Skip to content

Commit 0da8319

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 6567c37 + 1fcf5b8 commit 0da8319

20 files changed

Lines changed: 693 additions & 386 deletions

articles/api-management/api-management-howto-use-managed-service-identity.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -315,6 +315,12 @@ You can use a system-assigned managed identity to access Key Vault to store and
315315

316316
Use the system-assigned identity to authenticate to a backend service via the [authentication-managed-identity](authentication-managed-identity-policy.md) policy.
317317

318+
> [!CAUTION]
319+
> **Security consideration:** Users with permissions to edit API Management policies (for example, users assigned the [API Management Service Contributor](/azure/role-based-access-control/built-in-roles#api-management-service-contributor) role) can use the [`authentication-managed-identity`](authentication-managed-identity-policy.md) policy to authenticate as the service's managed identity. When you assign roles or permissions to the API Management resouce, be aware that any user who can edit policies may be able to access those same resources through the managed identity. To mitigate risk:
320+
> - Follow the [principle of least privilege](/entra/identity-platform/secure-least-privileged-access) when assigning roles to managed identities.
321+
> - Only grant the API Management Contributor role or policy editing permissions to trusted users.
322+
> - Regularly review and audit managed identity role assignments and who has access to edit API Management policies.
323+
318324
### Connect to Azure resources behind an IP firewall by using a system-assigned managed identity
319325

320326
API Management is a trusted Microsoft service to the following resources. This trusted status enables the service to connect to the following resources behind a firewall when the firewall enables the **Allow Trusted Microsoft Services to bypass this firewall** setting. After you explicitly assign the appropriate Azure role to the [system-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) for a resource instance, the scope of access for the instance corresponds to the Azure role that's assigned to the managed identity.
@@ -481,6 +487,12 @@ You can use a user-assigned managed identity to access Key Vault to store and ma
481487

482488
You can use the user-assigned identity to authenticate to a backend service via the [authentication-managed-identity](authentication-managed-identity-policy.md) policy.
483489

490+
> [!CAUTION]
491+
> **Security consideration:** Users with permissions to edit API Management policies (for example, users assigned the [API Management Service Contributor](/azure/role-based-access-control/built-in-roles#api-management-service-contributor) role) can use the [`authentication-managed-identity`](authentication-managed-identity-policy.md) policy to authenticate as the service's managed identity. When you assign roles or permissions to the API Management resouce, be aware that any user who can edit policies may be able to access those same resources through the managed identity. To mitigate risk:
492+
> - Follow the [principle of least privilege](/entra/identity-platform/secure-least-privileged-access) when assigning roles to managed identities.
493+
> - Only grant the API Management Contributor role or policy editing permissions to trusted users.
494+
> - Regularly review and audit managed identity role assignments and who has access to edit API Management policies.
495+
484496
### Log events to an event hub
485497

486498
You can configure and use a user-assigned managed identity to access an event hub to log events from an API Management instance. For more information, see [How to log events to Azure Event Hubs in Azure API Management](api-management-howto-log-event-hubs.md).

articles/api-management/authentication-managed-identity-policy.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ Both system-assigned identity and any of the multiple user-assigned identities c
2020

2121
[!INCLUDE [api-management-policy-generic-alert](../../includes/api-management-policy-generic-alert.md)]
2222

23+
> [!CAUTION]
24+
> **Security consideration:** Any user with permissions to edit API Management policies (for example, users assigned the [API Management Service Contributor](/azure/role-based-access-control/built-in-roles#api-management-service-contributor) role) can use this policy to authenticate as the service's managed identity. This effectively grants that user access to any resource for which the managed identity has permissions. Ensure that you follow the [principle of least privilege](/entra/identity-platform/secure-least-privileged-access) when assigning permissions to API Management resource. For more information, see [How to use managed identities in Azure API Management](api-management-howto-use-managed-service-identity.md).
2325
2426
## Policy statement
2527

articles/app-service/configure-sidecar.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ In a Linux app, all containers (main and sidecars) share environment variables.
128128

129129
## Add the Redis sidecar extension
130130

131-
From the Azure portal, you can add a Redis sidecar extension to your app for caching. The Redis sidecar is for lightweight caching only, not a replacement for Azure Cache for Redis.
131+
From the Azure portal, you can add a Redis sidecar extension to your app for caching. The Redis sidecar is for lightweight caching only, not a replacement for Azure Managed Redis.
132132

133133
To use the Redis sidecar:
134134

articles/app-service/environment/configure-zone-redundancy-environment.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -122,9 +122,14 @@ To see whether an existing App Service Environment supports zone redundancy:
122122
123123
## Configure Isolated v2 App Service plans with zone redundancy
124124
125-
All App Service plans created in an App Service Environment must use the Isolated v2 pricing tier.
125+
After you enable your App Service Environment to be zone redundant, you can also make each Isolated v2 App Service plan as zone redundant.
126+
127+
> [!NOTE]
128+
> Each plan has its own independent zone redundancy setting, so you can manually enable or disable zone redundancy on specific plans in an App Service Environment.
129+
>
130+
> If a specific plan doesn't need to be zone-redundant, you can disable zone redundancy and then optionally scale it to a single instance.
126131
127-
If you enable your App Service Environment to be zone redundant, you can also set the Isolated v2 App Service plans as zone redundant. Each plan has its own independent zone redundancy setting, so you can manually enable or disable zone redundancy on specific plans in an App Service Environment, as long as the environment is configured to be zone redundant.
132+
All App Service plans created in an App Service Environment must use the Isolated v2 pricing tier.
128133
129134
- **To create a new Isolated v2 App Service plan with zone redundancy**, use the Azure portal, the Azure CLI, or Bicep.
130135

articles/azure-functions/functions-bindings-mcp-tool-trigger.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ builder.Build().Run();
8181
> [!TIP]
8282
> The example above uses literal strings for things like the name of the "get_snippets" tool in both `Program.cs` and the function. Consider instead using shared constant strings to keep things in sync across your project.
8383
84-
For the complete code example, see [SnippetTool.cs](https://github.com/Azure-Samples/remote-mcp-functions-dotnet/blob/main/src/SnippetsTool.cs).
84+
For the complete code example, see [SnippetTool.cs](https://github.com/Azure-Samples/remote-mcp-functions-dotnet/blob/main/src/FunctionsMcpTool/SnippetsTool.cs).
8585
::: zone-end
8686
::: zone pivot="programming-language-java"
8787

@@ -167,7 +167,7 @@ public String getSnippet(
167167
}
168168
```
169169

170-
For the complete code example, see [Snippets.java](https://github.com/Azure-Samples/remote-mcp-functions-java/blob/main/src/main/java/com/function/Snippets.java).
170+
For the complete code example, see [Snippets.java](https://github.com/Azure-Samples/remote-mcp-functions-java/blob/main/samples/FunctionsMcpTool/src/main/java/com/function/Snippets.java).
171171
::: zone-end
172172
::: zone pivot="programming-language-javascript"
173173
Example code for JavaScript isn't currently available. See the TypeScript examples for general guidance using Node.js.
@@ -511,7 +511,6 @@ builder.Build().Run();
511511

512512
You can call the `WithProperty()` method multiple times to define multiple properties for the tool. Each call to `WithProperty()` includes a string representation of the MCP property type, which might not directly correspond to a CLR type. For example, use `"boolean"` to define a boolean property, even though the corresponding CLR type is `bool`. Valid types are: `"string"`, `"number"`, `"integer"`, `"boolean"`, `"object"`.
513513

514-
For the complete example, see the [`Program.cs` file](https://github.com/Azure-Samples/remote-mcp-functions-dotnet/blob/main/src/Program.cs).
515514

516515
---
517516

0 commit comments

Comments
 (0)