Skip to content

Commit d15b321

Browse files
authored
Merge pull request #286344 from MicrosoftDocs/main
Publish to live, Sunday 4 AM PST, 9/8
2 parents de074cc + 4e17af3 commit d15b321

File tree

105 files changed

+606
-1987
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

105 files changed

+606
-1987
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3125,6 +3125,11 @@
31253125
"redirect_url": "/azure/openshift/howto-byok",
31263126
"redirect_document_id": false
31273127
},
3128+
{
3129+
"source_path_from_root": "/articles/openshift/howto-deploy-java-jboss-enterprise-application-platform-with-auto-redeploy.md",
3130+
"redirect_url": "/azure/openshift/index",
3131+
"redirect_document_id": false
3132+
},
31283133
{
31293134
"source_path_from_root": "/articles/openshift/quickstart-portal.md",
31303135
"redirect_url": "/azure/openshift/create-cluster",
@@ -4761,4 +4766,4 @@
47614766
"redirect_document_id": false
47624767
}
47634768
]
4764-
}
4769+
}

articles/api-management/api-management-howto-add-products.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ In this tutorial, you learn how to:
5050
|--------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
5151
| Display name | The name as you want it to be shown in the [developer portal](api-management-howto-developer-portal.md). |
5252
| Description | Provide information about the product such as its purpose, the APIs it provides access to, and other details. |
53-
| State | Select **Published** if you want to publish the product. Before the APIs in a product can be called, the product must be published. By default, new products are unpublished, and are visible only to the **Administrators** group. |
53+
| State | Select **Published** if you want to publish the product to the developer portal. Before the APIs in a product can be discovered by developers, the product must be published. By default, new products are unpublished. |
5454
| Requires subscription | Select if a user is required to subscribe to use the product (the product is *protected*) and a subscription key must be used to access the product's APIs. If a subscription isn't required (the product is *open*), a subscription key isn't required to access the product's APIs. See [Access to product APIs](#access-to-product-apis) later in this article. |
5555
| Requires approval | Select if you want an administrator to review and accept or reject subscription attempts to this product. If not selected, subscription attempts are auto-approved. |
5656
| Subscription count limit | Optionally limit the count of multiple simultaneous subscriptions. |
@@ -83,7 +83,7 @@ You can specify various values for your product:
8383
|-----------|-------------|
8484
| `--product-name` | The name as you want it to be shown in the [developer portal](api-management-howto-developer-portal.md). |
8585
| `--description` | Provide information about the product such as its purpose, the APIs it provides access to, and other details. |
86-
| `--state` | Select **published** if you want to publish the product. Before the APIs in a product can be called, the product must be published. By default, new products are unpublished, and are visible only to the **Administrators** group. |
86+
| `--state` | Select **published** if you want to publish the product to the developer portal. Before the APIs in a product can be discovered by developers, the product must be published. By default, new products are unpublished. |
8787
| `--subscription-required` | Select if a user is required to subscribe to use the product (the product is *protected*) or a subscription isn't required (the product is *open*). See [Access to product APIs](#access-to-product-apis) later in this article. |
8888
| `--approval-required` | Select if you want an administrator to review and accept or reject subscription attempts to this product. If not selected, subscription attempts are auto-approved. |
8989
| `--subscriptions-limit` | Optionally, limit the count of multiple simultaneous subscriptions.|

articles/api-management/api-management-howto-create-groups.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,27 @@
11
---
2-
title: Manage developer accounts using groups in Azure API Management
2+
title: Manage developer accounts using groups - Azure API Management
33
titleSuffix: Azure API Management
44
description: Learn how to manage developer accounts using groups in Azure API Management. Create groups, and then associate them with products or developers.
55

66
author: dlepow
77
ms.service: azure-api-management
8-
ms.topic: article
9-
ms.date: 03/17/2023
8+
ms.topic: concept-article
9+
ms.date: 09/03/2024
1010
ms.author: danlep
1111
ms.custom: engagement-fy23
1212
---
1313
# How to create and use groups to manage developer accounts in Azure API Management
1414

1515
[!INCLUDE [api-management-availability-premium-dev-standard-basic-standardv2-basicv2](../../includes/api-management-availability-premium-dev-standard-basic-standardv2-basicv2.md)]
1616

17-
In API Management, groups are used to manage the visibility of products to developers. Products are first made visible to groups, and then developers in those groups can view and subscribe to the products that are associated with the groups.
17+
In API Management, groups are used to manage the visibility of products to developers in the developer portal. Products are first made visible to groups, and then developers in those groups can view and subscribe to the products that are associated with the groups.
1818

19-
API Management has the following immutable system groups:
19+
API Management has the following immutable groups:
2020

21-
* **Administrators** - Azure subscription administrators are members of this group. Administrators manage API Management service instances, creating the APIs, operations, and products that are used by developers. You can't add users to this group.
21+
* **Administrators** - Built-in group containing only the administrator email account provided at the time of service creation. Its membership is managed by the system; users can't be added to or removed from the group. The primary purpose of the administrator account is to access the developer portal's administrative interface to [customize and publish](api-management-howto-developer-portal-customize.md) the portal content. Any user that has [Azure RBAC permissions](/azure/api-management/developer-portal-faq#what-permissions-do-i-need-to-edit-the-developer-portal) to customize the developer portal can authenticate as the administrator to customize the portal.
2222

2323
> [!NOTE]
24-
> You can change the administrator [email settings](api-management-howto-configure-notifications.md#configure-email-settings) that are used in notifications sent to developers from your API Management instance.
24+
> At any time, a service owner can update the administrator [email settings](api-management-howto-configure-notifications.md#configure-email-settings) that are used in notifications from your API Management instance.
2525
2626
* **Developers** - Authenticated developer portal users fall into this group. Developers are the customers that build applications using your APIs. Developers are granted access to the developer portal and build applications that call the operations of an API.
2727
* **Guests** - Unauthenticated developer portal users, such as prospective customers visiting the developer portal of an API Management instance fall into this group. They can be granted certain read-only access, such as the ability to view APIs but not call them.
@@ -51,7 +51,7 @@ This section shows how to add a new group to your API Management account.
5151
Once the group is created, it's added to the **Groups** list.
5252
* To edit the **Name** or **Description** of the group, click the name of the group and select **Settings**
5353

54-
* To delete the group, click the name of the group and press **Delete**.
54+
* To delete the group, select the name of the group and press **Delete**.
5555

5656
Now that the group is created, it can be associated with products and developers.
5757

@@ -89,7 +89,7 @@ This section shows how to associate groups with members.
8989

9090
Once the association is added between the developer and the group, you can view it in the **Users** tab.
9191

92-
## <a name="next-steps"> </a>Next steps
92+
## <a name="next-steps"> </a>Related content
9393

9494
* Once a developer is added to a group, they can view and subscribe to the products associated with that group. For more information, see [How to create and publish a product in Azure API Management][How create and publish a product in Azure API Management].
9595
* You can control how the developer portal content appears to different users and groups you've configured. Learn more about [visibility and access controls in the developer portal](developer-portal-overview.md#content-visibility-and-access).

articles/api-management/api-management-key-concepts.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -157,20 +157,17 @@ When a product is ready for use by developers, it can be published. Once publish
157157

158158
### Groups
159159

160-
Groups are used to manage the visibility of products to developers. API Management has the following built-in groups:
161-
162-
* **Administrators** - Manage API Management service instances and create the APIs, operations, and products that are used by developers.
163-
164-
Azure subscription administrators are members of this group.
160+
Groups are used to manage the visibility of products to developers. API Management has the following built-in groups for developers:
165161

166162
* **Developers** - Authenticated developer portal users that build applications using your APIs. Developers are granted access to the developer portal and build applications that call the operations of an API.
167163

168164
* **Guests** - Unauthenticated developer portal users, such as prospective customers visiting the developer portal. They can be granted certain read-only access, such as the ability to view APIs but not call them.
169165

170-
Administrators can also create custom groups or use external groups in an [associated Microsoft Entra tenant](api-management-howto-aad.md) to give developers visibility and access to API products. For example, create a custom group for developers in a partner organization to access a specific subset of APIs in a product. A user can belong to more than one group.
166+
API Management service owners can also create custom groups or use external groups in an [associated Microsoft Entra tenant](api-management-howto-aad.md) to give developers visibility and access to API products. For example, create a custom group for developers in a partner organization to access a specific subset of APIs in a product. A user can belong to more than one group.
171167

172168
**More information**:
173169
* [How to create and use groups][How to create and use groups]
170+
* [How to manage user accounts](api-management-howto-create-or-invite-developers.md)
174171

175172
### Developers
176173

@@ -184,7 +181,7 @@ When developers subscribe to a product, they're granted the primary and secondar
184181

185182
### Workspaces
186183

187-
Workspaces allow decentralized API development teams to manage and productize their own APIs, while a central API platform team maintains the API Management infrastructure. Each workspace contains APIs, products, subscriptions, and related entities that are accessible only to the workspace collaborators. Access is controlled through Azure role-based access control (RBAC).
184+
Workspaces allow decentralized API development teams to manage and productize their own APIs, while a central API platform team maintains the API Management infrastructure. Each workspace contains APIs, products, subscriptions, and related entities that are accessible only to the workspace collaborators. Access is controlled through Azure role-based access control (RBAC). Each workspace is associated with a workspace gateway that routes API traffic to its backend services.
188185

189186
**More information**:
190187

articles/api-management/get-started-create-service-instance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Sign in to the [Azure portal](https://portal.azure.com).
4545
| **Region** | Select a geographic region near you from the available API Management service locations. |
4646
| **Resource name** | A unique name for your API Management instance. The name can't be changed later. The service name refers to both the service and the corresponding Azure resource. <br/><br/> The service name is used to generate a default domain name: *\<name\>.azure-api.net.* If you would like to configure a custom domain name later, see [Configure a custom domain](configure-custom-domain.md). |
4747
| **Organization name** | The name of your organization. This name is used in many places, including the title of the developer portal and sender of notification emails. |
48-
| **Administrator email** | The email address to which all the notifications from **API Management** will be sent. |
48+
| **Administrator email** | The email address to which all system notifications from **API Management** will be sent. |
4949
| **Pricing tier** | Select **Developer** tier to evaluate the service. This tier isn't for production use. For more information about scaling the API Management tiers, see [upgrade and scale](upgrade-and-scale.md). |
5050

5151
1. Select **Review + create**.

articles/app-service/tutorial-dotnetcore-sqldb-app.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,7 @@ In this tutorial, you learn how to:
5454
You can quickly deploy the sample app in this tutorial and see it running in Azure. Just run the following commands in the [Azure Cloud Shell](https://shell.azure.com), and follow the prompt:
5555

5656
```bash
57+
dotnet tool install --global dotnet-ef
5758
mkdir msdocs-app-service-sqldb-dotnetcore
5859
cd msdocs-app-service-sqldb-dotnetcore
5960
azd init --template msdocs-app-service-sqldb-dotnetcore
@@ -80,7 +81,7 @@ First, you set up a sample data-driven app as a starting point. For your conveni
8081
:::column span="2":::
8182
**Step 2:** In the GitHub fork:
8283
1. Select **main** > **starter-no-infra** for the starter branch. This branch contains just the sample project and no Azure-related files or configuration.
83-
1. Select **Code** > **Create codespace on main**.
84+
1. Select **Code** > **Create codespace on starter-no-infra**.
8485
The codespace takes a few minutes to set up.
8586
:::column-end:::
8687
:::column:::
@@ -141,9 +142,9 @@ Sign in to the [Azure portal](https://portal.azure.com/) and follow these steps
141142
1. *Region*: Any Azure region near you.
142143
1. *Name*: **msdocs-core-sql-XYZ** where *XYZ* is any three random characters. This name must be unique across Azure.
143144
1. *Runtime stack*: **.NET 8 (LTS)**.
145+
1. *Engine*: **SQLAzure**. Azure SQL Database is a fully managed platform as a service (PaaS) database engine that's always running on the latest stable version of the SQL Server.
144146
1. *Add Azure Cache for Redis?*: **Yes**.
145147
1. *Hosting plan*: **Basic**. When you're ready, you can [scale up](manage-scale-up.md) to a production pricing tier later.
146-
1. Select **SQLAzure** as the database engine. Azure SQL Database is a fully managed platform as a service (PaaS) database engine that's always running on the latest stable version of the SQL Server.
147148
1. Select **Review + create**.
148149
1. After validation completes, select **Create**.
149150
:::column-end:::
@@ -276,7 +277,7 @@ The creation wizard generated the connectivity string for you already as [.NET c
276277
:::row-end:::
277278
:::row:::
278279
:::column span="2":::
279-
**Step 8:** To verify that you secured the secrets:
280+
**Step 8:** To verify that your changes:
280281
1. From the left menu, select **Environment variables > Connection strings** again.
281282
1. Next to **AZURE_SQL_CONNECTIONSTRING**, select **Show value**. The value should be `@Microsoft.KeyValut(...)`, which means that it's a [key vault reference](app-service-key-vault-references.md) because the secret is now managed in the key vault.
282283
1. To verify the Redis connection string, select the **App setting** tab. Next to **AZURE_REDIS_CONNECTIONSTRING**, select **Show value**. The value should be `@Microsoft.KeyValut(...)` too.
@@ -389,7 +390,7 @@ In this step, you configure GitHub deployment using GitHub Actions. It's just on
389390
:::column span="2":::
390391
**Step 7:**
391392
Back in the Deployment Center page in the Azure portal:
392-
1. Select **Logs**. A new deployment run is already started from your committed changes. You might need to select **Refresh** to see it.
393+
1. Select the **Logs** tab, then select **Refresh** to see the new deployment run.
393394
1. In the log item for the deployment run, select the **Build/Deploy Logs** entry with the latest timestamp.
394395
:::column-end:::
395396
:::column:::

articles/automation/shared-resources/modules.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,17 @@ title: Manage modules in Azure Automation
33
description: This article tells how to use PowerShell modules to enable cmdlets in runbooks and DSC resources in DSC configurations.
44
services: automation
55
ms.subservice: shared-capabilities
6-
ms.date: 08/09/2024
6+
ms.date: 09/08/2024
77
ms.topic: conceptual
88
ms.custom: devx-track-azurepowershell, devx-track-python
99
ms.service: azure-automation
1010
---
1111

1212
# Manage modules in Azure Automation
1313

14+
>[!NOTE]
15+
> The AzureRM PowerShell module has been officially deprecated as of **February 29, 2024**. We recommend that you migrate from AzureRM module to the Az PowerShell module to ensure continued support and updates. While the AzureRM module may still work, it is no longer maintained or supported and continued use of AzureRM is at the user's own risk. For more information, see [migration resources](https://aka.ms/azpsmigrate) for guidance on transitioning to the Az module.
16+
1417
Azure Automation uses a number of PowerShell modules to enable cmdlets in runbooks and DSC resources in DSC configurations. Supported modules include:
1518

1619
* [Azure PowerShell Az.Automation](/powershell/azure/new-azureps-module-az).

0 commit comments

Comments
 (0)