Skip to content

Commit fb59694

Browse files
authored
Merge pull request #268475 from MicrosoftDocs/main
3/8 11:00 AM IST Publish
2 parents ae67531 + 5b81feb commit fb59694

22 files changed

+673
-2055
lines changed

.openpublishing.redirection.app-service.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2659,6 +2659,21 @@
26592659
"source_path": "articles/app-service/quickstart-dotnet-framework.md",
26602660
"redirect_url": "/azure/app-service/quickstart-dotnetcore?tabs=netframework48",
26612661
"redirect_document_id": false
2662+
},
2663+
{
2664+
"source_path": "articles/app-service/quickstart-arm-template-uiex.md",
2665+
"redirect_url": "/azure/app-service/quickstart-arm-template",
2666+
"redirect_document_id": true
2667+
},
2668+
{
2669+
"source_path": "articles/app-service/quickstart-dotnetcore-uiex.md",
2670+
"redirect_url": "/azure/app-service/quickstart-dotnetcore",
2671+
"redirect_document_id": true
2672+
},
2673+
{
2674+
"source_path": "articles/app-service/quickstart-java-uiex.md",
2675+
"redirect_url": "/azure/app-service/quickstart-java",
2676+
"redirect_document_id": true
26622677
}
26632678
]
26642679
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6750,6 +6750,11 @@
67506750
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
67516751
"redirect_document_id": false
67526752
},
6753+
{
6754+
"source_path_from_root": "/articles/search/cognitive-search-tutorial-blob-python.md",
6755+
"redirect_url": "/azure/search/samples-python",
6756+
"redirect_document_id": false
6757+
},
67536758
{
67546759
"source_path_from_root": "/articles/search/semantic-ranking.md",
67556760
"redirect_url": "/azure/search/semantic-search-overview",

articles/aks/use-managed-identity.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: article
55
ms.custom:
66
- devx-track-azurecli
77
- ignite-2023
8-
ms.date: 02/27/2024
8+
ms.date: 03/07/2024
99
---
1010

1111
# Use a managed identity in Azure Kubernetes Service (AKS)
@@ -24,12 +24,12 @@ When you deploy an AKS cluster, a system-assigned managed identity is automatica
2424

2525
AKS doesn't automatically create a [service principal](kubernetes-service-principal.md), so you have to create one. Clusters that use a service principal eventually expire, and the service principal must be renewed to avoid impacting cluster authentication with the identity. Managing service principals adds complexity, so it's easier to use managed identities instead. The same permission requirements apply for both service principals and managed identities. Managed identities use certificate-based authentication. Each managed identity's credentials have an expiration of *90 days* and are rolled after *45 days*.
2626

27-
AKS uses both system-assigned and user-assigned managed identity types, and these identities are immutable.
27+
AKS uses both system-assigned and user-assigned managed identity types, and these identities are immutable. These identity types shouldn't be confused with a [Microsoft Entra Workload identity][workload-identity-overview], which is intended for use by an application running on a pod.
2828

2929
> [!IMPORTANT]
3030
> The open source [Microsoft Entra pod-managed identity][entra-id-pod-managed-identity] (preview) in Azure Kubernetes Service was deprecated on 10/24/2022, and the project archived in Sept. 2023. For more information, see the [deprecation notice](https://github.com/Azure/aad-pod-identity#-announcement). The AKS Managed add-on begins deprecation in Sept. 2024.
3131
>
32-
> We recommend you first review [Microsoft Entra Workload ID][workload-identity-overview] overview. This authentication method replaces Microsoft Entra pod-managed identity (preview) and is the recommended method.
32+
> We recommend you first review [Microsoft Entra Workload ID][workload-identity-overview] overview. Entra Workload ID authentication replaces Microsoft Entra pod-managed identity (preview) and is the recommended method to enable an application running on a pod to authenticate itself against other Azure services that support it.
3333
3434
## Before you begin
3535

@@ -67,7 +67,7 @@ AKS uses several managed identities for built-in services and add-ons.
6767
| Add-on | omsagent | Used to send AKS metrics to Azure Monitor. | Monitoring Metrics Publisher role | No
6868
| Add-on | Virtual-Node (ACIConnector) | Manages required network resources for Azure Container Instances (ACI). | Contributor role for node resource group | No
6969
| Add-on | Cost analysis | Used to gather cost allocation data | |
70-
| OSS project | Microsoft Entra ID-pod-identity | Enables applications to access cloud resources securely with Microsoft Entra ID. | N/A | Steps to grant permission at [Microsoft Entra Pod Identity Role Assignment configuration](./use-azure-ad-pod-identity.md).
70+
| Workload identity | Microsoft Entra workload ID | Enables applications to access cloud resources securely with Microsoft Entra workload ID. | N/A | No |
7171

7272
## Enable managed identities on a new AKS cluster
7373

@@ -103,7 +103,7 @@ To update your existing AKS cluster that's using a service principal to use a sy
103103
az aks update -g myResourceGroup -n myManagedCluster --enable-managed-identity
104104
```
105105

106-
After updating your cluster, the control plane and pods use the managed identity. kubelet continues using a service principal until you upgrade your agentpool. You can use the `az aks nodepool upgrade --resource-group myResourceGroup --cluster-name myAKSCluster --name mynodepool --node-image-only` command on your nodes to update to a managed identity. A node pool upgrade causes downtime for your AKS cluster as the nodes in the node pools are cordoned/drained and reimaged.
106+
After updating your cluster, the control plane and pods use the managed identity. Kubelet continues using a service principal until you upgrade your agentpool. You can use the `az aks nodepool upgrade --resource-group myResourceGroup --cluster-name myAKSCluster --name mynodepool --node-image-only` command on your nodes to update to a managed identity. A node pool upgrade causes downtime for your AKS cluster as the nodes in the node pools are cordoned/drained and reimaged.
107107

108108
> [!NOTE]
109109
>

articles/api-management/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -639,6 +639,8 @@
639639
href: breaking-changes/self-hosted-gateway-v0-v1-retirement-oct-2023.md
640640
- name: Deprecated (legacy) developer portal (October 2023)
641641
href: breaking-changes/legacy-portal-retirement-oct-2023.md
642+
- name: Workspaces breaking changes (June 2024)
643+
href: breaking-changes/workspaces-breaking-changes-june-2024.md
642644
- name: stv1 compute platform retirement (August 2024)
643645
href: breaking-changes/stv1-platform-retirement-august-2024.md
644646
- name: ADAL-based identity provider retirement (September 2025)

articles/api-management/breaking-changes/overview.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
title: Upcoming Breaking Changes in Azure API Management | Microsoft Docs
33
description: A list of all the upcoming breaking changes for Azure API Management
44
services: api-management
5-
author: adrianhall
5+
author: dlepow
66

77
ms.service: api-management
88
ms.topic: reference
9-
ms.date: 03/15/2023
10-
ms.author: adhal
9+
ms.date: 01/25/2024
10+
ms.author: danlep
1111
---
1212

1313
# Upcoming breaking changes
@@ -22,6 +22,7 @@ The following table lists all the upcoming breaking changes and feature retireme
2222
| [API version retirements][api2023] | September 30, 2023 |
2323
| [Deprecated (legacy) portal retirement][devportal2023] | October 31, 2023 |
2424
| [Self-hosted gateway v0/v1 retirement][shgwv0v1] | October 1, 2023 |
25+
| [Workspaces breaking changes][workspaces2024] | June 14, 2024 |
2526
| [stv1 platform retirement][stv12024] | August 31, 2024 |
2627
| [ADAL-based Microsoft Entra ID or Azure AD B2C identity provider retirement][msal2025] | September 30, 2025 |
2728
| [CAPTCHA endpoint update][captcha2025] | September 30, 2025 |
@@ -36,3 +37,4 @@ The following table lists all the upcoming breaking changes and feature retireme
3637
[msal2025]: ./identity-provider-adal-retirement-sep-2025.md
3738
[captcha2025]: ./captcha-endpoint-change-sep-2025.md
3839
[metrics2023]: ./metrics-retirement-aug-2023.md
40+
[workspaces2024]: ./workspaces-breaking-changes-june-2024.md
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
---
2+
title: Azure API Management workspaces - breaking changes (June 2024) | Microsoft Docs
3+
description: Azure API Management is updating the workspaces (preview) with breaking changes. If your service uses workspaces, you may need to update workspace configurations.
4+
services: api-management
5+
author: dlepow
6+
ms.service: api-management
7+
ms.topic: reference
8+
ms.date: 03/07/2024
9+
ms.author: danlep
10+
---
11+
12+
# Workspaces - breaking changes (June 2024)
13+
14+
On 14 June 2024, as part of our development of [workspaces](../workspaces-overview.md) (preview) in Azure API Management, we're introducing several breaking changes.
15+
16+
These changes will have no effect on the availability of your API Management service. However, you may have to take action to continue using full workspaces functionality beyond 14 June 2024.
17+
18+
## Is my service affected by these changes?
19+
20+
Your service may be affected by these changes if you configured workspaces (preview) in your API Management instance. This feature was introduced in the **Premium**, **Standard**, and **Developer** tiers.
21+
22+
## Breaking changes
23+
24+
Review the following breaking changes to determine if you need to take action:
25+
26+
### Change to supported service tiers
27+
28+
The following service tiers will no longer support workspaces: **Standard** and **Developer**. Workspaces will be available in the **Premium** tier.
29+
30+
For availability in the v2 tiers, see [Azure API Management v2 tiers](../v2-service-tiers-overview.md).
31+
32+
### Changes to support for assigning service-level entities in workspaces
33+
34+
The following assignments of workspace entities to service-level entities will no longer be supported:
35+
36+
* Assign workspace APIs to service-level products
37+
* Assign workspace APIs to service-level tags
38+
* Assign workspace products to service-level tags
39+
* Assign service-level groups to workspace products for visibility controls
40+
41+
> [!NOTE]
42+
> The built-in Guests and Developer groups will continue to be available in workspaces.
43+
44+
### Changes to supported context objects
45+
46+
The following `context` objects will no longer be supported in workspace policies or in the all-APIs policy on the service level:
47+
48+
* `context.Api.Workspace`
49+
* `context.Product.Workspace`
50+
51+
The `context.Workspace` object can be used instead.
52+
53+
54+
> [!NOTE]
55+
> You can continue to reference users from the service level in the `context` object in workspace-level policies.
56+
57+
## What is the deadline for the change?
58+
59+
The breaking changes are effective 14 June 2024. We strongly recommend that you make all required changes to the configuration of workspaces before then.
60+
61+
## Help and support
62+
63+
If you have questions, get answers from community experts in [Microsoft Q&A](https://aka.ms/apim/azureqa/change/captcha-2022). If you have a support plan and you need technical help, create a [support request](https://portal.azure.com/#view/Microsoft_Azure_Support/HelpAndSupportBlade/~/overview).
64+
65+
## More information
66+
67+
* [Workspaces overview](../workspaces-overview.md)
68+
69+
## Related content
70+
71+
See all [upcoming breaking changes and feature retirements](overview.md).

articles/api-management/v2-service-tiers-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: api-management
88
ms.topic: conceptual
9-
ms.date: 10/02/2023
9+
ms.date: 01/31/2024
1010
ms.author: danlep
1111
ms.custom: references_regions
1212
---
@@ -85,7 +85,7 @@ Currently, the following API Management capabilities are unavailable in the v2 t
8585
* Built-in analytics
8686
* Inbound connection using a private endpoint
8787
* Upgrade to v2 tiers from v1 tiers
88-
* Workspaces
88+
* Workspaces (*Standard v2*)
8989

9090
**Developer portal**
9191
* Delegation of user registration and product subscription

articles/api-management/workspaces-overview.md

Lines changed: 13 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: api-management
88
ms.topic: conceptual
9-
ms.date: 03/10/2023
9+
ms.date: 01/25/2024
1010
ms.author: danlep
1111
ms.custom:
1212
---
@@ -15,14 +15,14 @@ ms.custom:
1515

1616
In API Management, *workspaces* allow decentralized API development teams to manage and productize their own APIs, while a central API platform team maintains the API Management infrastructure. Each workspace contains APIs, products, subscriptions, and related entities that are accessible only to the workspace collaborators. Access is controlled through Azure role-based access control (RBAC).
1717

18-
[!INCLUDE [api-management-availability-premium-dev-standard](../../includes/api-management-availability-premium-dev-standard.md)]
18+
[!INCLUDE [api-management-availability-premium](../../includes/api-management-availability-premium.md)]
1919

2020

2121
> [!NOTE]
2222
> * Workspaces are a preview feature of API Management and subject to certain [limitations](#preview-limitations).
2323
> * Workspaces are supported in API Management REST API version 2022-09-01-preview or later.
2424
> * For pricing considerations, see [API Management pricing](https://azure.microsoft.com/pricing/details/api-management/).
25-
25+
> * See [upcoming breaking changes](./breaking-changes/workspaces-breaking-changes-june-2024.md) for workspaces.
2626
2727
## Example scenario overview
2828

@@ -48,9 +48,7 @@ The following resources can be managed in the workspaces preview.
4848

4949
* Apply a policy for all APIs in a workspace.
5050

51-
* Use `context.Api.Workspace` and `context.Product.Workspace` objects in workspace-scoped policies and in the all-APIs policy on the service level.
52-
53-
* Describe APIs with tags from the workspace level or from the service level.
51+
* Describe APIs with tags from the workspace level.
5452

5553
* Define named values, policy fragments, and schemas for request and response validation for use in workspace-scoped policies.
5654

@@ -64,11 +62,7 @@ The following resources can be managed in the workspaces preview.
6462

6563
### Products and subscriptions
6664

67-
* Publish APIs with products. APIs in a workspace can be part of a service-level product or a workspace-level product.
68-
69-
* Workspace-level product - Visibility can be configured based on user membership in a workspace-level or a service-level group.
70-
71-
* Service-level product - Visibility can be configured only for service-level groups.
65+
* Publish APIs with products. APIs in a workspace can only be part of a workspace-level product. Visibility can be configured based on user membership in a workspace-level or a service-level group.
7266

7367
* Manage access to APIs with subscriptions. Subscriptions requested to an API or product within a workspace are created in that workspace.
7468

@@ -80,7 +74,7 @@ The following resources can be managed in the workspaces preview.
8074

8175
Azure RBAC is used to configure workspace collaborators' permissions to read and edit entities in the workspace. For a list of roles, see [How to use role-based access control in API Management](api-management-role-based-access-control.md).
8276

83-
Workspace members must be assigned both a service-scoped role and a workspace-scoped role, or granted equivalent permissions using custom roles. The service-scoped role enables referencing service-level resources from workspace-level resources. For example, publish an API from a workspace with a service-level product, assign a service-level tag to an API, or organize a user into a workspace-level group to control API and product visibility.
77+
Workspace members must be assigned both a service-scoped role and a workspace-scoped role, or granted equivalent permissions using custom roles. The service-scoped role enables referencing certain service-level resources from workspace-level resources. For example, organize a user into a workspace-level group to control API and product visibility.
8478

8579
> [!NOTE]
8680
> For easier management, set up Microsoft Entra groups to assign workspace permissions to multiple users.
@@ -95,7 +89,7 @@ Workspace members must be assigned both a service-scoped role and a workspace-sc
9589
* API gateways, including scaling, locations, and self-hosted gateways
9690

9791

98-
* **Resource references** - Resources in a workspace can reference other resources in the workspace and the following resources from the service level: products, tags, and users. They can't reference resources from another workspace.
92+
* **Resource references** - Resources in a workspace can reference other resources in the workspace and users from the service level. They can't reference resources from another workspace.
9993

10094
For security reasons, it's not possible to reference service-level resources from workspace-level policies (for example, named values) or by resource names, such as `backend-id` in the [set-backend-service](set-backend-service-policy.md) policy.
10195

@@ -137,10 +131,13 @@ Therefore, the following sample scenarios aren't currently supported in workspac
137131

138132
* Specifying API authorization server information (for example, for the developer portal)
139133

140-
Workspace APIs can't be published to self-hosted gateways.
134+
* Publishing workspace APIs to self-hosted gateways
141135

142-
All resources in an API Management service need to have unique names, even if they are located in different workspaces.
136+
> [!IMPORTANT]
137+
> All resources in an API Management service need to have unique names, even if they are located in different workspaces.
138+
>
143139
144-
## Next steps
140+
## Related content
145141

146142
* [Create a workspace](how-to-create-workspace.md)
143+
* [Workspaces breaking changes - June 2024](breaking-changes/workspaces-breaking-changes-june-2024.md)

0 commit comments

Comments
 (0)