You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/api-management-sample-send-request.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@ There are certain tradeoffs when using a fire-and-forget style of request. If fo
59
59
The `send-request` policy enables using an external service to perform complex processing functions and return data to the API management service that can be used for further policy processing.
60
60
61
61
### Authorizing reference tokens
62
-
A major function of API Management is protecting backend resources. If the authorization server used by your API creates [JWT tokens](../active-directory/develop/security-tokens.md#json-web-tokens-and-claims) as part of its OAuth2 flow, as [Microsoft Entra ID](../active-directory/hybrid/whatis-hybrid-identity.md) does, then you can use the `validate-jwt` policy or `validate-azure-ad-token` policy to verify the validity of the token. Some authorization servers create what are called [reference tokens](https://leastprivilege.com/2015/11/25/reference-tokens-and-introspection/) that cannot be verified without making a callback to the authorization server.
62
+
A major function of API Management is protecting backend resources. If the authorization server used by your API creates [JWTs](../active-directory/develop/security-tokens.md#json-web-tokens-and-claims) as part of its OAuth2 flow, as [Microsoft Entra ID](../active-directory/hybrid/whatis-hybrid-identity.md) does, then you can use the `validate-jwt` policy or `validate-azure-ad-token` policy to verify the validity of the token. Some authorization servers create what are called [reference tokens](https://leastprivilege.com/2015/11/25/reference-tokens-and-introspection/) that cannot be verified without making a callback to the authorization server.
63
63
64
64
### Standardized introspection
65
65
In the past, there has been no standardized way of verifying a reference token with an authorization server. However a recently proposed standard [RFC 7662](https://tools.ietf.org/html/rfc7662) was published by the IETF that defines how a resource server can verify the validity of a token.
Copy file name to clipboardExpand all lines: articles/api-management/validate-jwt-policy.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,15 +115,15 @@ The `validate-jwt` policy enforces existence and validity of a supported JSON we
115
115
116
116
### Usage notes
117
117
118
-
* The `validate-jwt` policy requires that the `exp` registered claim is included in the JWT token, unless `require-expiration-time` attribute is specified and set to `false`.
118
+
* The `validate-jwt` policy requires that the `exp` registered claim is included in the JWT, unless `require-expiration-time` attribute is specified and set to `false`.
119
119
* The policy supports both symmetric and asymmetric signing algorithms:
120
120
***Symmetric** - The following encryption algorithms are supported: A128CBC-HS256, A192CBC-HS384, A256CBC-HS512.
121
121
* If used in the policy, the key must be provided inline within the policy in the Base64-encoded form.
122
122
***Asymmetric** - The following encryption algorithms are supported: PS256, RS256, RS512, ES256.
123
123
* If used in the policy, the key may be provided either via an OpenID configuration endpoint, or by providing the ID of an uploaded certificate (in PFX format) that contains the public key, or the modulus-exponent pair of the public key.
124
124
* To configure the policy with one or more OpenID configuration endpoints for use with a self-hosted gateway, the OpenID configuration endpoints URLs must also be reachable by the cloud gateway.
125
125
* You can use access restriction policies in different scopes for different purposes. For example, you can secure the whole API with Microsoft Entra authentication by applying the `validate-jwt` policy on the API level, or you can apply it on the API operation level and use `claims` for more granular control.
126
-
* When using a custom header (`header-name`), the configured required scheme (`require-scheme`) will be ignored. To use a required scheme, JWT tokens must be provided in the `Authorization` header.
126
+
* When using a custom header (`header-name`), the configured required scheme (`require-scheme`) will be ignored. To use a required scheme, JWTs must be provided in the `Authorization` header.
The coolness period defines the minimum number of days before data is transitioned to the cold tier. The default value is 31 days. The supported values are between 2 and 183 days.
15
+
16
+
>[!NOTE]
17
+
> The coolness period is calculated from the time of volume creation. If any existing volumes are enabled with cool access, the coolness period is applied retroactively on those volumes. If certain data blocks on the volumes have not been accessed for the number of days specified in the coolness period, those blocks move to the cool tier once the feature is enabled. Once the coolness period is reached, background jobs can take up to 48 hours to initiate the data transfer to the cool tier.
18
+
19
+
***Cool Access Retrieval Policy**:
20
+
21
+
This option specifies under which conditions data moves back to the hot tier. You can set this option to **Default**, **On-Read**, or **Never**.
22
+
23
+
If you don't set a value for the cool access retrieval policy, the retrieval policy is set to Default. The following table describes each policy's data retrieval behavior:
24
+
25
+
| Retrieval policy | Behavior |
26
+
| - | - |
27
+
| Default | Cold data is returned to the hot tier when performing random reads. Data is served from the cool tier with sequential reads. |
28
+
| On-read | On both sequential and random reads, cold data is returned to the hot tier. |
29
+
| Never | Cold data is served directly from the cool tier. After data moves to the cool tier, it's not returned to the hot tier. |
30
+
31
+
***Cool Access Tiering policy**
32
+
33
+
The tiering policy manages what data moves to the cool tier. You can tier all data or limit tiering to snapshots. Select one of the following policies:
34
+
35
+
| Tiering policy | Description |
36
+
| - | - |
37
+
|`Auto`| This policy encompasses both data in the active file system and snapshot copy data. |
38
+
|`SnapshotOnly`| This policy limits tiering to data in snapshots. All data blocks associated with files in the active file system remain in the hot tier. |
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/manage-cool-access.md
+25-56Lines changed: 25 additions & 56 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
5
5
author: b-ahibbard
6
6
ms.service: azure-netapp-files
7
7
ms.topic: how-to
8
-
ms.date: 05/14/2025
8
+
ms.date: 06/06/2025
9
9
ms.author: anfdocs
10
10
ms.custom:
11
11
- build-2025
@@ -29,14 +29,23 @@ There are several considerations to be aware of when using cool access.
29
29
* Although cool access is available for the Standard, Premium, and Ultra service levels, how you're billed for using the feature differs from the hot tier service-level charges. For details and examples, see the [Billing section](cool-access-introduction.md#billing).
30
30
* Cool access supports two tiering policies: `Auto` and `SnapshotOnly`. The `SnapshotOnly` policy limits data tiering to data in snapshots, while all data blocks associated with files in the active file system remain in the hot tier. The `Auto` policy encompasses both snapshot copy data and data in the active file system.
31
31
Throughput is based on the [the service level](azure-netapp-files-service-levels.md#supported-service-levels) for both the `Auto` and `SnapshotOnly` tiering policies.
32
+
* To prevent data retrieval from the cool tier to the hot tier during sequential read operations (for example, antivirus or other file scanning operations), set the cool access retrieval policy to **Default** or **Never**. For more information about the retrieval policy, see [Enable cool access on a new volume](#enable-cool-access-on-a-new-volume).
33
+
* Files moved to the cool tier remains there after you disable cool access on a volume. You must perform an I/O operation on _each_ file to return it to the warm tier.
34
+
* For the maximum number of volumes supported for cool access per subscription per region, see [Resource limits for Azure NetApp Files](azure-netapp-files-resource-limits.md#resource-limits).
35
+
* Cool access is supported with large volumes. Confirm that you're [registered to use large volumes](large-volumes-requirements-considerations.md#register-the-feature) before creating a cool-access-enabled large volume.
36
+
37
+
### Considerations for cool access-enabled capacity pools
38
+
32
39
* You can convert an existing capacity pool into a cool-access capacity pool to create cool access volumes. After the capacity pool is enabled for cool access, you can't convert it back to a non-cool-access capacity pool.
33
40
* When you enable cool access, data that satisfies the conditions set by the coolness period moves to the cool tier. For example, if the coolness period is set to 30 days, any data that has been cool for at least 30 days moves to the cool tier _when_ you enable cool access. Once the coolness period is reached, background jobs can take up to 48 hours to initiate the data transfer to the cool tier.
34
41
* A cool-access capacity pool can contain both volumes with cool access enabled and volumes with cool access disabled.
35
-
* To prevent data retrieval from the cool tier to the hot tier during sequential read operations (for example, antivirus or other file scanning operations), set the cool access retrieval policy to **Default** or **Never**. For more information, see [Enable cool access on a new volume](#enable-cool-access-on-a-new-volume).
36
42
* After the capacity pool is configured with the option to support cool access volumes, the setting can't be disabled at the _capacity pool_ level. You can turn on or turn off the cool access setting at the _volume_ level anytime. Turning off the cool access setting at the volume level stops further tiering of data.
37
-
* Files moved to the cool tier remains there after you disable cool access on a volume. You must perform an I/O operation on _each_ file to return it to the warm tier.
38
-
* For the maximum number of volumes supported for cool access per subscription per region, see [Resource limits for Azure NetApp Files](azure-netapp-files-resource-limits.md#resource-limits).
39
-
* Cool access is supported with large volumes. Confirm that you're [registered to use large volumes](large-volumes-requirements-considerations.md#register-the-feature) before creating a cool-access-enabled large volume.
43
+
44
+
#### Considerations for moving volumes to another capacity pool
45
+
46
+
* Volumes enabled for cool access can be moved between capacity pools only if those capacity pools are enabled for cool access. When a volume is enabled for cool access, it can only reside in a cool access-enabled capacity pool even if cool access has been disabled on the volume.
47
+
* If you [move a cool access volume to another capacity pool (service level change)](dynamic-change-volume-service-level.md), you must also enable that pool for cool access.
48
+
* If you disable cool access and turn off tiering on a cool access volume (that is, the volume no longer uses cool access), you can't move it to a non-cool-access capacity pool. In a cool access capacity pool, you can move all volumes, *whether they're enabled for cool access or not*, only to another cool access capacity pool.
40
49
41
50
### Considerations for throughput in Premium and Ultra service level volumes with cool access
42
51
@@ -56,12 +65,6 @@ There are several considerations to be aware of when using cool access.
56
65
-**Data rehydration:** Data isn't rehydrated to the hot tier when the volume is deleted, ensuring the deletion process is efficient and mitigating unnecessary data movement.
57
66
- The only way to rehydrate data from the cool tier to the hot tier is for the client or application to read the data block.
58
67
59
-
### Considerations for moving volumes to another capacity pool
60
-
61
-
* Volumes enabled for cool access can be moved between capacity pools only if those capacity pools are enabled for cool access. When a volume is enabled for cool access, it can only reside in a cool access-enabled capacity pool even if cool access has been disabled on the volume.
62
-
* If you [move a cool access volume to another capacity pool (service level change)](dynamic-change-volume-service-level.md), you must also enable that pool for cool access.
63
-
* If you disable cool access and turn off tiering on a cool access volume (that is, the volume no longer uses cool access), you can't move it to a non-cool-access capacity pool. In a cool access capacity pool, you can move all volumes, *whether they're enabled for cool access or not*, only to another cool access capacity pool.
64
-
65
68
66
69
### Considerations for cross-region and cross-zone replication
67
70
@@ -156,32 +159,12 @@ You can enable Azure NetApp Files storage with cool access during the creation o
156
159
1. On the **Capacity Pools** menu, select **Volumes**. Select **+ Add volume** to create a new network file system (NFS), server message block (SMB), or dual-protocol volume.
157
160
1. On the **Create a volume** page, on the **Basics** tab, set the following options to enable the volume for cool access:
158
161
159
-
* **Enable Cool Access**: This option specifies whether the volume supports cool access.
160
-
* **Coolness Period**: The coolness period defines the minimum number of days before data is transitioned to the cold tier. Once the coolness period is reached, background jobs can take up to 48 hours to initiate the data transfer to the cool tier. The default value is 31 days. The supported values are between 2 and 183 days.
161
-
162
-
* **Cool Access Retrieval Policy**: This option specifies under which conditions data moves back to the hot tier. You can set this option to **Default**, **On-Read**, or **Never**.
163
-
164
-
The following list describes the data retrieval behavior with the **Cool Access Retrieval Policy** settings:
165
-
166
-
* Cool access is **enabled**:
167
-
* If **Cool Access Retrieval Policy** is set to **Default**: Cold data is retrieved only by performing random reads. Sequential reads are served directly from the cool tier.
168
-
* If no value is set for **Cool Access Retrieval Policy**: The active retrieval policy is **Default**.
169
-
* If **Cool Access Retrieval Policy** is set to **On-Read**: Cold data is retrieved by performing both sequential and random reads.
170
-
* If **Cool Access Retrieval Policy** is set to **Never**: Cold data is served directly from the cool tier and isn't retrieved to the hot tier.
171
-
* Cool access is **disabled**:
172
-
* You can set a cool access retrieval policy if cool access is disabled only if there's existing data on the cool tier.
173
-
* After you disable the cool access setting on the volume, the cool access retrieval policy remains the same.
174
-
175
-
* **Cool Access Tiering Policy**
176
-
177
-
Select either `SnapshotOnly` or `Auto`.
178
-
179
-
* The `SnapshotOnly` policy limits data tiering to data in snapshots, while all data blocks associated with files in the active file system remain in the hot tier.
180
-
* The `Auto` policy encompasses both snapshot copy data and data in the active file system.
:::image type="content" source="./media/manage-cool-access/cool-access-new-volume.png" alt-text="Screenshot that shows the Create a volume page. On the Basics tab, the Enable Cool Access checkbox is selected. The options for the cool access retrieval policy are displayed. " lightbox="./media/manage-cool-access/cool-access-new-volume.png":::
183
165
184
-
1. Follow the steps in one of these articles to finish the volume creation:
166
+
1. To finish creating the volume, follow the instructions for the relevant protocol:
167
+
185
168
* [Create an NFS volume](azure-netapp-files-create-volumes.md)
186
169
* [Create an SMB volume](azure-netapp-files-create-volumes-smb.md)
187
170
* [Create a dual-protocol volume](create-volumes-dual-protocol.md)
@@ -190,34 +173,20 @@ You can enable Azure NetApp Files storage with cool access during the creation o
190
173
191
174
In a capacity pool enabled for cool access, you can enable an existing volume to support cool access.
192
175
176
+
>[!NOTE]
177
+
> If cool access is disabled, you can only set a retrieval policy if there's existing data on the cool tier.
178
+
>
179
+
> If you disable cool access, the cool access setting on the volume, the cool access retrieval policy remains the same.
180
+
193
181
1. Right-click the volume for which you want to enable the cool access.
194
182
1. On the **Edit** window that appears, set the following options for the volume:
195
-
* **Enable Cool Access**: The coolness period defines the minimum number of days before data is transitioned to the cold tier. The default value is 31 days. The supported values are between 2 and 183 days.
196
-
>[!NOTE]
197
-
> The coolness period is calculated from the time of volume creation. If any existing volumes are enabled with cool access, the coolness period is applied retroactively on those volumes. This means if certain data blocks on the volumes have been infrequently accessed for the number of days specified in the coolness period, those blocks move to the cool tier once the feature is enabled. Once the coolness period is reached, background jobs can take up to 48 hours to initiate the data transfer to the cool tier.
198
-
* **Cool Access Retrieval Policy**: This option specifies under which conditions data moves back to the hot tier. You can set this option to **Default**, **On-Read**, or **Never**.
199
-
200
-
The following list describes the data retrieval behavior with the **Cool Access Retrieval Policy** settings:
201
-
202
-
* Cool access is **enabled**:
203
-
* If no value is set for **Cool Access Retrieval Policy**:
204
-
The retrieval policy is set to **Default**. Cold data is retrieved to the hot tier only when random reads are performed. Sequential reads are served directly from the cool tier.
205
-
* If **Cool Access Retrieval Policy** is set to **Default**: Cold data is retrieved only by performing random reads.
206
-
* If **Cool Access Retrieval Policy** is set to **On-Read**: Cold data is retrieved by performing both sequential and random reads.
207
-
* If **Cool Access Retrieval Policy** is set to **Never**: Cold data is served directly from the cool tier and isn't retrieved to the hot tier.
208
-
* Cool access is **disabled**:
209
-
* You can set a cool access retrieval policy if cool access is disabled only if there's existing data on the cool tier.
210
-
* After you disable the cool access setting on the volume, the cool access retrieval policy remains the same.
211
-
* **Cool Access Tiering policy**
212
-
213
-
Select either `SnapshotOnly` or `Auto`.
214
-
215
-
* The `SnapshotOnly` policy limits data tiering to data in snapshots, while all data blocks associated with files in the active file system remain in the hot tier.
216
-
* The `Auto` policy encompasses both snapshot copy data and data in the active file system.
0 commit comments