Skip to content

Commit bd4e3e1

Browse files
committed
update
2 parents 08003c8 + 64e05a5 commit bd4e3e1

File tree

113 files changed

+924
-757
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

113 files changed

+924
-757
lines changed

articles/active-directory-b2c/external-identities-videos.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ ms.subservice: b2c
1515
---
1616

1717
# Microsoft Azure Active Directory B2C external identity video series
18+
1819
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
1920

2021
Learn the basics of External Identities - Azure Active Directory B2C (Azure AD B2C) and Microsoft Entra B2B in the Microsoft identity platform.

articles/active-directory-b2c/faq.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ metadata:
1414
ms.custom: b2c-support, has-azure-ad-ps-ref,azure-ad-ref-level-one-done
1515
title: 'Azure AD B2C: Frequently asked questions (FAQ)'
1616
summary: |
17+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
18+
1719
This page answers frequently asked questions about the Azure Active Directory B2C (Azure AD B2C). Keep checking back for updates.
1820
1921
sections:
@@ -22,7 +24,7 @@ sections:
2224
- question: |
2325
Azure AD B2C end of sale
2426
answer: |
25-
Effective May 1, 2025 Azure AD B2C will no longer be available to purchase for new customers, but current Azure AD B2C customers can continue using the product. The product experience, including creating new tenants or user flows, will remain unchanged. The operational commitments, including service level agreements (SLAs), security updates, and compliance, will also remain unchanged. We'll continue supporting Azure AD B2C until at least May 2030. More information, including migration plans will be made available. Contact your account representative for more information and to learn more about Microsoft Entra External ID.
27+
Effective **May 1, 2025** Azure AD B2C will no longer be available to purchase for new customers, but current Azure AD B2C customers can continue using the product. The product experience, including creating new tenants or user flows, will remain unchanged. The operational commitments, including service level agreements (SLAs), security updates, and compliance, will also remain unchanged. We'll continue supporting Azure AD B2C until at least May 2030. More information, including migration plans will be made available. Contact your account representative for more information and to learn more about Microsoft Entra External ID.
2628
- question: |
2729
What is Microsoft Entra External ID?
2830
answer: |

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -211,8 +211,8 @@ Next, specify that the application should be treated as a public client:
211211
1. In the left menu, under **Manage**, select **Authentication**.
212212
1. Under **Advanced settings**, in the **Allow public client flows** section, set **Enable the following mobile and desktop flows** to **Yes**.
213213
1. Select **Save**.
214-
1. Ensure that **"isFallbackPublicClient": true** is set in the application manifest:
215-
1. In the left menu, under **Manage**, select **Manifest** to open application manifest.
214+
1. Ensure that **"isFallbackPublicClient": true** is set in the Microsoft Graph App Manifest(New):
215+
1. In the left menu, under **Manage**, select **Manifest** to open Microsoft Graph App Manifest(New)
216216
1. Switch from the **Microsoft Graph App Manifest (New)** tab to the **AAD Graph App Manifest (Deprecating Soon)** tab.
217217
1. Find **isFallbackPublicClient** key and ensure its value is set to **true**.
218218

articles/api-management/api-management-howto-aad-b2c.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: azure-api-management
99
ms.topic: how-to
10-
ms.date: 01/07/2025
10+
ms.date: 05/20/2025
1111
ms.author: danlep
1212
ms.custom: engagement-fy23
1313
---
@@ -16,6 +16,8 @@ ms.custom: engagement-fy23
1616

1717
[!INCLUDE [premium-dev-standard-premiumv2-standardv2-basicv2.md](../../includes/api-management-availability-premium-dev-standard-premiumv2-standardv2-basicv2.md)]
1818

19+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
20+
1921
Azure Active Directory B2C is a cloud identity management solution for consumer-facing web and mobile applications. You can use it to manage access to your API Management developer portal.
2022

2123
In this tutorial, you'll learn the configuration required in your API Management service to integrate with Azure Active Directory B2C.

articles/api-management/breaking-changes/identity-provider-adal-retirement-sep-2025.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,16 @@ services: api-management
55
author: mikebudzynski
66
ms.service: azure-api-management
77
ms.topic: reference
8-
ms.date: 09/06/2022
8+
ms.date: 05/21/2025
99
ms.author: mibudz
1010
---
1111

1212
# ADAL-based Microsoft Entra ID or Azure AD B2C identity provider retirement (September 2025)
1313

1414
[!INCLUDE [api-management-availability-premium-dev-standard-basic-premiumv2-standardv2-basicv2](../../../includes/api-management-availability-premium-dev-standard-basic-premiumv2-standardv2-basicv2.md)]
1515

16+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
17+
1618
On 30 September, 2025 as part of our continuing work to increase the resiliency of API Management services, we're removing the support for the previous library for user authentication and authorization in the developer portal (AD Authentication Library, or ADAL). You need to migrate your Microsoft Entra ID or Azure AD B2C applications, change identity provider configuration to use the Microsoft Authentication Library (MSAL), and republish your developer portal.
1719

1820
This change will have no effect on the availability of your API Management service. However, you have to take steps described below to configure your API Management service if you wish to continue using Microsoft Entra ID or Azure AD B2C identity providers beyond 30 September, 2025.
@@ -68,4 +70,4 @@ If you have questions, get answers from community experts in [Microsoft Q&A](htt
6870

6971
## Next steps
7072

71-
See all [upcoming breaking changes and feature retirements](overview.md).
73+
See all [upcoming breaking changes and feature retirements](overview.md).

articles/api-management/howto-protect-backend-frontend-azure-ad-b2c.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: WillEastbury
77
manager: alberts
88
ms.service: azure-api-management
99
ms.topic: how-to
10-
ms.date: 02/18/2021
10+
ms.date: 05/20/2025
1111
ms.author: wieastbu
1212
ms.custom: fasttrack-new, fasttrack-update, devx-track-js
1313
---
@@ -16,6 +16,8 @@ ms.custom: fasttrack-new, fasttrack-update, devx-track-js
1616

1717
[!INCLUDE [api-management-availability-all-tiers](../../includes/api-management-availability-all-tiers.md)]
1818

19+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
20+
1921
This scenario shows you how to configure your Azure API Management instance to protect an API.
2022
We'll use the Azure AD B2C SPA (Auth Code + PKCE) flow to acquire a token, alongside API Management to secure an Azure Functions backend using EasyAuth.
2123

@@ -36,7 +38,7 @@ For defense in depth, we then use EasyAuth to validate the token again inside th
3638
> * Import of an Azure Functions API into Azure API Management
3739
> * Securing the API in Azure API Management
3840
> * Calling the Azure Active Directory B2C Authorization Endpoints via the Microsoft identity platform Libraries (MSAL.js)
39-
> * Storing a HTML / Vanilla JS Single Page Application and serving it from an Azure Blob Storage Endpoint
41+
> * Storing an HTML / Vanilla JS Single Page Application and serving it from an Azure Blob Storage Endpoint
4042
4143
## Prerequisites
4244

@@ -70,7 +72,7 @@ Here's a quick overview of the steps:
7072
1. Test the Client Application
7173

7274
> [!TIP]
73-
> We're going to capture quite a few pieces of information and keys etc as we walk this document, you might find it handy to have a text editor open to store the following items of configuration temporarily.
75+
> We're going to capture quite a few pieces of information and keys etc. as we walk this document, you might find it handy to have a text editor open to store the following items of configuration temporarily.
7476
>
7577
> B2C BACKEND CLIENT ID:
7678
> B2C BACKEND CLIENT SECRET KEY:
@@ -174,7 +176,7 @@ Open the Azure AD B2C blade in the portal and do the following steps.
174176
1. Switch back to the Code + Test tab, click 'Get Function URL', then copy the URL that appears and save it for later.
175177

176178
> [!NOTE]
177-
> The bindings you just created simply tell Functions to respond on anonymous http GET requests to the URL you just copied (`https://yourfunctionappname.azurewebsites.net/api/hello?code=secretkey`). Now we have a scalable serverless https API, that is capable of returning a very simple payload.
179+
> The bindings you just created simply tell Functions to respond on anonymous http GET requests to the URL you just copied (`https://yourfunctionappname.azurewebsites.net/api/hello?code=secretkey`). Now we have a scalable serverless https API that is capable of returning a very simple payload.
178180
>
179181
> You can now test calling this API from a web browser using your version of the URL above that you just copied and saved. You can also remove the query string parameters "?code=secretkey" portion of the URL , and test again, to prove that Azure Functions will return a 401 error.
180182

articles/api-management/secure-developer-portal-access.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: concept-article
9-
ms.date: 09/12/2023
9+
ms.date: 05/21/2025
1010
ms.author: danlep
1111
---
1212

@@ -21,13 +21,15 @@ API Management has a fully customizable, standalone, managed [developer portal](
2121
2222
## Authentication options
2323

24-
* **External users** - The preferred option when the developer portal is consumed externally is to enable business-to-consumer access control through Azure Active Directory B2C (Azure AD B2C).
25-
* Azure AD B2C provides the option of using Azure AD B2C native accounts: users sign up to Azure AD B2C and use that identity to access the developer portal.
26-
* Azure AD B2C is also useful if you want users to access the developer portal using existing social media or federated organizational accounts.
27-
* Azure AD B2C provides many features to improve the end user sign-up and sign-in experience, including conditional access and MFA.
24+
* **External users** - The preferred option when the developer portal is consumed externally is to enable business-to-consumer access control through Azure Active Directory B2C (Azure AD B2C) or [Microsoft Entra External ID](/entra/external-id/customers/overview-customers-ciam).
25+
* Both Azure AD B2C and Microsoft Entra External ID provides the option of using native accounts: users sign up and use that identity to access the developer portal.
26+
* Both services are also useful if you want users to access the developer portal using existing social media or federated organizational accounts.
27+
* Both services provide many features to improve the end user sign-up and sign-in experience, including conditional access and MFA.
2828

2929
For steps to enable Azure AD B2C authentication in the developer portal, see [How to authorize developer accounts by using Azure Active Directory B2C in Azure API Management](api-management-howto-aad-b2c.md).
3030

31+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
32+
3133

3234
* **Internal users** - The preferred option when the developer portal is consumed internally is to leverage your corporate Microsoft Entra ID. Microsoft Entra ID provides a seamless single sign-on (SSO) experience for corporate users who need to access and discover APIs through the developer portal.
3335

@@ -116,4 +118,4 @@ Go a step further by delegating [user registration or product subscription](api-
116118

117119
## Related content
118120
* Learn more about [authentication and authorization](../active-directory/develop/authentication-vs-authorization.md) in the Microsoft identity platform.
119-
* Learn how to [mitigate OWASP API security threats](mitigate-owasp-api-threats.md) using API Management.
121+
* Learn how to [mitigate OWASP API security threats](mitigate-owasp-api-threats.md) using API Management.

articles/api-management/self-hosted-gateway-overview.md

Lines changed: 14 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -95,18 +95,20 @@ Self-hosted gateways require outbound TCP/IP connectivity to Azure on port 443.
9595

9696
To operate properly, each self-hosted gateway needs outbound connectivity on port 443 to the following endpoints associated with its cloud-based API Management instance:
9797

98-
| Description | Required for v1 | Required for v2 | Notes |
99-
|:------------|:---------------------|:---------------------|:------|
100-
| Hostname of the configuration endpoint | `<apim-service-name>.management.azure-api.net` | `<apim-service-name>.configuration.azure-api.net`<sup>1</sup> | Custom hostnames are also supported and can be used instead of the default hostname. |
101-
| Public IP address of the API Management instance | ✔️ | ✔️ | IP address of primary location is sufficient. |
102-
| Public IP addresses of Azure Storage [service tag](../virtual-network/service-tags-overview.md) | ✔️ | Optional<sup>2</sup> | IP addresses must correspond to primary location of API Management instance. |
103-
| Hostname of Azure Blob Storage account | ✔️ | Optional<sup>2</sup> | Account associated with instance (`<blob-storage-account-name>.blob.core.windows.net`) |
104-
| Hostname of Azure Table Storage account | ✔️ | Optional<sup>2</sup> | Account associated with instance (`<table-storage-account-name>.table.core.windows.net`) |
105-
| Endpoints for Azure Resource Manager | ✔️ | Optional<sup>3</sup> | Required endpoints are `management.azure.com`. |
106-
| Endpoints for Microsoft Entra integration | ✔️ | Optional<sup>4</sup> | Required endpoints are `<region>.login.microsoft.com` and `login.microsoftonline.com`. |
107-
| Endpoints for [Azure Application Insights integration](api-management-howto-app-insights.md) | Optional<sup>5</sup> | Optional<sup>5</sup> | Minimal required endpoints are:<ul><li>`rt.services.visualstudio.com:443`</li><li>`dc.services.visualstudio.com:443`</li><li>`{region}.livediagnostics.monitor.azure.com:443`</li></ul>Learn more in [Azure Monitor docs](/azure/azure-monitor/ip-addresses#outgoing-ports) |
108-
| Endpoints for [Event Hubs integration](api-management-howto-log-event-hubs.md) | Optional<sup>5</sup> | Optional<sup>5</sup> | Learn more in [Azure Event Hubs docs](../event-hubs/network-security.md) |
109-
| Endpoints for [external cache integration](api-management-howto-cache-external.md) | Optional<sup>5</sup> | Optional<sup>5</sup> | This requirement depends on the external cache that is being used |
98+
99+
| Endpoint | Required? | Notes |
100+
|:------------|:---------------------|:------|
101+
| Hostname of the configuration endpoint | `<apim-service-name>.configuration.azure-api.net`<sup>1</sup> | Custom hostnames are also supported and can be used instead of the default hostname. |
102+
| Public IP address of the API Management instance | ✔️ | IP address of primary location is sufficient. |
103+
| Public IP addresses of Azure Storage [service tag](../virtual-network/service-tags-overview.md) | Optional<sup>2</sup> | IP addresses must correspond to primary location of API Management instance. |
104+
| Hostname of Azure Blob Storage account | Optional<sup>2</sup> | Account associated with instance (`<blob-storage-account-name>.blob.core.windows.net`) |
105+
| Hostname of Azure Table Storage account | Optional<sup>2</sup> | Account associated with instance (`<table-storage-account-name>.table.core.windows.net`) |
106+
| Endpoints for Azure Resource Manager | Optional<sup>3</sup> | Required endpoints are `management.azure.com`. |
107+
| Endpoints for Microsoft Entra integration | Optional<sup>4</sup> | Required endpoints are `<region>.login.microsoft.com` and `login.microsoftonline.com`. |
108+
| Endpoints for [Azure Application Insights integration](api-management-howto-app-insights.md) | Optional<sup>5</sup> | Minimal required endpoints are:<ul><li>`rt.services.visualstudio.com:443`</li><li>`dc.services.visualstudio.com:443`</li><li>`{region}.livediagnostics.monitor.azure.com:443`</li></ul>Learn more in [Azure Monitor docs](/azure/azure-monitor/ip-addresses#outgoing-ports) |
109+
| Endpoints for [Event Hubs integration](api-management-howto-log-event-hubs.md) | Optional<sup>5</sup> | Learn more in [Azure Event Hubs docs](../event-hubs/network-security.md) |
110+
| Endpoints for [external cache integration](api-management-howto-cache-external.md) | Optional<sup>5</sup> | This requirement depends on the external cache that is being used |
111+
110112

111113
<sup>1</sup>For an API Management instance in an internal virtual network, see [Connectivity in an internal virtual network](#connectivity-in-internal-virtual-network).<br/>
112114
<sup>2</sup>Only required in v2 when API inspector or quotas are used in policies.<br/>
@@ -167,9 +169,6 @@ The following functionality found in the managed gateways is **not available** i
167169

168170
### Transport Layer Security (TLS)
169171

170-
> [!IMPORTANT]
171-
> This overview is only applicable to the self-hosted gateway v1 & v2.
172-
173172
#### Supported protocols
174173

175174
The self-hosted gateway provides support for TLS v1.2 by default.
@@ -178,9 +177,6 @@ Customers using custom domains can enable TLS v1.0 and/or v1.1 [in the control p
178177

179178
#### Available cipher suites
180179

181-
> [!IMPORTANT]
182-
> This overview is only applicable to the self-hosted gateway v2.
183-
184180
The self-hosted gateway uses the following cipher suites for both client and server connections:
185181

186182
- `TLS_AES_256_GCM_SHA384`

articles/api-management/self-hosted-gateway-settings-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -71,8 +71,8 @@ This guidance helps you provide the required information to define how to authen
7171
7272
| Name | Description | Required | Default | Availability |
7373
|-------------------------|------------------------|----------|-------------------| ----|
74-
| k8s.ingress.enabled | Enable Kubernetes Ingress integration. | No | `false` | v1.2+ |
75-
| k8s.ingress.namespace | Kubernetes namespace to watch Kubernetes Ingress resources in. | No | `default` | v1.2+ |
74+
| k8s.ingress.enabled | Enable Kubernetes Ingress integration. | No | `false` | v2.0+ |
75+
| k8s.ingress.namespace | Kubernetes namespace to watch Kubernetes Ingress resources in. | No | `default` | v2.0+ |
7676
| k8s.ingress.dns.suffix | DNS suffix to build DNS hostname for services to send requests to. | No | `svc.cluster.local` | v2.4+ |
7777
| k8s.ingress.config.path | Path to Kubernetes configuration (Kubeconfig). | No | N/A | v2.4+ |
7878

articles/app-service/monitor-instances-health-check.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ After providing your application's Health check path, you can monitor the health
163163

164164
## Limitations
165165

166-
- Health check can be enabled for **Free** and **Shared** App Service plans, so you can have metrics on the site's health and set up alerts. However, because **Free** and **Shared** sites can't scale out, unhealthy instances won't be replaced. You should scale up to the **Basic** tier or higher so you can scale out to two or more instances and get the full benefit of Health check. This is recommended for production-facing applications as it increases your app's availability and performance.
166+
- Health check can be enabled for **Free** and **Shared** App Service plans, so you can have metrics on the site's health and set up alerts. However, because **Free** and **Shared** sites don't support scale out, unhealthy instances won't be replaced automatically. You should scale up to the **Basic** tier or higher so you can scale out to two or more instances and get the full benefit of Health check. This is recommended for production-facing applications as it increases your app's availability and performance.
167167
- An App Service plan can have a maximum of one unhealthy instance replaced per hour and, at most, three instances per day.
168168
- There's a nonconfigurable limit on the total number of instances replaced by Health check per scale unit. If this limit is reached, no unhealthy instances are replaced. This value gets reset every 12 hours.
169169

0 commit comments

Comments
 (0)