Skip to content

Commit 283993e

Browse files
committed
Merge branch 'main' of https://github.com/microsoftdocs/azure-docs-pr into thiago-linuxv3note-fixup
2 parents 73018c7 + 476b526 commit 283993e

89 files changed

Lines changed: 2025 additions & 1037 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

articles/active-directory-b2c/add-api-connector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ ms.custom:
2525

2626
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2727

28-
As a developer or IT administrator, you can use API connectors to integrate your sign-up user flows with REST APIs to customize the sign-up experience and integrate with external systems. At the end of this walkthrough, you'll be able to create an Azure AD B2C user flow that interacts with [REST API services](api-connectors-overview.md) to modify your sign-up experiences.
28+
As a developer or IT administrator, you can use API connectors to integrate sign-up user flows with REST APIs, enabling customization of the sign-up experience and integration with external systems. At the end of this walkthrough, you'll be able to create an Azure AD B2C user flow that interacts with [REST API services](api-connectors-overview.md) to modify your sign-up experiences.
2929

3030
::: zone pivot="b2c-user-flow"
3131
You can create an API endpoint using one of our [samples](api-connector-samples.md#api-connector-rest-api-samples).
@@ -515,7 +515,7 @@ Add the validation technical profile reference to the sign-up technical profile,
515515
<OutputClaim ClaimTypeReferenceId="reenterPassword" Required="true"/>
516516
<OutputClaim ClaimTypeReferenceId="displayName"/>
517517
<OutputClaim ClaimTypeReferenceId="givenName"/>
518-
<OutputClaim ClaimTypeReferenceId="surName"/>
518+
<OutputClaim ClaimTypeReferenceId="surname"/>
519519
<!-- Required to present the text box to collect the data from the user -->
520520
<OutputClaim ClaimTypeReferenceId="loyaltyId"/>
521521
<!-- Required to pass the promoCode returned from "REST-ValidateProfile"

articles/api-center/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@
6363
- name: Agents
6464
items:
6565
- name: Overview
66-
href: agent-to-agent-overview.md
66+
href: agent-to-agent-overview.md
6767
- name: Register and manage agents
6868
href: register-manage-agents.md
6969
- name: MCP servers
@@ -100,6 +100,8 @@
100100
href: self-host-api-center-portal.md
101101
- name: Discover and consume APIs - VS Code extension
102102
href: discover-apis-vscode-extension.md
103+
- name: Enable plugin marketplace
104+
href: enable-api-center-plugin-marketplace.md
103105
- name: API center management and operations
104106
items:
105107
- name: Reliability
Lines changed: 113 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,113 @@
1+
---
2+
title: Enable API Center Plugin Marketplace
3+
description: Enable a plugin marketplace endpoint (preview) for your Azure API center. Developers can configure it in GitHub Copilot or Claude Code to discover and install plugins from your inventory.
4+
5+
ms.service: azure-api-center
6+
ms.topic: how-to
7+
ms.date: 04/15/2026
8+
9+
ms.custom:
10+
# Customer intent: As an API program manager, I want to create a plugin marketplace from my API center so AI developers can find and install plugins from my inventory.
11+
---
12+
13+
# Enable discovery of API center plugins from a plugin marketplace (preview)
14+
15+
16+
This article shows how to enable a plugin marketplace endpoint in [Azure API Center](overview.md). The plugin marketplace endpoint uses the API Center data plane API to catalog the AI plugins such as MCP servers and skills available in the API center inventory.
17+
18+
After you enable the plugin marketplace, developers can add it to their GitHub Copilot CLI or Claude Code development environment to discover and install plugins from your API center.
19+
20+
## Prerequisites
21+
22+
- An API center in your Azure subscription. If you don't have one, see [Quickstart: Create your API center](set-up-api-center.md).
23+
24+
- One or more plugins registered in your API center inventory, such as [MCP servers](register-discover-mcp-server.md) or [skills](register-discover-skills.md).
25+
26+
- The API center portal enabled and set up for your API center. For details, see [Set up and customize your API Center portal](set-up-api-center-portal.md). The access method you choose for the portal determines how developers will authenticate when they access the plugin marketplace.
27+
28+
- [GitHub Copilot CLI](https://github.com/github/copilot-cli) or [Claude Code](https://www.anthropic.com/claude) installed in your development environment.
29+
30+
31+
## Confirm plugin marketplace endpoint is enabled for your API center
32+
33+
After setting up the API Center portal, confirm that the plugin marketplace endpoint is enabled for your API center by cloning it locally.
34+
35+
> [!NOTE]
36+
> After setting up the API center portal, it can take several minutes for the plugin marketplace endpoint to be available.
37+
38+
The marketplace endpoint is of the following form:
39+
40+
```
41+
https://<service name>.data.<region>.azure-apicenter.ms/workspaces/default/plugins/marketplace.git
42+
```
43+
44+
To clone it, use a command similar to the following in your terminal, replacing the service name and region with the values from your API center:
45+
46+
```bash
47+
git clone https://myapicenter.data.eastus.azure-apicenter.ms/workspaces/default/plugins/marketplace.git
48+
```
49+
50+
The `marketplace` folder of the cloned repository contains folders for marketplace configuration in Claude Code and GitHub Copilot CLI, and folders for each plugin in your API center inventory. For example:
51+
52+
```
53+
marketplace/
54+
.claude-plugin/
55+
.github/
56+
plugins/
57+
plugin1/
58+
plugin2/
59+
...
60+
```
61+
62+
Each plugin folder contains JSON files with the plugin metadata and configuration.
63+
64+
## Add plugin marketplace to GitHub Copilot CLI
65+
66+
Developers can add the plugin marketplace from your API center's marketplace endpoint to GitHub Copilot CLI by using the `plugin marketplace add` command. For example, add it in a GitHub Copilot CLI session with a command similar to the following. Replace the service name and region with the values from your API center:
67+
68+
```bash
69+
/plugin marketplace add https://myapicenter.data.eastus.azure-apicenter.ms/workspaces/default/plugins/marketplace.git
70+
```
71+
72+
Follow the prompts to add the plugin marketplace to your GitHub Copilot CLI.
73+
74+
After adding the marketplace, use the `/plugin marketplace browse` command to see the plugins from your API center inventory.
75+
76+
```bash
77+
/plugin marketplace browse myapicenter
78+
```
79+
80+
Add a plugin from the marketplace to a GitHub Copilot CLI session with the `/plugin install` command. For example:
81+
82+
```bash
83+
/plugin install plugin-name@myapicenter
84+
```
85+
86+
For more information about installing plugins from the marketplace in GitHub Copilot CLI, see [GitHub Copilot CLI documentation](https://docs.github.com/copilot/how-tos/copilot-cli/customize-copilot/plugins-finding-installing).
87+
88+
## Add plugin marketplace to Claude Code
89+
90+
Developers can add the plugin marketplace from their API center's marketplace endpoint by using the `/plugin marketplace add` command. For example, add it in a Claude Code session with a command similar to the following command. Replace the service name and region with the values from your API center:
91+
92+
```bash
93+
/plugin marketplace add https://myapicenter.data.eastus.azure-apicenter.ms/workspaces/default/plugins/marketplace.git
94+
```
95+
96+
Follow the prompts to add the plugin marketplace.
97+
98+
After you add the marketplace, use the `/plugin` command to see the plugins from your API center inventory.
99+
100+
Add a plugin from the marketplace to a Claude Code session with the `/plugin install` command. For example:
101+
102+
```bash
103+
/plugin install plugin-name@myapicenter
104+
```
105+
106+
For more information about installing plugins from the marketplace in Claude Code, see [Claude Code documentation](https://code.claude.com/docs/en/discover-plugins).
107+
108+
## Related content
109+
110+
* [Set up and customize your API Center portal](set-up-api-center-portal.md)
111+
* [Discover and consume APIs - VS Code extension](discover-apis-vscode-extension.md)
112+
113+
4.06 KB
Loading

articles/api-management/api-management-howto-use-managed-service-identity.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -315,6 +315,12 @@ You can use a system-assigned managed identity to access Key Vault to store and
315315

316316
Use the system-assigned identity to authenticate to a backend service via the [authentication-managed-identity](authentication-managed-identity-policy.md) policy.
317317

318+
> [!CAUTION]
319+
> **Security consideration:** Users with permissions to edit API Management policies (for example, users assigned the [API Management Service Contributor](/azure/role-based-access-control/built-in-roles#api-management-service-contributor) role) can use the [`authentication-managed-identity`](authentication-managed-identity-policy.md) policy to authenticate as the service's managed identity. When you assign roles or permissions to the API Management resouce, be aware that any user who can edit policies may be able to access those same resources through the managed identity. To mitigate risk:
320+
> - Follow the [principle of least privilege](/entra/identity-platform/secure-least-privileged-access) when assigning roles to managed identities.
321+
> - Only grant the API Management Contributor role or policy editing permissions to trusted users.
322+
> - Regularly review and audit managed identity role assignments and who has access to edit API Management policies.
323+
318324
### Connect to Azure resources behind an IP firewall by using a system-assigned managed identity
319325

320326
API Management is a trusted Microsoft service to the following resources. This trusted status enables the service to connect to the following resources behind a firewall when the firewall enables the **Allow Trusted Microsoft Services to bypass this firewall** setting. After you explicitly assign the appropriate Azure role to the [system-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) for a resource instance, the scope of access for the instance corresponds to the Azure role that's assigned to the managed identity.
@@ -481,6 +487,12 @@ You can use a user-assigned managed identity to access Key Vault to store and ma
481487

482488
You can use the user-assigned identity to authenticate to a backend service via the [authentication-managed-identity](authentication-managed-identity-policy.md) policy.
483489

490+
> [!CAUTION]
491+
> **Security consideration:** Users with permissions to edit API Management policies (for example, users assigned the [API Management Service Contributor](/azure/role-based-access-control/built-in-roles#api-management-service-contributor) role) can use the [`authentication-managed-identity`](authentication-managed-identity-policy.md) policy to authenticate as the service's managed identity. When you assign roles or permissions to the API Management resouce, be aware that any user who can edit policies may be able to access those same resources through the managed identity. To mitigate risk:
492+
> - Follow the [principle of least privilege](/entra/identity-platform/secure-least-privileged-access) when assigning roles to managed identities.
493+
> - Only grant the API Management Contributor role or policy editing permissions to trusted users.
494+
> - Regularly review and audit managed identity role assignments and who has access to edit API Management policies.
495+
484496
### Log events to an event hub
485497

486498
You can configure and use a user-assigned managed identity to access an event hub to log events from an API Management instance. For more information, see [How to log events to Azure Event Hubs in Azure API Management](api-management-howto-log-event-hubs.md).

articles/api-management/authentication-managed-identity-policy.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ Both system-assigned identity and any of the multiple user-assigned identities c
2020

2121
[!INCLUDE [api-management-policy-generic-alert](../../includes/api-management-policy-generic-alert.md)]
2222

23+
> [!CAUTION]
24+
> **Security consideration:** Any user with permissions to edit API Management policies (for example, users assigned the [API Management Service Contributor](/azure/role-based-access-control/built-in-roles#api-management-service-contributor) role) can use this policy to authenticate as the service's managed identity. This effectively grants that user access to any resource for which the managed identity has permissions. Ensure that you follow the [principle of least privilege](/entra/identity-platform/secure-least-privileged-access) when assigning permissions to API Management resource. For more information, see [How to use managed identities in Azure API Management](api-management-howto-use-managed-service-identity.md).
2325
2426
## Policy statement
2527

articles/app-service/configure-sidecar.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ In a Linux app, all containers (main and sidecars) share environment variables.
128128

129129
## Add the Redis sidecar extension
130130

131-
From the Azure portal, you can add a Redis sidecar extension to your app for caching. The Redis sidecar is for lightweight caching only, not a replacement for Azure Cache for Redis.
131+
From the Azure portal, you can add a Redis sidecar extension to your app for caching. The Redis sidecar is for lightweight caching only, not a replacement for Azure Managed Redis.
132132

133133
To use the Redis sidecar:
134134

articles/app-service/environment/configure-zone-redundancy-environment.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -122,9 +122,14 @@ To see whether an existing App Service Environment supports zone redundancy:
122122
123123
## Configure Isolated v2 App Service plans with zone redundancy
124124
125-
All App Service plans created in an App Service Environment must use the Isolated v2 pricing tier.
125+
After you enable your App Service Environment to be zone redundant, you can also make each Isolated v2 App Service plan as zone redundant.
126+
127+
> [!NOTE]
128+
> Each plan has its own independent zone redundancy setting, so you can manually enable or disable zone redundancy on specific plans in an App Service Environment.
129+
>
130+
> If a specific plan doesn't need to be zone-redundant, you can disable zone redundancy and then optionally scale it to a single instance.
126131
127-
If you enable your App Service Environment to be zone redundant, you can also set the Isolated v2 App Service plans as zone redundant. Each plan has its own independent zone redundancy setting, so you can manually enable or disable zone redundancy on specific plans in an App Service Environment, as long as the environment is configured to be zone redundant.
132+
All App Service plans created in an App Service Environment must use the Isolated v2 pricing tier.
128133
129134
- **To create a new Isolated v2 App Service plan with zone redundancy**, use the Azure portal, the Azure CLI, or Bicep.
130135

articles/app-service/manage-automatic-scaling.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to scale automatically in Azure App Service with no confi
44
author: msangapu-msft
55
ms.author: msangapu
66
ms.topic: how-to
7-
ms.date: 01/09/2026
7+
ms.date: 04/16/2026
88
ms.custom: devx-track-azurecli
99
ms.service: azure-app-service
1010
---
@@ -41,7 +41,7 @@ Only one scaling method should be active for an App Service plan.
4141

4242
| &nbsp; | **Manual** | **Autoscale** | **Automatic scaling** |
4343
|--------|------------|---------------|------------------------|
44-
| Available tiers | Basic and up | Standard and up | Premium v2 and Premium v3 |
44+
| Available tiers | Basic and up | Standard and up | Premium v2 - v4 |
4545
| Rule-based scaling | No | Yes | No (traffic-based) |
4646
| Schedule-based scaling | No | Yes | No |
4747
| Always-ready instances | No | No | Yes (minimum 1) |
@@ -61,7 +61,7 @@ Here are a few scenarios where you should scale out automatically:
6161

6262
## Enable automatic scaling
6363

64-
The **Maximum burst** setting represents the highest number of instances that your App Service plan can increase to based on incoming HTTP requests. For Premium v2 & v3 plans, you can specify up to 30 instances. The maximum burst number must be equal to or greater than the number of workers specified for the App Service plan.
64+
The **Maximum burst** setting represents the highest number of instances that your App Service plan can increase to based on incoming HTTP requests. For Premium v2, v3, and v4 plans, you can specify up to 30 instances. The maximum burst number must be equal to or greater than the number of workers specified for the App Service plan.
6565

6666
#### [Azure portal](#tab/azure-portal)
6767

articles/azure-functions/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,8 @@
5656
- name: Process real-time events
5757
displayName: Event Hubs, streaming, events
5858
href: scenario-real-time-events-processing.md
59+
- name: Migrate Linux apps to Flex Consumption using Copilot
60+
href: migration/scenario-migrate-linux-consumption-to-flex.md
5961
- name: Developer tools
6062
items:
6163
- name: Azure Developer CLI

0 commit comments

Comments
 (0)