Skip to content

Commit 1df1be1

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into devbox-howtos-dedup-links
2 parents 591275d + b12ac95 commit 1df1be1

376 files changed

Lines changed: 5743 additions & 4169 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.gitignore

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -158,14 +158,3 @@ articles/planetary-computer/geocatalog_configs/umbra-sar-ships/stac.json
158158
articles/planetary-computer/geocatalog_configs/umbra-sar-ships/tile-settings.json
159159
articles/planetary-computer/helper-content/collection-config-scraper.py
160160
articles/planetary-computer/helper-content/generate_collection_docs.py
161-
# Doc-Kit workspace files
162-
.github/AGENTS.md
163-
.github/agents/
164-
.github/instructions/
165-
.github/prompts/
166-
.github/skills/
167-
.vscode/settings.json
168-
.dockit/
169-
.env
170-
.env.example
171-
requirements.txt

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The default name of the **Change email** button in *selfAsserted.html* is **chan
4343
[!INCLUDE [active-directory-b2c-customization-prerequisites](../../includes/active-directory-b2c-customization-prerequisites.md)]
4444

4545

46-
- The B2C users need to have an authentication method specified for self-service password reset. Select the B2C User, in the left menu under **Manage**, select **Authentication methods**. Ensure **Authentication contact info** is set. B2C users created via a Sign-up flow has this set by default. For users created via Azure Portal or by Graph API, you need to set **Authentication contact info** for SSPR to work.
46+
- The B2C users need to have an authentication method specified for self-service password reset. Select the B2C User, in the left menu under **Manage**, select **Authentication methods**. Ensure **Authentication contact info** is set. B2C users created via a Sign-up flow has this set by default. For users created via Azure portal or by Graph API, you need to set **Authentication contact info** for SSPR to work.
4747

4848

4949
## Self-service password reset (recommended)

articles/active-directory-b2c/configure-authentication-sample-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ const msalConfig = {
160160
clientId: "<your-MyApp-application-ID>", // This is the ONLY mandatory field; everything else is optional.
161161
authority: b2cPolicies.authorities.signUpSignIn.authority, // Choose sign-up/sign-in user-flow as your default.
162162
knownAuthorities: [b2cPolicies.authorityDomain], // You must identify your tenant's domain as a known authority.
163-
redirectUri: "http://localhost:6420", // You must register this URI on Azure Portal/App Registration. Defaults to "window.location.href".
163+
redirectUri: "http://localhost:6420", // You must register this URI on Azure portal/App Registration. Defaults to "window.location.href".
164164
},
165165
cache: {
166166
cacheLocation: "sessionStorage",

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -531,7 +531,7 @@ The following IDs are used for [RESTful service technical profile](restful-techn
531531

532532
## Microsoft Entra multifactor authentication error messages
533533

534-
The following IDs are used for an [Microsoft Entra ID multifactor authentication technical profile](multi-factor-auth-technical-profile.md) error message:
534+
The following IDs are used for a [Microsoft Entra ID multifactor authentication technical profile](multi-factor-auth-technical-profile.md) error message:
535535

536536
| ID | Default value |
537537
| --- | ------------- |

articles/active-directory-b2c/partner-dynamics-365-fraud-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ Learn more: [UI customization documentation](./customize-ui-with-html.md?pivots=
9494

9595
### Add policy keys for your Microsoft DFP client app ID and secret
9696

97-
1. In the Microsoft Entra tenant where Microsoft DFP is set up, create an [Microsoft Entra application and grant admin consent](/dynamics365/fraud-protection/integrate-real-time-api#create-azure-active-directory-applications).
97+
1. In the Microsoft Entra tenant where Microsoft DFP is set up, create a [Microsoft Entra application and grant admin consent](/dynamics365/fraud-protection/integrate-real-time-api#create-azure-active-directory-applications).
9898
2. Create a secret value for this application registration. Note the application client ID and client secret value.
9999
3. Save the client ID and client secret values as [policy keys in your Azure AD B2C tenant](./policy-keys-overview.md).
100100

articles/active-directory-b2c/technicalprofiles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -311,7 +311,7 @@ In the following technical profile:
311311

312312
## Persisted claims
313313

314-
The **PersistedClaims** element contains all of the values that should be persisted by an [Microsoft Entra ID technical profile](active-directory-technical-profile.md) with possible mapping information between a claim type already defined in the [ClaimsSchema](claimsschema.md) section in the policy and the Microsoft Entra attribute name.
314+
The **PersistedClaims** element contains all of the values that should be persisted by a [Microsoft Entra ID technical profile](active-directory-technical-profile.md) with possible mapping information between a claim type already defined in the [ClaimsSchema](claimsschema.md) section in the policy and the Microsoft Entra attribute name.
315315

316316
The name of the claim is the name of the [Microsoft Entra attribute](user-profile-attributes.md) unless the **PartnerClaimType** attribute is specified, which contains the Microsoft Entra attribute name.
317317

articles/api-center/register-discover-mcp-server.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about how Azure API Center can be a centralized registry for
44

55
ms.service: azure-api-center
66
ms.topic: concept-article
7-
ms.date: 09/08/2025
7+
ms.date: 02/05/2026
88

99
ms.collection: ce-skilling-ai-copilot
1010
ms.update-cycle: 180-days
@@ -15,17 +15,20 @@ ms.custom:
1515

1616
# Register and discover remote MCP servers in your API inventory
1717

18-
This article describes how to use Azure API Center to maintain an inventory (or *registry*) of remote model context protocol (MCP) servers and help stakeholders discover them using the API Center portal. MCP servers expose backend APIs or data sources in a standard way to AI agents and models that consume them.
18+
This article describes how to use Azure API Center to maintain an inventory (or *registry*) of remote model context protocol (MCP) servers and help stakeholders discover them through the API Center portal. MCP servers expose backend APIs or data sources in a standard way to AI agents and models that consume them.
19+
20+
> [!NOTE]
21+
> New! MCP servers registered in your API Center can now be integrated with Azure AI Foundry's tool catalogs, enabling you to govern MCP tools and make them available to AI agents. Learn more in [Tool catalog for agents in Azure AI Foundry](/azure/ai-foundry/agents/concepts/tool-catalog) and [Private tool catalogs for Azure AI Foundry agents](/azure/ai-foundry/agents/how-to/private-tool-catalog).
1922
2023
[!INCLUDE [about-mcp-servers](includes/about-mcp-servers.md)]
2124

2225
## Manually register an MCP server in your API inventory
2326

24-
The following sections describe how to manually inventory a remote MCP server in your API center.
27+
The following sections describe how to manually add a remote MCP server to your API center inventory.
2528

2629
### MCP API type
2730

28-
Manually register an MCP server in your API center inventory similar to the way you register other APIs, specifying the API type as **MCP**. To register an API using the Azure portal, see [Tutorial: Register APIs in your API inventory](././tutorials/register-apis.md).
31+
Manually register an MCP server in your API center inventory similar to the way you register other APIs. Specify the API type as **MCP**. To register an API by using the Azure portal, see [Tutorial: Register APIs in your API inventory](././tutorials/register-apis.md).
2932

3033
As described in the following sections, when you register an MCP server, you can specify an environment, deployment, and definition.
3134

@@ -35,7 +38,7 @@ As described in the following sections, when you register an MCP server, you can
3538

3639
### Environment and deployment for MCP server
3740

38-
In API Center, specify an *environment* and a *deployment* for your MCP server. The environment is the location of the MCP server, such as an API management platform or a compute service, and the deployment is a runtime URL for the MCP service.
41+
In API Center, specify an *environment* and a *deployment* for your MCP server. The environment is the location of the MCP server, such as an API management platform or a compute service. The deployment is a runtime URL for the MCP service.
3942

4043
For information about creating an environment and a deployment, see [Tutorial: Add environments and deployments for APIs](././tutorials/configure-environments-deployments.md).
4144

@@ -44,7 +47,7 @@ For information about creating an environment and a deployment, see [Tutorial: A
4447
Optionally, add an API definition for a remote MCP server in OpenAPI 3.0 format. The API definition must include a URL endpoint for the MCP server. For an example of adding an OpenAPI definition, see [Tutorial: Register APIs in your API inventory](././tutorials/register-apis.md#add-a-definition-to-your-version).
4548

4649

47-
You can use the following lightweight OpenAPI 3.0 API definition for your MCP server, which includes a `url` endpoint for the MCP server:
50+
Use the following lightweight OpenAPI 3.0 API definition for your MCP server, which includes a `url` endpoint for the MCP server:
4851

4952

5053
```json
@@ -73,15 +76,15 @@ Register one or more of the partner MCP servers in your API inventory to make th
7376

7477
To register a partner MCP server:
7578

76-
1. In the [Azure portal](https://portal.azure.com), navigate to your API center.
79+
1. In the [Azure portal](https://portal.azure.com), go to your API center.
7780
1. In the sidebar menu, under **Discover**, select **MCP** (preview).
78-
1. Browse the available partner MCP servers. Select **Register** to add an MCP server to your API inventory. Follow on-screen instructions if provided to complete the registration.
81+
1. Browse the available partner MCP servers. Select **Register** to add an MCP server to your API inventory. Follow the on-screen instructions if they're provided to complete the registration.
7982

80-
When you add a partner MCP server, API Center automatically configures the following for you:
83+
When you add a partner MCP server, API Center automatically configures the following settings for you:
8184

8285
* Creates an API entry in your API inventory with the API type set to **MCP**.
8386
* Creates an environment and a deployment for the MCP server.
84-
* Adds an OpenAPI definition for the MCP server if available from the partner.
87+
* Adds an OpenAPI definition for the MCP server if the partner provides one.
8588

8689
To build and register a Logic Apps MCP server, see [Build and register a Logic Apps MCP server](../logic-apps/create-mcp-server-api-center.md).
8790

articles/api-management/TOC.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -293,6 +293,16 @@
293293
- name: Reuse policy configurations
294294
displayName: policy fragments
295295
href: policy-fragments.md
296+
- name: Build advanced execution pipeline
297+
items:
298+
- name: Architecture using policy fragments
299+
href: fragment-pipeline-architecture.md
300+
- name: Variable management in execution pipeline
301+
href: fragment-variable-management.md
302+
- name: Central metadata cache for policy fragments
303+
href: fragment-metadata-cache.md
304+
- name: Policy fragment injection and coordination
305+
href: fragment-policy-coordination.md
296306
- name: Error handling
297307
href: api-management-error-handling-policies.md
298308
- name: Advanced monitoring

0 commit comments

Comments
 (0)