Skip to content

Commit b063998

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into us429364-seo-top25-vnet
2 parents 2aa6aa6 + eacc735 commit b063998

File tree

113 files changed

+2580
-1267
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

113 files changed

+2580
-1267
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6879,6 +6879,11 @@
68796879
"redirect_url": "/azure/sre-agent/troubleshoot-azure-container-apps",
68806880
"redirect_document_id": false
68816881
},
6882+
{
6883+
"source_path": "articles/sre-agent/permissions.md",
6884+
"redirect_url": "/azure/sre-agent/security-context",
6885+
"redirect_document_id": false
6886+
},
68826887
{
68836888
"source_path": "articles/reliability/whats-new.md",
68846889
"redirect_url": "/azure/reliability/overview",

articles/active-directory-b2c/partner-whoiam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ The following diagram shows the implementation architecture.
6060

6161
* [Key Vault](https://azure.microsoft.com/services/key-vault/): Store passwords
6262
* [App Service](https://azure.microsoft.com/services/app-service/): Host the BRIMS API and admin portal services
63-
* [Microsoft Entra ID](https://azure.microsoft.com/services/active-directory/): Authenticate administrative users for the portal
63+
* [Microsoft Entra ID](https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id): Authenticate administrative users for the portal
6464
* [Azure Cosmos DB](https://azure.microsoft.com/services/cosmos-db/): Store and retrieve settings
6565
* [Application Insights overview](/azure/azure-monitor/app/app-insights-overview) (optional): Sign in to the API and the portal
6666

articles/active-directory-b2c/service-limits.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: azure-active-directory
99

1010
ms.topic: reference
11-
ms.date: 05/11/2024
11+
ms.date: 07/15/2025
1212
ms.subservice: b2c
1313
zone_pivot_groups: b2c-policy-type
1414

@@ -197,6 +197,7 @@ As a protection for our customers, Microsoft places some restrictions on telepho
197197
| 228 | Togo | 10 | 30 |
198198
| 233 | Ghana| 10 | 30 |
199199
| 234 | Nigeria | 20 | 100 |
200+
| 235 | Chad | 10 | 30 |
200201
| 236 | Central African Republic  | 10 | 30 |
201202
| 238 | Cape Verde | 10 | 30 |
202203
| 249 | Sudan | 10 | 30 |
@@ -212,6 +213,7 @@ As a protection for our customers, Microsoft places some restrictions on telepho
212213
| 265 | Malawi  | 10 | 30 |
213214
| 373 | Moldova | 20 | 100 |
214215
| 375 | Belarus   | 10 | 30 |
216+
| 381 | Serbia | 50 | 200 |
215217
| 386 | Slovenia | 10 | 50 |
216218
| 501 | Belize| 10 | 30 |
217219
| 502 | Guatemala | 10 | 50
@@ -236,10 +238,13 @@ As a protection for our customers, Microsoft places some restrictions on telepho
236238
| 95 | Myanmar (Burma) | 10 | 30 |
237239
| 961 | Lebanon  | 10 | 30 |
238240
| 963 | Syria  | 10 | 30 |
241+
| 964 | Iraq | 50 | 200 |
239242
| 967 | Yemen |10 | 30 |
240243
| 970 | State of Palestine| 10 | 30 |
241244
| 972 | Israel  | 50 | 200 |
245+
| 975 | Bhutan | 20 | 100 |
242246
| 976 | Mongolia  | 10 | 30 |
247+
| 977 | Nepal | 20 | 100 |
243248
| 992 | Tajikistan | 10 | 30 |
244249
| 993 | Turkmenistan | 10 | 30 |
245250
| 994 | Azerbaijan | 50 | 200 |

articles/api-management/api-management-capacity.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,8 @@ Available aggregations for these metrics are as follows.
5656

5757
In the Developer, Basic, Standard, and Premium tiers, the **Capacity** metric is available for making decisions about scaling or upgrading an API Management instance. Its construction is complex and imposes certain behavior.
5858

59+
[!INCLUDE [capacity-change.md](../../includes/api-management-capacity-change.md)]
60+
5961
Available aggregations for this metric are as follows.
6062

6163
* **Avg** - Average percentage of capacity used across gateway processes in every [unit](upgrade-and-scale.md) of an API Management instance.
@@ -171,6 +173,7 @@ Use capacity metrics for making decisions whether to scale an API Management ins
171173
+ Ignore sudden spikes that are most likely not related to an increase in load (see [Capacity metric behavior](#capacity-metric-behavior) section for explanation).
172174
+ As a general rule, upgrade or scale your instance when a capacity metric value exceeds **60% - 70%** for a long period of time (for example, 30 minutes). Different values may work better for your service or scenario.
173175
+ If your instance or workspace gateway is configured with only 1 unit, upgrade or scale it when a capacity metric value exceeds **40%** for a long period. This recommendation is based on the need to reserve capacity for guest OS updates in the underlying service platform.
176+
+ Use [available diagnostics](monitor-api-management.md) to monitor the response times of API calls. Consider adjusting scaling thresholds if you notice degraded response times with increasing value of capacity metric.
174177

175178
> [!TIP]
176179
> If you are able to estimate your traffic beforehand, test your API Management instance or workspace gateway on workloads you expect. You can increase the request load gradually and monitor the value of the capacity metric that corresponds to your peak load. Follow the steps from the previous section to use Azure portal to understand how much capacity is used at any given time.

articles/app-service/configure-ssl-certificate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ You can add up to 1,000 private certificates per webspace.
5555

5656
## Create a free managed certificate
5757

58-
The free App Service managed certificate is a turn-key solution for helping to secure your custom DNS name in App Service. Without any action from you, this TLS/SSL server certificate is fully managed by App Service and is automatically renewed continuously in six-month increments, 45 days before expiration, as long as the prerequisites that you set up stay the same. All the associated bindings are updated with the renewed certificate. You create and bind the certificate to a custom domain, and let App Service do the rest.
58+
The free App Service managed certificate is a turn-key solution for helping to secure your custom DNS name in App Service. Without any action from you, this TLS/SSL server certificate is fully managed by App Service and is automatically renewed, as long as the prerequisites that you set up stay the same. All the associated bindings are updated with the renewed certificate. You create and bind the certificate to a custom domain, and let App Service do the rest.
5959

6060
Before you create a free managed certificate, make sure that you [meet the prerequisites](#prerequisites) for your app.
6161

articles/application-gateway/application-gateway-configure-listener-specific-ssl-policy.md

Lines changed: 58 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,80 +5,118 @@ services: application-gateway
55
author: mbender-ms
66
ms.service: azure-application-gateway
77
ms.topic: how-to
8-
ms.date: 02/18/2022
8+
ms.date: 07/09/2025
99
ms.author: mbender
1010
# Customer intent: As a cloud administrator, I want to configure listener-specific SSL policies on my Application Gateway, so that I can enhance security and performance by applying different SSL settings for each listener based on my application requirements.
1111
---
1212

1313
# Configure listener-specific SSL policies on Application Gateway through portal
1414

15+
This article describes how to use the Azure portal to configure listener-specific SSL policies on your Azure Application Gateway. Listener-specific SSL policies allow you to configure specific listeners to use different SSL policies from each other. You can still set a default SSL policy that all listeners use unless overridden by the listener-specific SSL policy.
1516
This article describes how to use the Azure portal to configure listener-specific SSL policies on your Application Gateway. Listener-specific SSL policies allow you to configure specific listeners to use different SSL policies from each other. You'll still be able to set a default SSL policy that all listeners use unless overwritten by the listener-specific SSL policy.
1617

1718
> [!IMPORTANT]
1819
> Starting **August 31, 2025**, all clients and backend servers interacting with Azure Application Gateway must use Transport Layer Security (TLS) 1.2 or higher, as [support for TLS 1.0 and 1.1 will be discontinued](https://azure.microsoft.com/updates/azure-application-gateway-support-for-tls-10-and-tls-11-will-end-by-31-august-2025).
1920
2021
> [!NOTE]
21-
> Only Standard_v2 and WAF_v2 SKUs support listener specific policies as listener specific policies are part of SSL profiles, and SSL profiles are only supported on v2 gateways.
22+
> Only Standard_v2 and WAF_v2 SKUs support listener-specific policies. Listener-specific policies are part of SSL profiles, and SSL profiles are only supported on v2 Application Gateways.
2223
2324

2425

25-
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
26+
## Prerequisites
27+
28+
Before you begin, ensure you have:
29+
30+
- An Azure subscription. If you don't have one, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
31+
- An existing Azure Application Gateway (Standard_v2 or WAF_v2 SKU)
32+
- Appropriate permissions to modify Application Gateway configurations
2633

2734
## Create a new Application Gateway
2835

36+
First, create a new Application Gateway as you would normally through the portal. There are no more steps needed during creation to configure listener-specific SSL policies. For more information on how to create an Application Gateway in the portal, see the [portal quickstart tutorial](./quick-create-portal.md).
37+
2938
First create a new Application Gateway as you would usually through the portal - there are no extra steps needed in the creation to configure listener-specific SSL policies. For more information on how to create an Application Gateway in portal, check out our [portal quickstart tutorial](./quick-create-portal.md).
3039

3140
## Set up a listener-specific SSL policy
3241

33-
Before you proceed, here are some important points related to listener-specific SSL policy.
42+
Before you proceed, here are some important considerations for listener-specific SSL policies:
43+
44+
SSL-Policies
45+
- We recommend using TLS 1.2 or higher
46+
- You don't need to configure client authentication on an SSL profile to associate it with a listener. You can configure only client authentication, only listener-specific SSL policy, or both in your SSL profile.
47+
- Use a [2022 Predefined](./application-gateway-ssl-policy-overview.md#predefined-tls-policy) or Custom v2 policy, enhances SSL security and performance for the entire Application Gateway (SSL Policy and SSL Profile). Therefore, you can't have different listeners using both legacy and new SSL policies simultaneously.
3448

3549
- We recommend using TLS 1.2 as this version will be mandated in the future.
3650
- You don't have to configure client authentication on an SSL profile to associate it to a listener. You can have only client authentication or listener-specific SSL policy configured, or both configured in your SSL profile.
3751
- Using a [2022 Predefined](./application-gateway-ssl-policy-overview.md#predefined-tls-policy) or Customv2 policy enhances SSL security and performance for the entire gateway (SSL Policy and SSL Profile). Therefore, you cannot have different listeners on both old and new SSL (predefined or custom) policies.
3852

39-
Consider this example, you're currently using SSL Policy and SSL Profile with "older" policies/ciphers. To use a "new" Predefined or Customv2 policy for any one of them will also require you to upgrade the other configuration. You may use the new predefined policies, or customv2 policy, or combination of these across the gateway.
53+
**Example scenario**: If you're currently using SSL Policy and SSL Profile with "legacy" policies/ciphers, upgrading to a "new" Predefined or Custom v2 policy for any component requires upgrading the other configuration as well. You can use the new predefined policies, Custom v2 policy, or a combination.
54+
55+
SSL-Policies
56+
To set up a listener-specific SSL policy, you need to first go to the **SSL settings** tab in the Azure portal and create a new SSL profile. When you create an SSL profile, you see two tabs: **Client Authentication** and **SSL Policy**. The **SSL Policy** tab is used to configure a listener-specific SSL policy. The **Client Authentication** tab is where you upload client certificates for mutual authentication. For more information, see [Configuring mutual authentication](./mutual-authentication-portal.md).
4057

4158
To set up a listener-specific SSL policy, you need to first go to the **SSL settings** tab in the Portal and create a new SSL profile. When you create an SSL profile, you see two tabs: **Client Authentication** and **SSL Policy**. The **SSL Policy** tab is to configure a listener-specific SSL policy. The **Client Authentication** tab is where to upload a client certificate for mutual authentication - for more information, check out [Configuring a mutual authentication](./mutual-authentication-portal.md).
4259

43-
1. Search for **Application Gateway** in portal, select **Application gateways**, and click on your existing Application Gateway.
60+
1. Search for **Application Gateway** in the portal, select **Application gateways**, and select your existing Application Gateway.
4461

4562
2. Select **SSL settings** from the left-side menu.
4663

47-
3. Click on the plus sign next to **SSL Profiles** at the top to create a new SSL profile.
64+
3. Select the plus sign next to **SSL Profiles** at the top to create a new SSL profile.
65+
66+
4. Enter a name under **SSL Profile Name**. In this example, we name our SSL profile *applicationGatewaySSLProfile*.
4867

49-
4. Enter a name under **SSL Profile Name**. In this example, we call our SSL profile *applicationGatewaySSLProfile*.
68+
5. Go to the **SSL Policy** tab and check the **Enable listener-specific SSL Policy** checkbox.
5069

51-
5. Go to the **SSL Policy** tab and check the **Enable listener-specific SSL Policy** box.
70+
6. Configure your listener-specific SSL policy according to your requirements. You can choose between predefined SSL policies and customizing your own SSL policy. For more information on SSL policies, see [SSL policy overview](./application-gateway-ssl-policy-overview.md). We recommend using TLS 1.2 or higher.
5271

53-
6. Set up your listener-specific SSL policy given your requirements. You can choose between predefined SSL policies and customizing your own SSL policy. For more information on SSL policies, visit [SSL policy overview](./application-gateway-ssl-policy-overview.md). We recommend using TLS 1.2
72+
> [!NOTE]
73+
> This policy is the latest version of the SSL policy available, which is recommended to ensure the best SSL security. If your gateway is configured to handle older traffic, you may need to choose an older policy to ensure that all traffic is handled correctly.
5474
5575
7. Select **Add** to save.
5676

57-
![Add listener specific SSL policy to SSL profile](./media/application-gateway-configure-listener-specific-ssl-policy/listener-specific-ssl-policy-ssl-profile.png)
77+
:::image type="content" source="./media/application-gateway-configure-listener-specific-ssl-policy/listener-specific-ssl-policy-ssl-profile.png" alt-text="Screenshot of adding listener-specific SSL policy to SSL profile in Azure portal.":::
5878

5979
## Associate the SSL profile with a listener
6080

61-
Now that we've created an SSL profile with a listener-specific SSL policy, we need to associate the SSL profile to the listener to put the listener-specific policy in action.
81+
Now you created an SSL profile with a listener-specific SSL policy. You need to associate the SSL profile with the listener to activate the listener-specific policy.
6282

63-
1. Navigate to your existing Application Gateway. If you just completed the steps above, you don't need to do anything here.
83+
1. Navigate to your existing Application Gateway.
6484

6585
2. Select **Listeners** from the left-side menu.
6686

67-
3. Click on **Add listener** if you don't already have an HTTPS listener set up. If you already have an HTTPS listener, click on it from the list.
87+
3. Select on **Add listener** if you don't already have an HTTPS listener set up. If you already have an HTTPS listener, Select on it from the list.
6888

69-
4. Fill out the **Listener name**, **Frontend IP**, **Port**, **Protocol**, and other **HTTPS Settings** to fit your requirements.
89+
4. Fill out the **Listener name**, **Frontend IP**, **Port**, and other HTTPS Settings to fit your requirements.
7090

71-
5. Check the **Enable SSL Profile** checkbox so that you can select which SSL Profile to associate with the listener.
91+
5. Select Add to save your new listener with the SSL profile associated to it.
7292

73-
6. Select the SSL profile you created from the dropdown list. In this example, we choose the SSL profile we created from the earlier steps: *applicationGatewaySSLProfile*.
93+
6. Check to see **SSL Policy** is correct or select **Change** for choose another SSL Policy. The options available include:
94+
- Default
95+
- Predefined
96+
- Custom
97+
- CustomV2
98+
Select the SSL profile you created from the dropdown list. In this example, we choose the SSL profile created in the earlier steps: *applicationGatewaySSLProfile*.
7499

75-
7. Continue configuring the remainder of the listener to fit your requirements.
100+
7. Select on tab **Listener TLS Certificates** on the second tab.
76101

77-
8. Click **Add** to save your new listener with the SSL profile associated to it.
102+
8. Select **+ Add Certificate**.
78103

79-
![Associate SSL profile to new listener](./media/mutual-authentication-portal/mutual-authentication-listener-portal.png)
104+
9. Fill out the **Certificate name**, **PFX Certificate File**, **Type** , and other **Password** to fit your requirements.
105+
106+
10. Select **Add** to save your new listener TLS Certificate with the SSL profile associated to it.
107+
108+
11. Continue configuring the remainder of the listener according to your requirements.
109+
110+
:::image type="content" source="./media/application-gateway-configure-listener-specific-ssl-policy/listener-certificate.png" alt-text="Screenshot of SSL profile association for a new listener.":::
80111

81112
### Limitations
113+
SSL-Policies
114+
115+
There are current limitations with Azure Application Gateway regarding SSL policies:
116+
117+
- Different listeners using the same port can't have SSL policies (predefined or custom) with different TLS protocol versions.
118+
- Configuring the same TLS version for different listeners works for setting cipher suite preferences for each listener.
119+
- To use different TLS protocol versions for separate listeners, you must use distinct ports for each listener.
82120
There is a limitation right now on Application Gateway that different listeners using the same port cannot have SSL policies (predefined or custom) with different TLS protocol versions. Choosing the same TLS version for different listeners work for configuring cipher suite preference for each listener. However, to use different TLS protocol versions for separate listeners, you need to use distinct ports for each.
83121

84122
## Next steps

0 commit comments

Comments
 (0)