Skip to content

Commit 001bc19

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into credmgr
2 parents 3a86472 + afe1ade commit 001bc19

506 files changed

Lines changed: 5674 additions & 35721 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 200 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6355,10 +6355,210 @@
63556355
"redirect_url": "/azure/storage/container-storage/install-container-storage-aks",
63566356
"redirect_document_id": true
63576357
},
6358+
{
6359+
"source_path": "articles/reliability/reliability-cosmos-mongodb.md",
6360+
"redirect_url": "/azure/reliability/reliability-documentdb",
6361+
"redirect_document_id": true
6362+
},
6363+
{
6364+
"source_path": "articles/communications-gateway/connectivity.md",
6365+
"redirect_url": "/previous-versions/azure/communications-gateway/connectivity",
6366+
"redirect_document_id": false
6367+
},
6368+
{
6369+
"source_path": "articles/communications-gateway/connect-operator-connect.md",
6370+
"redirect_url": "/previous-versions/azure/communications-gateway/connect-operator-connect",
6371+
"redirect_document_id": false
6372+
},
6373+
{
6374+
"source_path": "articles/communications-gateway/connect-teams-direct-routing.md",
6375+
"redirect_url": "/previous-versions/azure/communications-gateway/connect-teams-direct-routing",
6376+
"redirect_document_id": false
6377+
},
6378+
{
6379+
"source_path": "articles/communications-gateway/connect-zoom.md",
6380+
"redirect_url": "/previous-versions/azure/communications-gateway/connect-zoom",
6381+
"redirect_document_id": false
6382+
},
6383+
{
6384+
"source_path": "articles/communications-gateway/deploy.md",
6385+
"redirect_url": "/previous-versions/azure/communications-gateway/deploy",
6386+
"redirect_document_id": false
6387+
},
6388+
{
6389+
"source_path": "articles/communications-gateway/emergency-calls-operator-connect.md",
6390+
"redirect_url": "/previous-versions/azure/communications-gateway/emergency-calls-operator-connect",
6391+
"redirect_document_id": false
6392+
},
6393+
{
6394+
"source_path": "articles/communications-gateway/emergency-calls-teams-direct-routing.md",
6395+
"redirect_url": "/previous-versions/azure/communications-gateway/emergency-calls-teams-direct-routing",
6396+
"redirect_document_id": false
6397+
},
6398+
{
6399+
"source_path": "articles/communications-gateway/emergency-calls-zoom.md",
6400+
"redirect_url": "/previous-versions/azure/communications-gateway/emergency-calls-zoom",
6401+
"redirect_document_id": false
6402+
},
6403+
{
6404+
"source_path": "articles/communications-gateway/get-started.md",
6405+
"redirect_url": "/previous-versions/azure/communications-gateway/get-started",
6406+
"redirect_document_id": false
6407+
},
6408+
{
6409+
"source_path": "articles/communications-gateway/index.yml",
6410+
"redirect_url": "/previous-versions/azure/communications-gateway/index",
6411+
"redirect_document_id": false
6412+
},
6413+
{
6414+
"source_path": "articles/communications-gateway/integrate-with-provisioning-api.md",
6415+
"redirect_url": "/previous-versions/azure/communications-gateway/integrate-with-provisioning-api",
6416+
"redirect_document_id": false
6417+
},
6418+
{
6419+
"source_path": "articles/communications-gateway/interoperability-operator-connect.md",
6420+
"redirect_url": "/previous-versions/azure/communications-gateway/interoperability-operator-connect",
6421+
"redirect_document_id": false
6422+
},
6423+
{
6424+
"source_path": "articles/communications-gateway/interoperability-teams-direct-routing.md",
6425+
"redirect_url": "/previous-versions/azure/communications-gateway/interoperability-teams-direct-routing",
6426+
"redirect_document_id": false
6427+
},
6428+
{
6429+
"source_path": "articles/communications-gateway/interoperability-zoom.md",
6430+
"redirect_url": "/previous-versions/azure/communications-gateway/interoperability-zoom",
6431+
"redirect_document_id": false
6432+
},
6433+
{
6434+
"source_path": "articles/communications-gateway/lab.md",
6435+
"redirect_url": "/previous-versions/azure/communications-gateway/lab",
6436+
"redirect_document_id": false
6437+
},
6438+
{
6439+
"source_path": "articles/communications-gateway/limits.md",
6440+
"redirect_url": "/previous-versions/azure/communications-gateway/limits",
6441+
"redirect_document_id": false
6442+
},
6443+
{
6444+
"source_path": "articles/communications-gateway/maintenance-notifications.md",
6445+
"redirect_url": "/previous-versions/azure/communications-gateway/maintenance-notifications",
6446+
"redirect_document_id": false
6447+
},
6448+
{
6449+
"source_path": "articles/communications-gateway/manage-enterprise-operator-connect.md",
6450+
"redirect_url": "/previous-versions/azure/communications-gateway/manage-enterprise-operator-connect",
6451+
"redirect_document_id": false
6452+
},
6453+
{
6454+
"source_path": "articles/communications-gateway/manage-enterprise-teams-direct-routing.md",
6455+
"redirect_url": "/previous-versions/azure/communications-gateway/manage-enterprise-teams-direct-routing",
6456+
"redirect_document_id": false
6457+
},
6458+
{
6459+
"source_path": "articles/communications-gateway/manage-enterprise-zoom.md",
6460+
"redirect_url": "/previous-versions/azure/communications-gateway/manage-enterprise-zoom",
6461+
"redirect_document_id": false
6462+
},
6463+
{
6464+
"source_path": "articles/communications-gateway/mobile-control-point.md",
6465+
"redirect_url": "/previous-versions/azure/communications-gateway/mobile-control-point",
6466+
"redirect_document_id": false
6467+
},
6468+
{
6469+
"source_path": "articles/communications-gateway/monitor-azure-communications-gateway.md",
6470+
"redirect_url": "/previous-versions/azure/communications-gateway/monitor-azure-communications-gateway",
6471+
"redirect_document_id": false
6472+
},
6473+
{
6474+
"source_path": "articles/communications-gateway/monitoring-azure-communications-gateway-data-reference.md",
6475+
"redirect_url": "/previous-versions/azure/communications-gateway/monitoring-azure-communications-gateway-data-reference",
6476+
"redirect_document_id": false
6477+
},
6478+
{
6479+
"source_path": "articles/communications-gateway/onboarding.md",
6480+
"redirect_url": "/previous-versions/azure/communications-gateway/onboarding",
6481+
"redirect_document_id": false
6482+
},
6483+
{
6484+
"source_path": "articles/communications-gateway/overview.md",
6485+
"redirect_url": "/previous-versions/azure/communications-gateway/overview",
6486+
"redirect_document_id": false
6487+
},
6488+
{
6489+
"source_path": "articles/communications-gateway/plan-and-manage-costs.md",
6490+
"redirect_url": "/previous-versions/azure/communications-gateway/plan-and-manage-costs",
6491+
"redirect_document_id": false
6492+
},
6493+
{
6494+
"source_path": "articles/communications-gateway/prepare-for-live-traffic-operator-connect.md",
6495+
"redirect_url": "/previous-versions/azure/communications-gateway/prepare-for-live-traffic-operator-connect",
6496+
"redirect_document_id": false
6497+
},
6498+
{
6499+
"source_path": "articles/communications-gateway/prepare-for-live-traffic-teams-direct-routing.md",
6500+
"redirect_url": "/previous-versions/azure/communications-gateway/prepare-for-live-traffic-teams-direct-routing",
6501+
"redirect_document_id": false
6502+
},
6503+
{
6504+
"source_path": "articles/communications-gateway/prepare-for-live-traffic-zoom.md",
6505+
"redirect_url": "/previous-versions/azure/communications-gateway/prepare-for-live-traffic-zoom",
6506+
"redirect_document_id": false
6507+
},
6508+
{
6509+
"source_path": "articles/communications-gateway/prepare-for-vnet-injection.md",
6510+
"redirect_url": "/previous-versions/azure/communications-gateway/prepare-for-vnet-injection",
6511+
"redirect_document_id": false
6512+
},
6513+
{
6514+
"source_path": "articles/communications-gateway/prepare-to-deploy.md",
6515+
"redirect_url": "/previous-versions/azure/communications-gateway/prepare-to-deploy",
6516+
"redirect_document_id": false
6517+
},
6518+
{
6519+
"source_path": "articles/communications-gateway/provisioning-platform.md",
6520+
"redirect_url": "/previous-versions/azure/communications-gateway/provisioning-platform",
6521+
"redirect_document_id": false
6522+
},
6523+
{
6524+
"source_path": "articles/communications-gateway/provision-user-roles.md",
6525+
"redirect_url": "/previous-versions/azure/communications-gateway/provision-user-roles",
6526+
"redirect_document_id": false
6527+
},
6528+
{
6529+
"source_path": "articles/communications-gateway/reliability-communications-gateway.md",
6530+
"redirect_url": "/previous-versions/azure/communications-gateway/reliability-communications-gateway",
6531+
"redirect_document_id": false
6532+
},
6533+
{
6534+
"source_path": "articles/communications-gateway/request-changes.md",
6535+
"redirect_url": "/previous-versions/azure/communications-gateway/request-changes",
6536+
"redirect_document_id": false
6537+
},
6538+
{
6539+
"source_path": "articles/communications-gateway/role-in-network.md",
6540+
"redirect_url": "/previous-versions/azure/communications-gateway/role-in-network",
6541+
"redirect_document_id": false
6542+
},
6543+
{
6544+
"source_path": "articles/communications-gateway/security.md",
6545+
"redirect_url": "/previous-versions/azure/communications-gateway/security",
6546+
"redirect_document_id": false
6547+
},
6548+
{
6549+
"source_path": "articles/communications-gateway/whats-new.md",
6550+
"redirect_url": "/previous-versions/azure/communications-gateway/whats-new",
6551+
"redirect_document_id": false
6552+
},
63586553
{
63596554
"source_path": "articles/vpn-gateway/about-zone-redundant-vnet-gateways.md",
63606555
"redirect_url": "/azure/reliability/reliability-virtual-network-gateway",
63616556
"redirect_document_id": true
6557+
},
6558+
{
6559+
"source_path": "articles/dns/dns-sdk.md",
6560+
"redirect_url": "https://learn.microsoft.com/dotnet/api/overview/azure/resourcemanager.dns-readme",
6561+
"redirect_document_id": false
63626562
}
63636563

63646564
]

articles/api-management/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -714,6 +714,8 @@
714714
href: breaking-changes/identity-provider-adal-retirement-sep-2025.md
715715
- name: CAPTCHA endpoint update (September 2025)
716716
href: breaking-changes/captcha-endpoint-change-sep-2025.md
717+
- name: Trusted service connectivity retirement (March 2026)
718+
href: breaking-changes/trusted-service-connectivity-retirement-march-2026.md
717719
- name: Built-in analytics dashboard retirement (March 2027)
718720
href: breaking-changes/analytics-dashboard-retirement-march-2027.md
719721
- name: Regional availability

articles/api-management/api-management-howto-disaster-recovery-backup-restore.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: azure-api-management
99
ms.topic: how-to
10-
ms.date: 06/16/2025
10+
ms.date: 12/05/2025
1111
ms.author: danlep
1212
ms.custom: devx-track-azurepowershell
1313
---
@@ -399,7 +399,18 @@ Restore is a long-running operation that may take several minutes to complete. I
399399
## Storage networking constraints
400400

401401

402-
If the storage account is **[firewall][azure-storage-ip-firewall] enabled**, it's recommended to use the API Management instance's system-assigned managed identity for access to the account. Ensure that the storage account [grants access to trusted Azure services](../storage/common/storage-network-security.md?tabs=azure-portal#grant-access-to-trusted-azure-services).
402+
If the storage account is **[firewall][azure-storage-ip-firewall] enabled**, it's recommended to use the API Management instance's system-assigned managed identity for access to the account. Ensure that you have networking line of sight from API Management. Configure one of the following network access options on the resource:
403+
404+
- Allow public access from all networks.
405+
406+
- Set a network security rule to allow API Management traffic based on the IP address or virtual network connectivity.
407+
408+
- Secure traffic from API Management with Private Link connectivity.
409+
410+
- Use a [network security perimeter](/azure/private-link/network-security-perimeter-concepts#onboarded-private-link-resources) to secure the resource and allow traffic from API Management.
411+
412+
> [!IMPORTANT]
413+
> Starting March 2026, trusted service connectivity to Azure services from API Management by enabling the **Allow Trusted Microsoft Services to bypass this firewall** firewall setting will no longer be supported. To continue accessing these services from API Management after this change, ensure that you choose a supported network access option as described above. [Learn more](breaking-changes/trusted-service-connectivity-retirement-march-2026.md)
403414
404415
## What is not backed up
405416
- **Usage data** used for creating analytics reports **isn't included** in the backup. Use [Azure API Management REST API][azure api management rest api] to periodically retrieve analytics reports for safekeeping.

articles/api-management/api-management-howto-use-managed-service-identity.md

Lines changed: 20 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -314,14 +314,27 @@ You can use the system-assigned identity to authenticate to a backend service vi
314314

315315
### Connect to Azure resources behind an IP firewall by using a system-assigned managed identity
316316

317+
For certain scenarios, API Management can communicate with resources in the following services using a system-assigned managed identity configured with an appropriate role assignment:
317318

318-
API Management is a trusted Microsoft service to the following resources. This trusted status enables the service to connect to the following resources behind a firewall. After you explicitly assign the appropriate Azure role to the [system-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) for a resource instance, the scope of access for the instance corresponds to the Azure role that's assigned to the managed identity.
319+
- Azure Key Vault
320+
- Azure Storage
321+
- Azure Service Bus
322+
- Azure Event Hubs
323+
- Azure Container Registry
324+
- Azure Managed HSM
319325

326+
For resources in these services that are protected by an IP firewall, ensure that you have networking line of sight from API Management. Configure one of the following network access options on the resource:
320327

321-
- [Trusted access for Key Vault](/azure/key-vault/general/overview-vnet-service-endpoints#trusted-services)
322-
- [Trusted access for Azure Storage](../storage/common/storage-network-security-trusted-azure-services.md?tabs=azure-portal#trusted-access-based-on-system-assigned-managed-identity)
323-
- [Trusted access for Azure Services Bus](../service-bus-messaging/service-bus-ip-filtering.md#trusted-microsoft-services)
324-
- [Trusted access for Azure Event Hubs](../event-hubs/event-hubs-ip-filtering.md#trusted-microsoft-services)
328+
- Allow public access from all networks.
329+
330+
- Set a network security rule to allow API Management traffic based on the IP address or virtual network connectivity.
331+
332+
- Secure traffic from API Management with Private Link connectivity.
333+
334+
- Use a [network security perimeter](/azure/private-link/network-security-perimeter-concepts#onboarded-private-link-resources) to secure the resource and allow traffic from API Management.
335+
336+
> [!IMPORTANT]
337+
> Starting March 2026, trusted service connectivity to Azure services from API Management by enabling the **Allow Trusted Microsoft Services to bypass this firewall** firewall setting will no longer be supported. To continue accessing these services from API Management after this change, ensure that you choose a supported network access option as described above. [Learn more](breaking-changes/trusted-service-connectivity-retirement-march-2026.md)
325338
326339
### Log events to an event hub
327340

@@ -456,7 +469,7 @@ Following are some common scenarios for using a user-assigned managed identity i
456469
You can use a user-assigned identity to establish trust between an API Management instance and Key Vault. This trust can then be used to retrieve custom TLS/SSL certificates that are stored in Key Vault. You can then assign these certificates to custom domains in the API Management instance.
457470

458471
> [!IMPORTANT]
459-
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. In Key Vault firewall, the **Allow Trusted Microsoft Services to bypass this firewall** option must be enabled.
472+
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. For more information, see the section [Requirements for key vault firewall](#requirements-for-key-vault-firewall).
460473
461474
Take these considerations into account:
462475

@@ -472,7 +485,7 @@ Take these considerations into account:
472485
You can use a user-assigned managed identity to access Key Vault to store and manage secrets for use in API Management policies. For more information, see [Use named values in Azure API Management policies](api-management-howto-properties.md).
473486

474487
> [!NOTE]
475-
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. In Key Vault firewall, the **Allow Trusted Microsoft Services to bypass this firewall** option must be enabled.
488+
> If [Key Vault firewall](/azure/key-vault/general/network-security) is enabled on your key vault, you can't use a user-assigned identity for access from API Management. You can use the system-assigned identity instead. For more information, see the section [Requirements for key vault firewall](#requirements-for-key-vault-firewall).
476489
477490
### Authenticate to a backend by using a user-assigned identity
478491

36.7 KB
Loading

articles/api-management/breaking-changes/overview.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,13 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: reference
9-
ms.date: 07/17/2025
9+
ms.date: 12/03/2025
1010
ms.author: danlep
1111
---
1212

1313
# Upcoming breaking changes
1414

15-
[!INCLUDE [api-management-availability-premium-dev-standard-basic-consumption](../../../includes/api-management-availability-premium-dev-standard-basic-consumption.md)]
16-
15+
[!INCLUDE [api-management-availability-all-tiers](../../../includes/api-management-availability-all-tiers.md)]
1716
The following table lists all the upcoming breaking changes and feature retirements for Azure API Management.
1817

1918
| Change Title | Effective Date |
@@ -33,6 +32,7 @@ The following table lists all the upcoming breaking changes and feature retireme
3332
| [Managed certificates suspension][managed-certificates-suspension-august-2025] | August 15, 2025 - March 15, 2026|
3433
| [ADAL-based Microsoft Entra ID identity provider retirement][msal2025] | September 30, 2025 |
3534
| [CAPTCHA endpoint update][captcha2025] | September 30, 2025 |
35+
| [Trusted service connectivity retirement][trustedservice2026] | March 15, 2026 |
3636
| [Built-in analytics dashboard retirement][analytics2027] | March 15, 2027 |
3737

3838
<!-- Links -->
@@ -52,3 +52,4 @@ The following table lists all the upcoming breaking changes and feature retireme
5252
[workspaces2024]: ./workspaces-breaking-changes-june-2024.md
5353
[workspaces2025march]: ./workspaces-breaking-changes-march-2025.md
5454
[managed-certificates-suspension-august-2025]: ./managed-certificates-suspension-august-2025.md
55+
[trustedservice2026]: ./trusted-service-connectivity-retirement-march-2026.md

0 commit comments

Comments
 (0)