Skip to content

Commit b771608

Browse files
author
gitName
committed
link validation
1 parent 2010eb4 commit b771608

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

articles/api-management/mcp-server-overview.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ API Management supports two ways to expose MCP servers:
6868

6969
## Govern MCP servers
7070

71-
Configure one or more API Management [policies](../articles/api-management/api-management-howto-policies.md) to help manage the MCP server. The policies are applied to all API operations exposed as tools in the MCP server and can be used to control access, authentication, and other aspects of the tools.
71+
Configure one or more API Management [policies](api-management-howto-policies.md) to help manage the MCP server. The policies are applied to all API operations exposed as tools in the MCP server and can be used to control access, authentication, and other aspects of the tools.
7272

7373
Configure policies such as the following::
7474

@@ -84,7 +84,7 @@ You can secure both inbound access to the MCP server (from an MCP client to API
8484

8585
### Secure inbound access
8686

87-
One option to secure inbound access is to configure a policy to validate a JSON web token (JWT) in the incoming requests. This ensures that only authorized clients can access the MCP server. Use the [validate-jwt](../articles/api-management/validate-jwt-policy.md) or [validate-azure-ad-token](../articles/api-management/validate-azure-ad-token-policy.md) policy to validate the JWT token in the incoming requests. For example:
87+
One option to secure inbound access is to configure a policy to validate a JSON web token (JWT) in the incoming requests. This ensures that only authorized clients can access the MCP server. Use the [validate-jwt](validate-jwt-policy.md) or [validate-azure-ad-token](validate-azure-ad-token-policy.md) policy to validate the JWT token in the incoming requests. For example:
8888

8989
<!-- update to validate-azure-ad-token-policy.md if preferred -->
9090
```xml
@@ -106,14 +106,14 @@ One option to secure inbound access is to configure a policy to validate a JSON
106106

107107
### Secure outbound access
108108

109-
You can use API Management's [credential manager](../articles/api-management/credentials-overview.md) to securely inject secrets or tokens for calls to a backend API. At a high level, the process is as follows:
109+
You can use API Management's [credential manager](credentials-overview.md) to securely inject secrets or tokens for calls to a backend API. At a high level, the process is as follows:
110110

111111
1. Register an application in a supported identity provider.
112112
1. Create a credential provider resource in API Management to manage the credentials from the identity provider.
113113
1. Configure a connection to the provider in API Management.
114114
1. Configure `get-authorization-context` and `set-header` policies to fetch the token credentials and present them in an **Authorization** header of the API requests.
115115

116-
For a step-by-step guide to call an example backend API using credentials generated in credential manager, see [Configure credential manager - GitHub](../articles/api-management/credentials-how-to-github.md).
116+
For a step-by-step guide to call an example backend API using credentials generated in credential manager, see [Configure credential manager - GitHub](credentials-how-to-github.md).
117117

118118

119119
## Monitoring
@@ -155,10 +155,10 @@ MCP servers in API Management are available in the following service tiers:
155155

156156
* [MCP client authorization lab](https://github.com/Azure-Samples/AI-Gateway/tree/main/labs/mcp-client-authorization)
157157

158-
* [Use the Azure API Management extension for VS Code to import and manage APIs](../articles/api-management/visual-studio-code-tutorial.md)
158+
* [Use the Azure API Management extension for VS Code to import and manage APIs](visual-studio-code-tutorial.md)
159159

160160
* [Register and discover remote MCP servers in Azure API Center](../articles/api-center/register-discover-mcp-server.md)
161161

162-
* [Expose REST API in API Management as an MCP server](../articles/api-management/export-rest-mcp-server.md)
162+
* [Expose REST API in API Management as an MCP server](export-rest-mcp-server.md)
163163

164-
* [Expose and govern existing MCP server](../articles/api-management/expose-existing-mcp-server.md)
164+
* [Expose and govern existing MCP server](expose-existing-mcp-server.md)

includes/api-management-configure-test-mcp-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ For a tutorial on how to configure policies, see [Transform and protect your API
1313

1414
To configure policies for the MCP server:
1515
1. In the [Azure portal](https://portal.azure.com), navigate to your API Management instance.
16-
[!INCLUDE [preview-callout-mcp-feature-flag](includes/preview/preview-callout-mcp-feature-flag.md)]
16+
[!INCLUDE [preview-callout-mcp-feature-flag](preview-callout-mcp-feature-flag.md)]
1717

1818
1. In the left-hand menu, under **APIs**, select **MCP servers**.
1919
1. Select the MCP server that you created.

0 commit comments

Comments
 (0)