Skip to content

Commit 0a0664a

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents daacb61 + d6d44b7 commit 0a0664a

171 files changed

Lines changed: 3036 additions & 2573 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The default name of the **Change email** button in *selfAsserted.html* is **chan
4343
[!INCLUDE [active-directory-b2c-customization-prerequisites](../../includes/active-directory-b2c-customization-prerequisites.md)]
4444

4545

46-
- The B2C users need to have an authentication method specified for self-service password reset. Select the B2C User, in the left menu under **Manage**, select **Authentication methods**. Ensure **Authentication contact info** is set. B2C users created via a Sign-up flow has this set by default. For users created via Azure Portal or by Graph API, you need to set **Authentication contact info** for SSPR to work.
46+
- The B2C users need to have an authentication method specified for self-service password reset. Select the B2C User, in the left menu under **Manage**, select **Authentication methods**. Ensure **Authentication contact info** is set. B2C users created via a Sign-up flow has this set by default. For users created via Azure portal or by Graph API, you need to set **Authentication contact info** for SSPR to work.
4747

4848

4949
## Self-service password reset (recommended)

articles/active-directory-b2c/configure-authentication-sample-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ const msalConfig = {
160160
clientId: "<your-MyApp-application-ID>", // This is the ONLY mandatory field; everything else is optional.
161161
authority: b2cPolicies.authorities.signUpSignIn.authority, // Choose sign-up/sign-in user-flow as your default.
162162
knownAuthorities: [b2cPolicies.authorityDomain], // You must identify your tenant's domain as a known authority.
163-
redirectUri: "http://localhost:6420", // You must register this URI on Azure Portal/App Registration. Defaults to "window.location.href".
163+
redirectUri: "http://localhost:6420", // You must register this URI on Azure portal/App Registration. Defaults to "window.location.href".
164164
},
165165
cache: {
166166
cacheLocation: "sessionStorage",

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -531,7 +531,7 @@ The following IDs are used for [RESTful service technical profile](restful-techn
531531

532532
## Microsoft Entra multifactor authentication error messages
533533

534-
The following IDs are used for an [Microsoft Entra ID multifactor authentication technical profile](multi-factor-auth-technical-profile.md) error message:
534+
The following IDs are used for a [Microsoft Entra ID multifactor authentication technical profile](multi-factor-auth-technical-profile.md) error message:
535535

536536
| ID | Default value |
537537
| --- | ------------- |

articles/active-directory-b2c/partner-dynamics-365-fraud-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ Learn more: [UI customization documentation](./customize-ui-with-html.md?pivots=
9494

9595
### Add policy keys for your Microsoft DFP client app ID and secret
9696

97-
1. In the Microsoft Entra tenant where Microsoft DFP is set up, create an [Microsoft Entra application and grant admin consent](/dynamics365/fraud-protection/integrate-real-time-api#create-azure-active-directory-applications).
97+
1. In the Microsoft Entra tenant where Microsoft DFP is set up, create a [Microsoft Entra application and grant admin consent](/dynamics365/fraud-protection/integrate-real-time-api#create-azure-active-directory-applications).
9898
2. Create a secret value for this application registration. Note the application client ID and client secret value.
9999
3. Save the client ID and client secret values as [policy keys in your Azure AD B2C tenant](./policy-keys-overview.md).
100100

articles/active-directory-b2c/technicalprofiles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -311,7 +311,7 @@ In the following technical profile:
311311

312312
## Persisted claims
313313

314-
The **PersistedClaims** element contains all of the values that should be persisted by an [Microsoft Entra ID technical profile](active-directory-technical-profile.md) with possible mapping information between a claim type already defined in the [ClaimsSchema](claimsschema.md) section in the policy and the Microsoft Entra attribute name.
314+
The **PersistedClaims** element contains all of the values that should be persisted by a [Microsoft Entra ID technical profile](active-directory-technical-profile.md) with possible mapping information between a claim type already defined in the [ClaimsSchema](claimsschema.md) section in the policy and the Microsoft Entra attribute name.
315315

316316
The name of the claim is the name of the [Microsoft Entra attribute](user-profile-attributes.md) unless the **PartnerClaimType** attribute is specified, which contains the Microsoft Entra attribute name.
317317

articles/api-center/register-discover-mcp-server.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about how Azure API Center can be a centralized registry for
44

55
ms.service: azure-api-center
66
ms.topic: concept-article
7-
ms.date: 09/08/2025
7+
ms.date: 02/05/2026
88

99
ms.collection: ce-skilling-ai-copilot
1010
ms.update-cycle: 180-days
@@ -15,17 +15,20 @@ ms.custom:
1515

1616
# Register and discover remote MCP servers in your API inventory
1717

18-
This article describes how to use Azure API Center to maintain an inventory (or *registry*) of remote model context protocol (MCP) servers and help stakeholders discover them using the API Center portal. MCP servers expose backend APIs or data sources in a standard way to AI agents and models that consume them.
18+
This article describes how to use Azure API Center to maintain an inventory (or *registry*) of remote model context protocol (MCP) servers and help stakeholders discover them through the API Center portal. MCP servers expose backend APIs or data sources in a standard way to AI agents and models that consume them.
19+
20+
> [!NOTE]
21+
> New! MCP servers registered in your API Center can now be integrated with Azure AI Foundry's tool catalogs, enabling you to govern MCP tools and make them available to AI agents. Learn more in [Tool catalog for agents in Azure AI Foundry](/azure/ai-foundry/agents/concepts/tool-catalog) and [Private tool catalogs for Azure AI Foundry agents](/azure/ai-foundry/agents/how-to/private-tool-catalog).
1922
2023
[!INCLUDE [about-mcp-servers](includes/about-mcp-servers.md)]
2124

2225
## Manually register an MCP server in your API inventory
2326

24-
The following sections describe how to manually inventory a remote MCP server in your API center.
27+
The following sections describe how to manually add a remote MCP server to your API center inventory.
2528

2629
### MCP API type
2730

28-
Manually register an MCP server in your API center inventory similar to the way you register other APIs, specifying the API type as **MCP**. To register an API using the Azure portal, see [Tutorial: Register APIs in your API inventory](././tutorials/register-apis.md).
31+
Manually register an MCP server in your API center inventory similar to the way you register other APIs. Specify the API type as **MCP**. To register an API by using the Azure portal, see [Tutorial: Register APIs in your API inventory](././tutorials/register-apis.md).
2932

3033
As described in the following sections, when you register an MCP server, you can specify an environment, deployment, and definition.
3134

@@ -35,7 +38,7 @@ As described in the following sections, when you register an MCP server, you can
3538

3639
### Environment and deployment for MCP server
3740

38-
In API Center, specify an *environment* and a *deployment* for your MCP server. The environment is the location of the MCP server, such as an API management platform or a compute service, and the deployment is a runtime URL for the MCP service.
41+
In API Center, specify an *environment* and a *deployment* for your MCP server. The environment is the location of the MCP server, such as an API management platform or a compute service. The deployment is a runtime URL for the MCP service.
3942

4043
For information about creating an environment and a deployment, see [Tutorial: Add environments and deployments for APIs](././tutorials/configure-environments-deployments.md).
4144

@@ -44,7 +47,7 @@ For information about creating an environment and a deployment, see [Tutorial: A
4447
Optionally, add an API definition for a remote MCP server in OpenAPI 3.0 format. The API definition must include a URL endpoint for the MCP server. For an example of adding an OpenAPI definition, see [Tutorial: Register APIs in your API inventory](././tutorials/register-apis.md#add-a-definition-to-your-version).
4548

4649

47-
You can use the following lightweight OpenAPI 3.0 API definition for your MCP server, which includes a `url` endpoint for the MCP server:
50+
Use the following lightweight OpenAPI 3.0 API definition for your MCP server, which includes a `url` endpoint for the MCP server:
4851

4952

5053
```json
@@ -73,15 +76,15 @@ Register one or more of the partner MCP servers in your API inventory to make th
7376

7477
To register a partner MCP server:
7578

76-
1. In the [Azure portal](https://portal.azure.com), navigate to your API center.
79+
1. In the [Azure portal](https://portal.azure.com), go to your API center.
7780
1. In the sidebar menu, under **Discover**, select **MCP** (preview).
78-
1. Browse the available partner MCP servers. Select **Register** to add an MCP server to your API inventory. Follow on-screen instructions if provided to complete the registration.
81+
1. Browse the available partner MCP servers. Select **Register** to add an MCP server to your API inventory. Follow the on-screen instructions if they're provided to complete the registration.
7982

80-
When you add a partner MCP server, API Center automatically configures the following for you:
83+
When you add a partner MCP server, API Center automatically configures the following settings for you:
8184

8285
* Creates an API entry in your API inventory with the API type set to **MCP**.
8386
* Creates an environment and a deployment for the MCP server.
84-
* Adds an OpenAPI definition for the MCP server if available from the partner.
87+
* Adds an OpenAPI definition for the MCP server if the partner provides one.
8588

8689
To build and register a Logic Apps MCP server, see [Build and register a Logic Apps MCP server](../logic-apps/create-mcp-server-api-center.md).
8790

articles/api-management/breaking-changes/trusted-service-connectivity-retirement-march-2026.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,11 @@ You can configure the networking of target resources to one of the following opt
111111

112112
- [How to front a network security perimeter-protected Azure resource with Azure API Management](../using-network-security-perimeter.md)
113113

114+
> [!IMPORTANT]
115+
> Customers can continue using trusted services on the target Azure service for non-Azure API Management scenarios. However, Azure API Management will no longer support it so the gateway needs alternative ways to communicate and have network line-of-sight.
116+
>
117+
> For example, you can enable trusted service connectivity for an Azure Storage resource and use Network Security Perimeter to access it from API Management's gateway.
118+
114119
### Step 3: Disable trusted service connectivity in API Management gateway
115120

116121
After ensuring that your API Management gateway doesn't access other Azure services using trusted service connectivity, you must explicitly disable trusted connectivity in your gateway to acknowledge you have verified that the service no longer depends on trusted connectivity.

articles/application-gateway/configuration-http-settings.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -188,6 +188,15 @@ This capability establishes direct, one-to-one mapping between frontend and back
188188
>
189189
>Dedicated Backend connection is not supported with HTTP/2.
190190
191+
**Troubleshooting 4xx Errors with Dedicated Backend Connections**
192+
193+
When Dedicated Backend Connections is enabled for a backend setting, and the backend application returns 4xx status codes, use the following guidance to diagnose and resolve the issue.
194+
195+
**Verify Service Principal Name (SPN) Configuration**-Authentication mechanisms such as NTLM and Kerberos require correctly registered Service Principal Names .Ensure that SPNs are properly configured and unique in the directory to allow successful authentication.For additional details , see the [Kerberos documentation.]( /windows/win32/ad/mutual-authentication-using-kerberos)
196+
197+
**Review Backend Server Logs for Sub‑Status Codes**-Application Gateway surfaces only the primary HTTP status (for example, 401 Unauthorized). To identify the underlying cause, review the backend server logs for more detailed sub‑status information.For guidance refer to the [Windows Authentication configuration.](/iis/configuration/system.webserver/security/authentication/windowsauthentication/#remarks)
198+
199+
191200
## [Backend Settings](#tab/backendsettings)
192201

193202
### Port

articles/artifact-signing/how-to-signing-integrations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -227,7 +227,7 @@ You can also use the following tools or platforms to set up signing integrations
227227

228228
- **PowerShell for Authenticode**: To use PowerShell for Artifact Signing, see [Artifact Signing](https://www.powershellgallery.com/packages/TrustedSigning/) in PowerShell Gallery to install the PowerShell module.
229229

230-
- **Azure PowerShell - App Control for Business CI policy**: To use Artifact Signing for code integrity (CI) policy signing, follow the instructions in [Sign a new CI policy](./how-to-sign-ci-policy.md) and see [Az.TrustedSigning PowerShell Module](/powershell/azure/install-azps-windows).
230+
- **Azure PowerShell - App Control for Business CI policy**: To use Artifact Signing for code integrity (CI) policy signing, follow the instructions in [Sign a new CI policy](./how-to-sign-ci-policy.md) and download the [Az.ArtifactSigning PowerShell Module](https://www.powershellgallery.com/packages/Az.ArtifactSigning).
231231

232232
- **Artifact Signing SDK**: To create your own signing integration, you can use our open-source [Artifact Signing SDK](https://www.nuget.org/packages/Azure.CodeSigning.Sdk).
233233

articles/azure-app-configuration/howto-geo-replication.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: azure-app-configuration
77
ms.devlang: csharp
88
# ms.devlang: csharp, java, python, javascript
99
ms.topic: how-to
10-
ms.date: 08/25/2025
10+
ms.date: 02/11/2026
1111
ms.author: zhiyuanliang
1212
ms.custom: devx-track-azurecli
1313

@@ -321,7 +321,14 @@ configurationBuilder.AddAzureAppConfiguration(options =>
321321

322322
### [Java Spring](#tab/spring)
323323

324-
This feature isn't yet supported in the Azure App Configuration Java Spring Provider.
324+
Specify the `loadBalancingEnabled` property in the `application.properties` file of your application.
325+
326+
```properties
327+
spring.cloud.azure.appconfiguration.stores[0].load-balancing-enabled=true
328+
```
329+
330+
> [!NOTE]
331+
> Load balancing support is available if you use version **6.1.0** or later
325332

326333
### [Kubernetes](#tab/kubernetes)
327334

0 commit comments

Comments
 (0)