON schema.<br/><br/> For an XML schema, `schema-ref` isn't supported, and any top-level schema element can be used as the root of the XML request or response payload. The validation checks that all elements starting from the XML request or response payload root adhere to the provided XML schema. | No | N/A |
9292
| allow-additional-properties | Boolean. For a JSON schema, specifies whether to implement a runtime override of the `additionalProperties` value configured in the schema: <br> - `true`: allow additional properties in the request or response body, even if the JSON schema's `additionalProperties` field is configured to not allow additional properties. <br> - `false`: do not allow additional properties in the request or response body, even if the JSON schema's `additionalProperties` field is configured to allow additional properties.<br/><br/>If the attribute isn't specified, the policy validates additional properties according to configuration of the `additionalProperties` field in the schema. | No | N/A |
93+
| case-insensitive-property-names | Boolean. For a JSON schema, specifies whether to compare property names of JSON objects without regard to case. <br> - `true`: compare property names case insensitively. <br> - `false`: compare property names case sensitively. | No | false |
9394

9495
[!INCLUDE [api-management-validation-policy-actions](../../includes/api-management-validation-policy-actions.md)]
9596

articles/api-management/validate-jwt-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: article
9-
ms.date: 07/23/2024
9+
ms.date: 08/30/2024
1010
ms.author: danlep
1111
---
1212

@@ -119,7 +119,7 @@ The `validate-jwt` policy enforces existence and validity of a supported JSON we
119119
* The policy supports both symmetric and asymmetric signing algorithms:
120120
* **Symmetric** - The following encryption algorithms are supported: A128CBC-HS256, A192CBC-HS384, A256CBC-HS512.
121121
* If used in the policy, the key must be provided inline within the policy in the Base64-encoded form.
122-
* **Asymmetric** - The following encryption algortithms are supported: PS256, RS256, RS512.
122+
* **Asymmetric** - The following encryption algortithms are supported: PS256, RS256, RS512, ES256.
123123
* If used in the policy, the key may be provided either via an OpenID configuration endpoint, or by providing the ID of an uploaded certificate (in PFX format) that contains the public key, or the modulus-exponent pair of the public key.
124124
* To configure the policy with one or more OpenID configuration endpoints for use with a self-hosted gateway, the OpenID configuration endpoints URLs must also be reachable by the cloud gateway.
125125
* You can use access restriction policies in different scopes for different purposes. For example, you can secure the whole API with Microsoft Entra authentication by applying the `validate-jwt` policy on the API level, or you can apply it on the API operation level and use `claims` for more granular control.

0 commit comments

Comments
 (0)