Skip to content

Commit da5fabf

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into network-content-improvement
2 parents 8d92dd0 + 6a53236 commit da5fabf

File tree

1,490 files changed

+12334
-9406
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,490 files changed

+12334
-9406
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@
7070
},
7171
{
7272
"path_to_root": "azure_cli_scripts",
73-
"url": "https://github.com/Azure-Samples/azure-cli-samples",
73+
"url": "https://github.com/ggailey777/azure-cli-samples",
7474
"branch": "master",
7575
"branch_mapping": {}
7676
},

.openpublishing.redirection.json

Lines changed: 15 additions & 335 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/partner-trusona.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ In this scenario, Trusona acts as an Identity Provider (IdP) for Azure AD B2C to
7575

7676
## Step 1: Onboard with Trusona Authentication Cloud
7777

78-
1. Sign in to the [Trusona Portal](https://portal.trusona.io).
78+
1. Sign in to the [Trusona Portal](https://portal.trusona.com/).
7979
2. From the left navigation panel, select **Settings**
8080
3. In the Settings menu, select the slider to **Enable OIDC**.
8181
4. Select the appropriate **Inputs** and provide the **Redirect URL** `https://{your-tenant-name}.b2clogin.com/{your-tenant-name}.onmicrosoft.com/oauth2/authresp`.

articles/api-management/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -246,14 +246,14 @@
246246
href: openai-compatible-llm-api.md
247247
- name: Import Google Gemini API
248248
href: openai-compatible-google-gemini-api.md
249+
- name: Import Amazon Bedrock API
250+
href: amazon-bedrock-passthrough-llm-api.md
249251
- name: Expose REST API as MCP server
250252
href: export-rest-mcp-server.md
251253
- name: Semantic caching for Azure OpenAI API requests
252254
href: azure-openai-enable-semantic-caching.md
253255
- name: Authenticate and authorize to Azure OpenAI
254256
href: api-management-authenticate-authorize-azure-openai.md
255-
- name: Protect Azure OpenAI keys
256-
href: /semantic-kernel/deploy/use-ai-apis-with-api-management?toc=%2Fazure%2Fapi-management%2Ftoc.json&bc=/azure/api-management/breadcrumb/toc.json
257257
- name: Manage APIs with policies
258258
items:
259259
- name: API Management policies overview

articles/api-management/amazon-bedrock-passthrough-llm-api.md

Lines changed: 395 additions & 0 deletions
Large diffs are not rendered by default.

articles/api-management/api-management-authenticate-authorize-azure-openai.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,4 +165,3 @@ Following are high level steps to restrict API access to users or apps that are
165165

166166
* Learn more about [Microsoft Entra ID and OAuth2.0](../active-directory/develop/authentication-vs-authorization.md).
167167
* [Authenticate requests to Azure AI services](/azure/ai-services/authentication)
168-
* [Protect Azure OpenAI keys with API Management](/semantic-kernel/deploy/use-ai-apis-with-api-management?toc=%2Fazure%2Fapi-management%2Ftoc.json&bc=/azure/api-management/breadcrumb/toc.json)

articles/api-management/api-management-howto-use-azure-monitor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.custom:
1010
- devdivchpfy22
1111
- build-2025
1212
ms.topic: tutorial
13-
ms.date: 05/14/2025
13+
ms.date: 07/09/2025
1414
ms.author: danlep
1515
---
1616
# Tutorial: Monitor published APIs

articles/api-management/applications.md

Lines changed: 29 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: azure-api-management
99
ms.topic: how-to
10-
ms.date: 05/19/2025
10+
ms.date: 07/11/2025
1111
ms.author: danlep
1212
ms.custom:
1313
- build-2025
@@ -22,9 +22,9 @@ API Management now supports built-in OAuth 2.0 application-based access to produ
2222
> Applications are currently in limited preview. To sign up, fill [this form](https://aka.ms/apimappspreview).
2323
2424
With this feature:
25-
2625
* API managers set a product property to enable application-based access.
2726
* API managers register client applications in Microsoft Entra ID to limit access to specific products.
27+
* Developers can access client application credentials using the API Management developer portal.
2828
* Using the OAuth 2.0 client credentials flow, developers or apps obtain tokens that they can include in API requests
2929
* Tokens presented in API requests are validated by the API Management gateway to authorize access to the product's APIs.
3030

@@ -61,7 +61,8 @@ Follow these steps to enable **Application based access** for a product. A produ
6161

6262
The following example uses the **Starter** product, but choose any published product that has at least one API assigned to it.
6363

64-
1. Sign in to the [portal](https://portal.azure.com) and navigate to your API Management instance.
64+
1. Sign in to the portal at the following custom URL for the applications feature: [https://portal.azure.com/?feature.customPortal=false&Microsoft_Azure_ApiManagement=applications](https://portal.azure.com/?feature.customPortal=false&Microsoft_Azure_ApiManagement=applications)
65+
1. Navigate to your API Management instance.
6566
1. In the left menu, under **APIs**, select **Products**.
6667
1. Choose the product that you want to configure, such as the **Starter** product.
6768
1. In the left menu, under **Product**, select **Properties**.
@@ -103,10 +104,13 @@ To review application settings in **App registrations**:
103104
Now register a client application that limits access to one or more products.
104105

105106
* A product must have **Application based access** enabled to be associated with a client application.
106-
* Each client application has a single user (owner) in the API Management instance. One the owner can access product APIs through the application.
107+
* Each client application has a single user (owner) in the API Management instance. Only the owner can access product APIs through the application.
107108
* A product can be associated with more than one client application.
108109

109-
1. Sign in to the [portal](https://portal.azure.com) and navigate to your API Management instance.
110+
To register a client application:
111+
112+
1. Sign in to the portal at the following custom URL for the applications feature: [https://portal.azure.com/?feature.customPortal=false&Microsoft_Azure_ApiManagement=applications](https://portal.azure.com/?feature.customPortal=false&Microsoft_Azure_ApiManagement=applications)
113+
1. Navigate to your API Management instance.
110114
1. In the left menu, under **APIs**, select **Applications** > **+ Register application**.
111115
1. In the **Register an application** page, enter the following application settings:
112116
* **Name**: Enter a name for the application.
@@ -152,6 +156,16 @@ To review application settings in **App registrations**:
152156

153157
:::image type="content" source="media/applications/client-api-permissions.png" alt-text="Screenshot of API permissions in the portal.":::
154158

159+
## Get application settings in developer portal
160+
161+
Users can sign in to the developer portal to view the client applications that they own.
162+
163+
1. Sign in to the developer portal (`https://<your-apim-instance-name>.developer.azure-api.net`) using a user account that was set as the owner of a client application.
164+
1. In the top navigation menu, select **Applications**.
165+
1. Applications that the user owns appear in the list.
166+
1. Select an application to view its details, such as the **Client ID**, **Client secret**, and **Scope**. These values are needed to generate a token to call the product APIs.
167+
168+
:::image type="content" source="media/applications/applications-developer-portal.png" alt-text="Screenshot of client applications in the developer portal.":::
155169

156170
## Create token and use with API call
157171

@@ -204,6 +218,16 @@ Write-Host "Response:"
204218
$getresponse | ConvertTo-Json -Depth 5
205219
```
206220

221+
## Troubleshooting
222+
223+
### Internal server error when registering applications in the portal
224+
225+
If you're unable to list applications, or you receive an internal server error when registering applications in the portal, check the following:
226+
227+
* The **Application Administrator** role is assigned to the API Management instance's managed identity in Microsoft Entra ID.
228+
* You're signed in to the portal at the following custom URL for the applications feature: [https://portal.azure.com/?feature.customPortal=false&Microsoft_Azure_ApiManagement=applications](https://portal.azure.com/?feature.customPortal=false&Microsoft_Azure_ApiManagement=applications). This URL is required to access the applications feature in API Management.
229+
230+
207231
## Related content
208232

209233
* [Create and publish a product](api-management-howto-add-products.md)

articles/api-management/inject-vnet-v2.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,8 @@ If you want to enable *public* inbound access to an API Management instance in t
5454
* Minimum: /27 (32 addresses)
5555
* Recommended: /24 (256 addresses) - to accommodate scaling of API Management instance
5656

57+
### Network security group
58+
5759
[!INCLUDE [api-management-virtual-network-v2-nsg-rules](../../includes/api-management-virtual-network-v2-nsg-rules.md)]
5860

5961
### Subnet delegation

articles/api-management/integrate-vnet-outbound.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,14 @@ If you want to inject a Premium v2 (preview) API Management instance into a virt
4646
* Minimum: /27 (32 addresses)
4747
* Recommended: /24 (256 addresses) - to accommodate scaling of API Management instance
4848

49+
### Network security group
50+
4951
[!INCLUDE [api-management-virtual-network-v2-nsg-rules](../../includes/api-management-virtual-network-v2-nsg-rules.md)]
5052

53+
> [!IMPORTANT]
54+
> * Inbound NSG rules do not apply when a v2 tier instance is integrated in a virtual network for private outbound access. To enforce inbound NSG rules, use virtual network injection instead of integration.
55+
> * This differs from networking in the classic Premium tier, where inbound NSG rules are enforced in both external and internal virtual network injection modes. [Learn more](virtual-network-injection-resources.md)
56+
5157
### Subnet delegation
5258

5359
The subnet needs to be delegated to the **Microsoft.Web/serverFarms** service.

0 commit comments

Comments
 (0)