You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-center/register-discover-mcp-server.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about how Azure API Center can be a centralized registry for
4
4
5
5
ms.service: azure-api-center
6
6
ms.topic: concept-article
7
-
ms.date: 02/20/2026
7
+
ms.date: 04/02/2026
8
8
9
9
ms.collection: ce-skilling-ai-copilot
10
10
ms.update-cycle: 180-days
@@ -126,6 +126,7 @@ To build MCP servers by using Azure compute services and register them in your A
126
126
Set up your [API Center portal](set-up-api-center-portal.md) so that developers and other stakeholders in your organization can discover MCP servers in your API inventory. From the API Center portal, users can do the following:
127
127
- Browse and filter MCP servers in the inventory.
128
128
- For remote MCP servers, view details such as the URL endpoint of the MCP server and API definition, and install the MCP server in their Visual Studio Code environment.
129
+
- A built-in MCP Inspector tool allows users to test MCP server endpoints and view the responses directly in the portal. On the **Options** tab of an MCP server details page, select **View documentation** to access the MCP Inspector.
129
130
130
131
:::image type="content" source="media/register-discover-mcp-server/mcp-server-portal-small.png" lightbox="media/register-discover-mcp-server/mcp-server-portal.png" alt-text="Screenshot of MCP server in API Center portal.":::
Copy file name to clipboardExpand all lines: articles/api-center/set-up-api-center-portal.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: How to set up the API Center portal, a managed website that enables
4
4
5
5
ms.service: azure-api-center
6
6
ms.topic: how-to
7
-
ms.date: 02/25/2026
7
+
ms.date: 04/02/2026
8
8
ms.update-cycle: 180-days
9
9
10
10
ms.custom:
@@ -19,7 +19,7 @@ This article shows you how to set up and customize the *API Center portal* (prev
19
19
The API Center portal supports and streamlines the work of developers who use and create APIs within your organization. Users with access can:
20
20
21
21
***Search for APIs** by name or use AI-assisted semantic search.
22
-
***Filter APIs** by type or lifecycle stage.
22
+
***Filter APIs** by type, lifecycle stage, and other properties.
23
23
***View API details and definitions** including endpoints, methods, parameters, and response formats.
24
24
***Download API definitions** to their computer or open in Visual Studio Code.
25
25
***Try out APIs** with API key or OAuth 2.0 authentication.
@@ -66,6 +66,9 @@ After configuring access, open the API Center portal by selecting **View API Cen
66
66
67
67
By default, the portal home page is publicly reachable. If Microsoft Entra ID is configured for access, users must select **Sign-in** to access APIs. See [Enable sign-in to portal by Microsoft Entra users and groups](#enable-sign-in) for details on configuring user access.
68
68
69
+
* Add filters on the home page to display assets of certain types or that match certain metadata values.
70
+
* Select an API or other registered asset to view its details, such as endpoints, methods, parameters, and response formats. You can also download API definitions or open them in Visual Studio Code.
71
+
69
72
<aid="enable-sign-in"></a>
70
73
## Enable sign-in to portal by Microsoft Entra users and groups
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-bindings-mcp-resource-trigger.md
+3-21Lines changed: 3 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -130,7 +130,7 @@ For the complete code example, see the [Azure Functions MCP Extension repo](http
130
130
::: zone pivot="programming-language-java"
131
131
132
132
> [!IMPORTANT]
133
-
> The MCP extension in Java doesn't_ support resource today.
133
+
> The MCP extension in Java supports resource today. Documentation coming soon.
134
134
135
135
::: zone-end
136
136
@@ -216,15 +216,7 @@ app.mcpTool("getWeather", {
216
216
For the complete code example, see [weatherMcpApp.ts](https://github.com/Azure-Samples/remote-mcp-functions-typescript/blob/McpAppDemo/src/functions/weatherMcpApp.ts).
217
217
218
218
> [!IMPORTANT]
219
-
> The MCP resource trigger for TypeScript currently requires version `4.12.0-preview.2` or later of the [`@azure/functions`](https://www.npmjs.com/package/@azure/functions/v/4.12.0-preview.2) package.
220
-
> It also requires version `[4.32.0, 5.0.0)` of the preview exetnsion bundle. Make sure to update your `host.json` to use this preview bundle and version:
> The MCP resource trigger for TypeScript requires version `4.12.0` or later of the [`@azure/functions`](https://www.npmjs.com/package/@azure/functions/v/4.12.0) package.
For the complete code example, see [function_app.py](https://github.com/Azure-Samples/remote-mcp-functions-python/blob/main/src).
291
283
292
284
> [!NOTE]
293
-
> The MCP resource trigger for Python requires version `1.25.0b3` or later of the [`azure-functions`](https://pypi.org/project/azure-functions/1.25.0b3/) package.
294
-
> It also requires version `[4.32.0, 5.0.0)` of the preview exetnsion bundle. Make sure to update your `host.json` to use this preview bundle and version:
> If the app is using Python 3.9-3.12, add the `PYTHON_ISOLATE_WORKER_DEPENDENCIES: 1` app setting to `local.settings.json` and to app settings when running in Azure.
285
+
> The MCP resource trigger for Python requires version `2.0.0` or later of the [`azure-functions`](https://pypi.org/project/azure-functions/) package and using **Python 3.13** or above.
Copy file name to clipboardExpand all lines: articles/azure-functions/scenario-custom-remote-mcp-server.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -198,9 +198,9 @@ You can view the complete project template in the [Azure Functions Java MCP Serv
198
198
::: zone pivot="programming-language-python"
199
199
The function code for the MCP server tools is defined in the `src/function_app.py` file. The MCP function annotations expose these functions as MCP Server tools:
You can view the complete project template in the [Azure Functions Python MCP Server](https://github.com/Azure-Samples/remote-mcp-functions-python) GitHub repository.
Copy file name to clipboardExpand all lines: articles/azure-functions/scenario-mcp-apps.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -250,15 +250,15 @@ You can view the complete project template in the [Azure Functions .NET MCP Serv
250
250
::: zone pivot="programming-language-python"
251
251
The function code for the MCP Apps weather tool is defined in the `src/function_app.py` file. In this function, the `metadata` parameter on `@app.mcp_tool()` adds UI metadata to the `get_weather` tool.
The `TOOL_METADATA` constant declares a `ui.resourceUri` that tells the MCP host to fetch the interactive UI from `ui://weather/index.html` after the tool runs.
Copy file name to clipboardExpand all lines: articles/container-apps/token-store.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,9 +22,6 @@ You typically need to write code to collect, store, and refresh tokens in your a
22
22
23
23
When token store is enabled, the Container Apps authentication system caches ID tokens, access tokens, and refresh tokens the authenticated session, and they're accessible only by the associated user.
24
24
25
-
> [!NOTE]
26
-
> The token store feature is in preview.
27
-
28
25
## Generate a SAS URL
29
26
30
27
Before you can create a token store for your container app, you first need an Azure Storage account with a private blob container.
@@ -79,7 +76,7 @@ az containerapp auth update \
79
76
--token-store true
80
77
```
81
78
82
-
Additionally, you can create your token store with the `sasUrlSettingName` property using an [ARM template](/azure/templates/microsoft.app/2023-11-02-preview/containerapps/authconfigs?pivots=deployment-language-arm-template#blobstoragetokenstore-1).
79
+
Additionally, you can create your token store with the `sasUrlSettingName` property using an [ARM template](/azure/templates/microsoft.app/containerapps/authconfigs?pivots=deployment-language-arm-template#blobstoragetokenstore-1).
Copy file name to clipboardExpand all lines: articles/energy-data-services/how-to-manage-data-security-and-encryption.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,15 +29,15 @@ In addition to TLS, when you interact with Azure Data Manager for Energy, all tr
29
29
30
30
## Set up Customer Managed Keys (CMK) for Azure Data Manager for Energy instance
31
31
> [!IMPORTANT]
32
-
> You can't edit CMK settings once the Azure Data Manager for Energy instance is created.
32
+
> The key vault and the user assigned identity must be in the same region as that of the Azure Data Manager for Energy instance. CMK can only be enabled only at the time of instance creation.
33
33
34
34
### Prerequisites
35
35
36
36
**Step 1: Configure the key vault**
37
37
38
38
1. You can use a new or existing key vault to store customer-managed keys. To learn more about Azure Key Vault, see [Azure Key Vault Overview](/azure/key-vault/general/overview) and [What is Azure Key Vault](/azure/key-vault/general/basic-concepts)?
39
39
2. Using customer-managed keys with Azure Data Manager for Energy requires that both soft delete and purge protection are enabled for the key vault. Soft delete is enabled by default when you create a new key vault and can't be disabled. You can enable purge protection when you create the key vault or afterwards.
40
-
3. To learn how to create a key vault with the Azure portal, see [Quickstart: Create a key vault using the Azure portal](/azure/key-vault/general/quick-create-portal). When you create the key vault, select Enable purge protection.
40
+
3. To learn how to create a key vault with the Azure portal, see [Quickstart: Create a key vault using the Azure portal](/azure/key-vault/general/quick-create-portal). The key vault must be in the same region as that of the Azure Data Manager for Energy instance. When you create the key vault, select Enable purge protection.
41
41
42
42
[](media/how-to-manage-data-security-and-encryption/customer-managed-key-1-create-key-vault.png#lightbox)
43
43
@@ -71,7 +71,7 @@ In addition to TLS, when you interact with Azure Data Manager for Energy, all tr
71
71
[](media/how-to-manage-data-security-and-encryption/customer-managed-key-3aa-enable-cmk.png#lightbox)
72
72
73
73
8. Next, select the user-assigned managed identity that is used to authorize access to the key vault that contains the key.
74
-
9. Select "**Select a user identity**" Select the user-assigned managed identity that you created in the prerequisites.
74
+
9. Select "**Select a user identity**" Select the user-assigned managed identity that you created in the prerequisites. The user-assigned managed identity must be created in the same region as the Azure Data Manager for Energy instance.
75
75
[](media/how-to-manage-data-security-and-encryption/customer-managed-key-3bb-select-managed-identity.png#lightbox)
76
76
77
77
10. This user assigned identity must have _get key_, _list key_, _wrap key_, and _unwrap key_ permissions on the key vault. For more information on assigning Azure Key Vault access policies, see [Assign a Key Vault Access Policy](/azure/key-vault/general/assign-access-policy).
0 commit comments