Skip to content

Commit fa08343

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into fwtoc
2 parents 3c9b83c + 7d472d1 commit fa08343

File tree

232 files changed

+1831
-5600
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

232 files changed

+1831
-5600
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,11 @@
3030
"redirect_url": "/previous-versions/azure/partner-solutions/logzio/troubleshoot",
3131
"redirect_document_id": false
3232
},
33+
{
34+
"source_path": "articles/event-grid/event-schema-storage-actions.md",
35+
"redirect_url": "/azure/storage-actions/overview",
36+
"redirect_document_id": false
37+
},
3338
{
3439
"source_path_from_root": "/articles/hdinsight-aks/index.yml",
3540
"redirect_url": "/previous-versions/azure/hdinsight-aks",
@@ -5935,6 +5940,11 @@
59355940
"redirect_url": "/azure/reliability/overview-reliability-guidance",
59365941
"redirect_document_id": false
59375942
},
5943+
{
5944+
"source_path_from_root": "/articles/reliability/sovereign-cloud-china.md",
5945+
"redirect_url": "/azure/china/concepts-service-availability",
5946+
"redirect_document_id": false
5947+
},
59385948
{
59395949
"source_path_from_root": "/articles/managed-grafana/concept-role-based-access-control.md",
59405950
"redirect_url": "/azure/managed-grafana/how-to-manage-access-permissions-users-identities",

articles/active-directory-b2c/faq.yml

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,6 +163,18 @@ sections:
163163
* **Audit reports** include both admin activity and application activity.
164164
* **Usage reports** include the number of users, number of logins, and volume of MFA.
165165
166+
- question: |
167+
Why does my Azure AD B2C bill show phone charges named "Microsoft Entra External ID?"
168+
answer: |
169+
Following the new [billing model](https://azure.microsoft.com/pricing/details/active-directory-b2c/) for Azure AD External Identities SMS Phone Authentication, you may notice a new name on your bill. Previously, Phone MFA was billed as "Azure Active Directory B2C - Basic 1 Multi-Factor Authentication." Now you’ll see the following names based on your [country or region pricing tier](https://aka.ms/B2CSMSCountries):
170+
171+
* Microsoft Entra External ID - Phone Authentication Low Cost 1 Transaction
172+
* Microsoft Entra External ID - Phone Authentication Mid Low Cost 1 Transaction
173+
* Microsoft Entra External ID - Phone Authentication Mid High Cost 1 Transaction
174+
* Microsoft Entra External ID - Phone Authentication High Cost 1 Transaction
175+
176+
Although the new bill mentions Microsoft Entra External ID, **you’re still billed for Azure AD B2C based on your core MAU count**.
177+
166178
- question: |
167179
Can end users use a time-based one-time password (TOTP) with an authenticator app to authenticate to my Azure AD B2C app?
168180
answer: |
@@ -271,7 +283,7 @@ sections:
271283
- question: |
272284
I am using rolling refresh tokens for my application and I am getting an invalid_grant error on redeeming newly acquired refresh tokens well within their set validity period. Why does this happen?
273285
answer: |
274-
While determining validity for rolling refresh tokens, B2C will consider the initial login time of the user in the application also to calculate the token validity skew. If the user haven't logged out of the application for a very long time, this skew value will exceed the validity period of the token and hence for security reasons the tokens will be considered as invalid. Hence the error. Inform the user to perform a proper logout and login back into the application and this should reset the skew. This scenario is not applicable if refresh token rolling is set as infinite rolling.
286+
While determining validity for rolling refresh tokens, B2C will consider the initial login time of the user in the application also to calculate the token validity skew. If the user hasn't logged out of the application for a very long time, this skew value will exceed the validity period of the token and hence for security reasons the tokens will be considered as invalid. Hence the error. Inform the user to perform a proper logout and login back into the application and this should reset the skew. This scenario is not applicable if refresh token rolling is set as infinite rolling.
275287
276288
277289
- question: |

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -496,18 +496,18 @@ The following IDs are used for a [time-based one-time password (TOTP) display co
496496
</LocalizedResources>
497497
```
498498

499-
## Restful service error messages
499+
## RESTful service error messages
500500

501-
The following IDs are used for [Restful service technical profile](restful-technical-profile.md) error messages:
501+
The following IDs are used for [RESTful service technical profile](restful-technical-profile.md) error messages:
502502

503503
| ID | Default value |
504504
| --- | ------------- |
505-
| `DefaultUserMessageIfRequestFailed` | Failed to establish connection to restful service end point. Restful service URL: {0} |
506-
| `UserMessageIfCircuitOpen` | {0} Restful Service URL: {1} |
507-
| `UserMessageIfDnsResolutionFailed` | Failed to resolve the hostname of the restful service endpoint. Restful service URL: {0} |
508-
| `UserMessageIfRequestTimeout` | Failed to establish connection to restful service end point within timeout limit {0} seconds. Restful service URL: {1} |
505+
| `DefaultUserMessageIfRequestFailed` | Failed to establish connection to restful service end point. RESTful service URL: {0} |
506+
| `UserMessageIfCircuitOpen` | {0} RESTful Service URL: {1} |
507+
| `UserMessageIfDnsResolutionFailed` | Failed to resolve the hostname of the restful service endpoint. RESTful service URL: {0} |
508+
| `UserMessageIfRequestTimeout` | Failed to establish connection to restful service end point within timeout limit {0} seconds. RESTful service URL: {1} |
509509

510-
### Restful service example
510+
### RESTful service example
511511

512512
```xml
513513
<LocalizedResources Id="api.localaccountsignup.en">

articles/api-management/breaking-changes/stv1-platform-retirement-august-2024.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: api-management
55
author: dlepow
66
ms.service: azure-api-management
77
ms.topic: reference
8-
ms.date: 08/28/2024
8+
ms.date: 02/19/2025
99
ms.author: danlep
1010
---
1111

@@ -54,9 +54,8 @@ As of 1 September 2024, API Management will no longer provide any service level
5454

5555
Through continued use of an instance hosted on the `stv1` platform beyond the retirement date, you acknowledge that Azure does not commit to the SLA of 99.95% for the retired instances.
5656

57-
### Automatic migration
57+
[!INCLUDE [api-management-automatic-migration](../../../includes/api-management-automatic-migration.md)]
5858

59-
Starting 1 September 2024, we'll automatically migrate remaining `stv1` service instances to the `stv2` compute platform. All affected customers will be notified of the upcoming automatic migration a week in advance. Automatic migration might cause downtime for your upstream API consumers. You may still migrate your own instances before automatic migration takes place.
6059

6160
[!INCLUDE [api-management-migration-support](../../../includes/api-management-migration-support.md)]
6261

articles/api-management/breaking-changes/stv1-platform-retirement-sovereign-clouds-february-2025.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,7 @@ As of 1 September 2024, API Management will no longer provide any service level
5252

5353
Through continued use of an instance hosted on the `stv1` platform beyond 1 September 2024, you acknowledge that Azure does not commit to the SLA of 99.95%.
5454

55+
[!INCLUDE [api-management-automatic-migration](../../../includes/api-management-automatic-migration.md)]
5556

5657
[!INCLUDE [api-management-migration-support](../../../includes/api-management-migration-support.md)]
5758

articles/api-management/graphql-apis-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ API Management helps you import, manage, protect, test, publish, and monitor Gra
2121

2222
|Pass-through GraphQL |Synthetic GraphQL |
2323
|---------|---------|
24-
| ▪️ Pass-through API to existing GraphQL service endpoint<br><br/>▪️ Support for GraphQL queries, mutations, and subscriptions | ▪️ API based on a custom GraphQL schema<br></br>▪️ Support for GraphQL queries, mutations, and subscriptions<br/><br/>▪️ Configure custom resolvers, for example, to HTTP data sources<br/><br/>▪️ Develop GraphQL schemas and GraphQL-based clients while consuming data from legacy APIs |
24+
| ▪️ Pass-through API to existing GraphQL service endpoint<br><br/>▪️ Support for GraphQL queries, mutations, and subscriptions | ▪️ API based on a custom GraphQL schema<br></br>▪️ Support for GraphQL queries, mutations, and subscriptions<br/><br/>▪️ Configure custom resolvers, for example, to HTTP data sources<br/><br/>▪️ Develop GraphQL schemas and GraphQL-based clients while consuming data from legacy APIs<br/><br/>▪️ Synthetic subscriptions do not require resolvers. See [publish-event](publish-event-policy.md) policy. |
2525

2626
## Availability
2727

8.46 KB
Loading

articles/api-management/migrate-stv1-to-stv2-vnet.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66
ms.service: azure-api-management
77
ms.custom:
88
ms.topic: how-to
9-
ms.date: 11/04/2024
9+
ms.date: 02/19/2025
1010
ms.author: danlep
1111
---
1212

@@ -241,6 +241,9 @@ Under certain conditions, [Option 1: Migrate and keep same subnet](#option-1-mig
241241

242242
* **Azure Key Vault blocked** - If access to Azure Key Vault is currently blocked, you must migrate using Option 2, including setting up NSG rules in the new subnet for access to Azure Key Vault.
243243

244+
[!INCLUDE [api-management-automatic-migration](../../includes/api-management-automatic-migration.md)]
245+
246+
244247
[!INCLUDE [api-management-migration-support](../../includes/api-management-migration-support.md)]
245248

246249
## Frequently asked questions

articles/api-management/publish-event-policy.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,7 @@ The `publish-event` policy publishes an event to one or more subscriptions speci
5353
### Usage notes
5454

5555
* This policy is invoked only when a related GraphQL query or mutation is executed.
56+
* Resolver *should not* be defined for the corresponding subscription. Defining a `publish-event` policy on a source query or mutation is sufficient to trigger subscription events.
5657

5758
## Example
5859

articles/api-management/virtual-network-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ NSG rules allowing outbound connectivity to Storage, SQL, and Azure Event Hubs s
8787

8888
## TLS functionality
8989

90-
To enable TLS/SSL certificate chain building and validation, the API Management service needs outbound network connectivity on ports `80` and `443` to `ocsp.msocsp.com`, `oneocsp.msocsp.com`, `mscrl.microsoft.com`, `crl.microsoft.com`, and `csp.digicert.com`. This dependency is not required if any certificate you upload to API Management contains the full chain to the CA root.
90+
To enable TLS/SSL certificate chain building and validation, the API Management service needs outbound network connectivity on ports `80` and `443` to `ocsp.msocsp.com`, `oneocsp.msocsp.com`, `mscrl.microsoft.com`, `crl.microsoft.com`, `cacerts.digicert.com`, `crl3.digicert.com` and `csp.digicert.com`.
9191

9292

9393
## DNS access

0 commit comments

Comments
 (0)