Skip to content

Commit 2057c9a

Browse files
committed
Merge branch 'main' into release-migrate-agent-public-preview
2 parents 0c4c051 + 98002c8 commit 2057c9a

181 files changed

Lines changed: 2450 additions & 1476 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7288,6 +7288,11 @@
72887288
{
72897289
"source_path": "articles/virtual-network/virtual-network-troubleshoot-cannot-delete-vnet.md",
72907290
"redirect_url": "/troubleshoot/azure/virtual-network/virtual-network-troubleshoot-cannot-delete-vnet"
7291-
}
7291+
},
7292+
{
7293+
"source_path": "articles/certification/edge-secured-core-get-certified.md",
7294+
"redirect_url": "/azure/certification/requirements-edge-secured-core",
7295+
"redirect_document_id": false
7296+
},
72927297
]
72937298
}

articles/api-center/authorize-api-access.md

Lines changed: 126 additions & 80 deletions
Large diffs are not rendered by default.

articles/api-center/includes/configure-managed-identity-kv-secret-user.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -76,4 +76,5 @@ To allow import of APIs, assign your API center's managed identity the **Key Vau
7676
--assignee-object-id $apicObjID `
7777
--assignee-principal-type ServicePrincipal `
7878
--scope $scope
79+
```
7980
---

articles/api-center/includes/enable-managed-identity.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,6 @@ ms.date: 12/20/2024
1111
ms.custom: Include file
1212
---
1313

14-
## Enable a managed identity in your API center
15-
1614
For this scenario, your API center uses a [managed identity](/entra/identity/managed-identities-azure-resources/overview) to access Azure resources. Depending on your needs, enable either a system-assigned or one or more user-assigned managed identities.
1715

1816
The following examples show how to enable a system-assigned managed identity by using the Azure portal or the Azure CLI. At a high level, configuration steps are similar for a user-assigned managed identity.

articles/api-center/includes/store-secret-key-vault.md

Lines changed: 4 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -14,27 +14,11 @@ ms.custom: Include file
1414

1515
To store the API key as a secret in the key vault, see [Set and retrieve secret in Key Vault](/azure/key-vault/secrets/quick-create-portal).
1616

17-
#### Enable a managed identity in your API center
1817

19-
For this scenario, your API center uses a [managed identity](/entra/identity/managed-identities-azure-resources/overview) to access the key vault. Depending on your needs, enable either a system-assigned or one or more user-assigned managed identities.
18+
### Enable a managed identity in your API center
2019

21-
The following example shows how to enable a system-assigned managed identity by using the Azure portal. At a high level, configuration steps are similar for a user-assigned managed identity.
20+
[!INCLUDE [enable-managed-identity](includes/enable-managed-identity.md)]
2221

22+
### Assign the managed identity the Key Vault Secrets User role
2323

24-
1. In the [portal](https://azure.microsoft.com), navigate to your API center.
25-
1. In the left menu, under **Security**, select **Managed identities**.
26-
1. Select **System assigned**, and set the status to **On**.
27-
1. Select **Save**.
28-
29-
#### Assign the Key Vault Secrets User role to the managed identity
30-
31-
Assign your API center's managed identity the **Key Vault Secrets User** role in your key vault. The following steps use the Azure portal.
32-
33-
1. In the [portal](https://azure.microsoft.com), navigate to your key vault.
34-
1. In the left menu, select **Access control (IAM)**.
35-
1. Select **+ Add role assignment**.
36-
1. On the **Add role assignment** page, set the values as follows:
37-
1. On the **Role** tab, select **Key Vault Secrets User**.
38-
1. On the **Members** tab, in **Assign access to**, select **Managed identity** > **+ Select members**.
39-
1. On the **Select managed identities** page, select the system-assigned managed identity of your API center that you added in the previous section. Click **Select**.
40-
1. Select **Review + assign** twice.
24+
[!INCLUDE [configure-managed-identity-kv-secret-user](includes/configure-managed-identity-kv-secret-user.md)]
27.2 KB
Loading
-58.6 KB
Loading

articles/api-center/synchronize-api-management-apis.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,9 +55,11 @@ API Management APIs automatically synchronize to the API center whenever existin
5555
> [!NOTE]
5656
> You can run Azure CLI command examples in this article in PowerShell or a bash shell. Where different variable syntax is required, the article provides separate command examples for the two shells.
5757
58+
## Enable a managed identity in your API center
59+
5860
[!INCLUDE [enable-managed-identity](includes/enable-managed-identity.md)]
5961

60-
## Assign the managed identity the API Management Service Reader role
62+
### Assign the managed identity the API Management Service Reader role
6163

6264
[!INCLUDE [configure-managed-identity-apim-reader](includes/configure-managed-identity-apim-reader.md)]
6365

articles/api-center/synchronize-aws-gateway-apis.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,10 +83,11 @@ Manually upload and securely store the two IAM user access keys in Azure Key Vau
8383

8484
Take note of the **Secret identifier** of each secret, a URI similar to `https://<key-vault-name>.vault.azure.net/secrets/<secret-name>`. You use these identifiers in the next steps.
8585

86+
## Configure a managed identity for your API center
8687

8788
[!INCLUDE [enable-managed-identity](includes/enable-managed-identity.md)]
8889

89-
## Assign the managed identity the Key Vault Secrets User role
90+
### Assign the managed identity the Key Vault Secrets User role
9091

9192
[!INCLUDE [configure-managed-identity-kv-secret-user](includes/configure-managed-identity-kv-secret-user.md)]
9293

articles/api-management/api-management-region-availability.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: concept-article
9-
ms.date: 11/11/2025
9+
ms.date: 03/11/2026
1010
ms.author: danlep
1111
ms.custom:
1212
- references_regions
@@ -24,6 +24,8 @@ API Management [v2 tiers](v2-service-tiers-overview.md) and API Management [work
2424

2525
Information in the following table is updated regularly. Capacity availability in Azure regions may vary.
2626

27+
> [!IMPORTANT]
28+
> **Temporary capacity limitation:** Creation of new Basic v2 and Standard v2 instances in **UK South** is currently unavailable due to capacity constraints. We're actively working to restore availability in this region. In the meantime, consider deploying to an alternative region such as **UK West** or **North Europe**. Existing instances in UK South are not affected.
2729
2830
| Region | Basic v2 | Standard v2 | Premium v2 | Workspace gateway (Premium) |
2931
|-----|:---:|:---:|:---:|:---:|
@@ -52,12 +54,14 @@ Information in the following table is updated regularly. Capacity availability i
5254
| South India ||| | |
5355
| Switzerland North ||| | |
5456
| UAE North ||| | |
55-
| UK South |||||
57+
| UK South |¹ | ¹ |||
5658
| UK West ||| | |
5759
| West Europe ||| ||
5860
| West US ||| ||
5961
| West US 2 ||| | |
6062

63+
¹ New instance creation temporarily unavailable. See the capacity limitation note above.
64+
6165
## Related content
6266

6367
Learn more about:

0 commit comments

Comments
 (0)