Skip to content

Commit 9e61c75

Browse files
authored
Merge pull request #297843 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents c7805be + 4436cfd commit 9e61c75

File tree

5 files changed

+10
-7
lines changed

5 files changed

+10
-7
lines changed

articles/api-management/api-management-error-handling-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -113,13 +113,13 @@ The following errors are predefined for error conditions that can occur during p
113113
| ip-filter | Caller IP is in blocked list | CallerIpBlocked | Caller IP address is blocked. Access denied. |
114114
| check-header | Required header not presented or value is missing | HeaderNotFound | Header {header-name} was not found in the request. Access denied. |
115115
| check-header | Required header not presented or value is missing | HeaderValueNotAllowed | Header {header-name} value of {header-value} is not allowed. Access denied. |
116-
| validate-jwt | Jwt token is missing in request | TokenNotPresent | JWT not present. |
116+
| validate-jwt | JWT is missing in request | TokenNotPresent | JWT not present. |
117117
| validate-jwt | Signature validation failed | TokenSignatureInvalid | <message from jwt library\>. Access denied. |
118118
| validate-jwt | Invalid audience | TokenAudienceNotAllowed | <message from jwt library\>. Access denied. |
119119
| validate-jwt | Invalid issuer | TokenIssuerNotAllowed | <message from jwt library\>. Access denied. |
120120
| validate-jwt | Token expired | TokenExpired | <message from jwt library\>. Access denied. |
121121
| validate-jwt | Signature key was not resolved by ID | TokenSignatureKeyNotFound | <message from jwt library\>. Access denied. |
122-
| validate-jwt | Required claims are missing from token | TokenClaimNotFound | JWT token is missing the following claims: <c1\>, <c2\>, … Access denied. |
122+
| validate-jwt | Required claims are missing from token | TokenClaimNotFound | JWT is missing the following claims: <c1\>, <c2\>, … Access denied. |
123123
| validate-jwt | Claim values mismatch | TokenClaimValueNotAllowed | Claim {claim-name} value of {claim-value} is not allowed. Access denied. |
124124
| validate-jwt | Other validation failures | JwtInvalid | <message from jwt library\> |
125125
| forward-request or send-request | HTTP response status code and headers were not received from the backend within the configured timeout | Timeout | multiple |

articles/api-management/api-management-key-concepts-experiment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ All requests from client applications first reach the API gateway, which then fo
5858
The API gateway:
5959

6060
* Accepts API calls and routes them to configured backends
61-
* Verifies API keys, JWT tokens, certificates, and other credentials
61+
* Verifies API keys, JWTs, certificates, and other credentials
6262
* Enforces usage quotas and rate limits
6363
* Optionally transforms requests and responses as specified in [policy statements](#policies)
6464
* If configured, caches responses to improve response latency and minimize the load on backend services

articles/api-management/api-management-policy-expressions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -230,8 +230,8 @@ The `context` variable is implicitly available in every policy [expression](api-
230230
|`BasicAuthCredentials AsBasic(input: this string)`|`input`: `string`<br /><br /> If the input parameter contains a valid HTTP Basic Authentication authorization request header value, the method returns an object of type `BasicAuthCredentials`; otherwise the method returns null.|
231231
|`bool TryParseBasic(input: this string, result: out BasicAuthCredentials)`|`input`: `string`<br /><br /> `result`: `out BasicAuthCredentials`<br /><br /> If the input parameter contains a valid HTTP Basic Authentication authorization value in the request header, the method returns `true` and the result parameter contains a value of type `BasicAuthCredentials`; otherwise the method returns `false`.|
232232
|`BasicAuthCredentials`|`Password`: `string`<br /><br /> `UserId`: `string`|
233-
|`Jwt AsJwt(input: this string)`|`input`: `string`<br /><br /> If the input parameter contains a valid JWT token value, the method returns an object of type `Jwt`; otherwise the method returns `null`.|
234-
|`bool TryParseJwt(input: this string, result: out Jwt)`|`input`: `string`<br /><br /> `result`: `out Jwt`<br /><br /> If the input parameter contains a valid JWT token value, the method returns `true` and the result parameter contains a value of type `Jwt`; otherwise the method returns `false`.|
233+
|`Jwt AsJwt(input: this string)`|`input`: `string`<br /><br /> If the input parameter contains a valid JWT value, the method returns an object of type `Jwt`; otherwise the method returns `null`.|
234+
|`bool TryParseJwt(input: this string, result: out Jwt)`|`input`: `string`<br /><br /> `result`: `out Jwt`<br /><br /> If the input parameter contains a valid JWT value, the method returns `true` and the result parameter contains a value of type `Jwt`; otherwise the method returns `false`.|
235235
|`Jwt`|`Algorithm`: `string`<br /><br /> `Audiences`: `IEnumerable<string>`<br /><br /> `Claims`: `IReadOnlyDictionary<string, string[]>`<br /><br /> `ExpirationTime`: `DateTime?`<br /><br /> `Id`: `string`<br /><br /> `Issuer`: `string`<br /><br /> `IssuedAt`: `DateTime?`<br /><br /> `NotBefore`: `DateTime?`<br /><br /> `Subject`: `string`<br /><br /> `Type`: `string`|
236236
|`string Jwt.Claims.GetValueOrDefault(claimName: string, defaultValue: string)`|`claimName`: `string`<br /><br /> `defaultValue`: `string`<br /><br /> Returns comma-separated claim values or `defaultValue` if the header isn't found.|
237237
|`byte[] Encrypt(input: this byte[], alg: string, key:byte[], iv:byte[])`|`input` - plaintext to be encrypted<br /><br />`alg` - name of a symmetric encryption algorithm<br /><br />`key` - encryption key<br /><br />`iv` - initialization vector<br /><br />Returns encrypted plaintext.|

articles/network-watcher/network-watcher-agent-update.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,9 @@ ms.custom: devx-track-azurepowershell, devx-track-azurecli
2222

2323
[!INCLUDE [Network Watcher agent version](../../includes/network-watcher-agent-version.md)].
2424

25+
> [!NOTE]
26+
> When automatic extension upgrade is enabled, there may be a delay of up to 30 days between the release of a new extension version and its automatic upgrade on your virtual machines and scale sets.
27+
2528
### Identify latest version
2629

2730
Use [az vm extension image list](/cli/azure/vm/extension/image#az-vm-extension-image-list) command to identify the latest version of the Network Watcher extension for your VM's operating system.

includes/network-watcher-agent-version.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ author: halkazwini
33
ms.author: halkazwini
44
ms.service: azure-network-watcher
55
ms.topic: include
6-
ms.date: 09/06/2024
6+
ms.date: 04/08/2025
77
ms.custom: include file
88
---
9-
The latest version of the Network Watcher extension is `1.4.3422.1`
9+
The latest version of the Network Watcher extension is `1.4.3614.3`

0 commit comments

Comments
 (0)