Skip to content

Commit c300245

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into patricka-est
2 parents ba80531 + 7f456d0 commit c300245

File tree

85 files changed

+1009
-700
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

85 files changed

+1009
-700
lines changed

articles/active-directory-b2c/billing.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kengaderdus
55
manager: CelesteDG
66
ms.service: azure-active-directory
77
ms.topic: reference
8-
ms.date: 09/11/2024
8+
ms.date: 03/10/2025
99
ms.author: kengaderdus
1010
ms.subservice: b2c
1111
ms.custom: fasttrack-edit
@@ -29,7 +29,7 @@ A monthly active user (MAU) is a unique user that performs an authentication wit
2929

3030
If Azure AD B2C [Go-Local add-on](data-residency.md#go-local-add-on) is available in your country/region, and you enable it, you'll be charged per MAU, which is an added charge to your Azure AD B2C [Premium P1 or P2 pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/) license. Learn more [About Local Data Residency add-on](#about-go-local-add-on)
3131

32-
Also, if you choose to provide higher levels of assurance by using multifactor authentication (MFA) for Voice and SMS, you'll be charged a worldwide flat fee for each MFA attempt that month, whether the sign in is successful or unsuccessful.
32+
Also, if you choose to provide higher levels of assurance by using multifactor authentication (MFA) for Voice and SMS, you'll be charged a fee for each MFA attempt that month, whether the sign in is successful or unsuccessful.
3333

3434

3535
> [!IMPORTANT]
@@ -85,7 +85,7 @@ A subscription linked to an Azure AD B2C tenant can be used for the billing of A
8585
### Create the link
8686

8787
1. Sign in to the [Azure portal](https://portal.azure.com).
88-
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
88+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Microsoft Entra tenant from the **Directories + subscriptions** menu.
8989
1. Select **Create a resource**, and then, in the **Search services and Marketplace** field, search for and select **Azure Active Directory B2C**.
9090
1. Select **Create**.
9191
1. Select **Link an existing Azure AD B2C Tenant to my Azure subscription**.

articles/active-directory-b2c/openid-connect-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ The technical profile also returns claims that aren't returned by the identity p
8989
| HttpBinding | No | The expected HTTP binding to the access token and claims token endpoints. Possible values: `GET` or `POST`. |
9090
| ValidTokenIssuerPrefixes | No | A key that can be used to sign in to each of the tenants when using a multi-tenant identity provider such as Microsoft Entra ID. |
9191
| UsePolicyInRedirectUri | No | Indicates whether to use a policy when constructing the redirect URI. When you configure your application in the identity provider, you need to specify the redirect URI. The redirect URI points to Azure AD B2C, `https://{your-tenant-name}.b2clogin.com/{your-tenant-name}.onmicrosoft.com/oauth2/authresp`. If you specify `true`, you need to add a redirect URI for each policy you use. For example: `https://{your-tenant-name}.b2clogin.com/{your-tenant-name}.onmicrosoft.com/{policy-name}/oauth2/authresp`. |
92-
| MarkAsFailureOnStatusCode5xx | No | Indicates whether a request to an external service should be marked as a failure if the Http status code is in the 5xx range. The default is `false`. |
92+
| MarkAsFailureOnStatusCode5xx | No | Indicates whether a request to an external service should be marked as a failure if the HTTP status code is in the 5xx range. The default is `false`. |
9393
| DiscoverMetadataByTokenIssuer | No | Indicates whether the OIDC metadata should be discovered by using the issuer in the JWT.If you need to build the metadata endpoint URL based on Issuer, set this to `true`.|
9494
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
9595
|token_endpoint_auth_method| No | Specifies how Azure AD B2C sends the authentication header to the token endpoint. Possible values: `client_secret_post` (default), and `client_secret_basic`, `private_key_jwt`. For more information, see [OpenID Connect client authentication section](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication). |

articles/api-center/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,12 +68,14 @@
6868
href: set-up-notification-workflow.md
6969
- name: API discovery and consumption
7070
items:
71+
- name: Enable API Center portal
72+
href: set-up-api-center-portal.md
73+
- name: Self-host Azure API Center portal
74+
href: self-host-api-center-portal.md
7175
- name: Discover and consume APIs - VS Code extension
7276
href: discover-apis-vscode-extension.md
7377
- name: Enable platform API catalog - VS Code extension
7478
href: enable-platform-api-catalog-vscode-extension.md
75-
- name: Self-host Azure API Center portal
76-
href: enable-api-center-portal.md
7779
- name: Check API calls use minimal permissions with Dev Proxy
7880
href: check-minimal-api-permissions-dev-proxy.md
7981
- name: API center management and operations

articles/api-center/enable-api-center-portal.md

Lines changed: 0 additions & 194 deletions
This file was deleted.
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: Include file
3+
description: Include file
4+
services: api-center
5+
author: dlepow
6+
7+
ms.service: azure-api-center
8+
ms.topic: include
9+
ms.date: 03/04/2025
10+
ms.author: danlep
11+
ms.custom: Include file
12+
---
13+
14+
## Create Microsoft Entra app registration
15+
16+
First configure an app registration in your Microsoft Entra ID tenant. The app registration enables the API Center portal to access data from your API center on behalf of a signed-in user.
17+
18+
1. In the [Azure portal](https://portal.azure.com), navigate to **Microsoft Entra ID** > **App registrations**.
19+
1. Select **+ New registration**.
20+
1. On the **Register an application** page, set the values as follows:
21+
22+
1. Set **Name** to a meaningful name such as *api-center-portal*
23+
1. Under **Supported account types**, select **Accounts in this organizational directory (Single tenant)**.
24+
1. In **Redirect URI**, select **Single-page application (SPA)** and set the URI.
25+
Enter the URI of your API Center portal deployment, in the following form: `https://<service-name>.portal.<location>.azure-api-center.ms`. Replace `<service name>` and `<location>` with the name of your API center and the location where it's deployed, Example: `https://myapicenter.portal.eastus.azure-api-center.ms`.
26+
1. Select **Register**.
27+
1. On the **Overview** page, copy the **Application (client) ID**. You set this value when you publish the portal.
28+
29+
1. On the **API permissions** page, select **+ Add a permission**.
30+
1. On the **Request API permissions** page, select the **APIs my organization uses** tab. Search for and select **Azure API Center**. You can also search for and select application ID `c3ca1a77-7a87-4dba-b8f8-eea115ae4573`.
31+
1. On the **Request permissions** page, select **user_impersonation**.
32+
1. Select **Add permissions**.
33+
34+
The Azure API Center permissions appear under **Configured permissions**.
35+
36+
:::image type="content" source="media/api-center-portal-app-registration/configure-app-permissions.png" alt-text="Screenshot of required permissions in Microsoft Entra ID app registration in the portal." lightbox="media/api-center-portal-app-registration/configure-app-permissions.png":::
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: Include file
3+
description: Include file
4+
services: api-center
5+
author: dlepow
6+
7+
ms.service: azure-api-center
8+
ms.topic: include
9+
ms.date: 03/05/2025
10+
ms.author: danlep
11+
ms.custom: Include file
12+
---
13+
14+
## API Management and API Center portals
15+
16+
The [Azure API Management](../../api-management/api-management-key-concepts.md) and [Azure API Center](../overview.md) services both provide portals for developers to discover and consume APIs:
17+
18+
* The *API Management developer portal* allows users to find managed APIs, learn how to use them, request access, and test them.
19+
* The *API Center portal* (preview) is a multi-gateway portal where users can discover and filter the organization's complete API inventory.
20+
21+
While the two portals share some features, they also have distinct differences. The following table compares current capabilities to help determine which portal to use. Some organizations may prefer one portal, while others may need both.
22+
23+
| Feature | API Management developer portal | API Center portal (preview) |
24+
| --- | --- | --- |
25+
| Search and filter API inventory | API Management instance only | All APIs<sup>1</sup> |
26+
| View API details and definitions | ✔️ | ✔️ |
27+
| View API documentation | ✔️ | ✔️ |
28+
| Customize with branding | ✔️ | Name only |
29+
| Integrate with Microsoft Entra ID | ✔️ | ✔️ |
30+
| Add custom widgets | ✔️ ||
31+
| Customize with WordPress | ✔️ ||
32+
| Test APIs in test console | ✔️ ||
33+
| Subscribe to APIs | ✔️ ||
34+
| View API usage analytics | ✔️ ||
35+
36+
<sup>1</sup> The API Center portal can contain all APIs in your organization, including those managed in Azure API Management and other platforms, as well as unmanaged APIs and APIs under development.

0 commit comments

Comments
 (0)