Skip to content

Commit 384a067

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into migrate-business-case-and-assessment
2 parents 5128986 + 60547c3 commit 384a067

715 files changed

Lines changed: 12017 additions & 7147 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -516,6 +516,11 @@
516516
"redirect_url": "/azure/azure-functions/durable/durable-task-scheduler/durable-task-scheduler-billing",
517517
"redirect_document_id": false
518518
},
519+
{
520+
"source_path": "articles/azure-functions/durable/durable-task-scheduler/quickstart-work-item-filtering-durable-task.md",
521+
"redirect_url": "/azure/durable-task/scheduler/quickstart-work-item-filtering-durable-task",
522+
"redirect_document_id": false
523+
},
519524
{
520525
"source_path": "articles/azure-functions/durable/durable-functions-cloud-backup.md",
521526
"redirect_url": "/azure/azure-functions/durable/durable-functions-fan-in-fan-out",
@@ -531,6 +536,11 @@
531536
"redirect_url": "/azure/azure-functions/durable/durable-functions-human-interaction",
532537
"redirect_document_id": false
533538
},
539+
{
540+
"source_path": "articles/azure-functions/durable/tutorial-durable-text-analysis-azure-files.md",
541+
"redirect_url": "/azure/azure-functions/durable-functions/tutorial-durable-text-analysis-azure-files",
542+
"redirect_document_id": false
543+
},
534544
{
535545
"source_path": "articles/expressroute/expressroute-troubleshooting-arp-resource-manager.md",
536546
"redirect_url": "/troubleshoot/azure/expressroute/expressroute-troubleshooting-arp-resource-manager",
@@ -7572,6 +7582,6 @@
75727582
"source_path": "articles/certification/edge-secured-core-get-certified.md",
75737583
"redirect_url": "/azure/certification/requirements-edge-secured-core",
75747584
"redirect_document_id": false
7575-
},
7585+
}
75767586
]
75777587
}
3.95 KB
Loading
15.2 KB
Loading
-41.9 KB
Loading

articles/api-center/register-discover-mcp-server.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about how Azure API Center can be a centralized registry for
44

55
ms.service: azure-api-center
66
ms.topic: concept-article
7-
ms.date: 02/20/2026
7+
ms.date: 04/02/2026
88

99
ms.collection: ce-skilling-ai-copilot
1010
ms.update-cycle: 180-days
@@ -126,6 +126,7 @@ To build MCP servers by using Azure compute services and register them in your A
126126
Set up your [API Center portal](set-up-api-center-portal.md) so that developers and other stakeholders in your organization can discover MCP servers in your API inventory. From the API Center portal, users can do the following:
127127
- Browse and filter MCP servers in the inventory.
128128
- For remote MCP servers, view details such as the URL endpoint of the MCP server and API definition, and install the MCP server in their Visual Studio Code environment.
129+
- A built-in MCP Inspector tool allows users to test MCP server endpoints and view the responses directly in the portal. On the **Options** tab of an MCP server details page, select **View documentation** to access the MCP Inspector.
129130

130131
:::image type="content" source="media/register-discover-mcp-server/mcp-server-portal-small.png" lightbox="media/register-discover-mcp-server/mcp-server-portal.png" alt-text="Screenshot of MCP server in API Center portal.":::
131132

articles/api-center/set-up-api-center-portal.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: How to set up the API Center portal, a managed website that enables
44

55
ms.service: azure-api-center
66
ms.topic: how-to
7-
ms.date: 02/25/2026
7+
ms.date: 04/02/2026
88
ms.update-cycle: 180-days
99

1010
ms.custom:
@@ -19,7 +19,7 @@ This article shows you how to set up and customize the *API Center portal* (prev
1919
The API Center portal supports and streamlines the work of developers who use and create APIs within your organization. Users with access can:
2020

2121
* **Search for APIs** by name or use AI-assisted semantic search.
22-
* **Filter APIs** by type or lifecycle stage.
22+
* **Filter APIs** by type, lifecycle stage, and other properties.
2323
* **View API details and definitions** including endpoints, methods, parameters, and response formats.
2424
* **Download API definitions** to their computer or open in Visual Studio Code.
2525
* **Try out APIs** with API key or OAuth 2.0 authentication.
@@ -66,6 +66,9 @@ After configuring access, open the API Center portal by selecting **View API Cen
6666

6767
By default, the portal home page is publicly reachable. If Microsoft Entra ID is configured for access, users must select **Sign-in** to access APIs. See [Enable sign-in to portal by Microsoft Entra users and groups](#enable-sign-in) for details on configuring user access.
6868

69+
* Add filters on the home page to display assets of certain types or that match certain metadata values.
70+
* Select an API or other registered asset to view its details, such as endpoints, methods, parameters, and response formats. You can also download API definitions or open them in Visual Studio Code.
71+
6972
<a id="enable-sign-in"></a>
7073
## Enable sign-in to portal by Microsoft Entra users and groups
7174

articles/api-management/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -745,7 +745,7 @@
745745
href: breaking-changes/git-configuration-retirement-march-2025.md
746746
- name: Direct management API retirement (March 2025)
747747
href: breaking-changes/direct-management-api-retirement-march-2025.md
748-
- name: Managed certificates suspension (August 2025 - March 2026)
748+
- name: Managed certificates suspension (August 2025 - June 2026)
749749
href: breaking-changes/managed-certificates-suspension-august-2025.md
750750
- name: ADAL-based identity provider retirement (September 2025)
751751
href: breaking-changes/identity-provider-adal-retirement-sep-2025.md

articles/api-management/api-management-capacity.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,8 @@ Use capacity metrics for making decisions whether to scale an API Management ins
170170
+ Ignore sudden spikes that are most likely not related to an increase in load (see [Capacity metric behavior](#capacity-metric-behavior) section for explanation).
171171
+ As a general rule, upgrade or scale your instance when a capacity metric value exceeds **60% - 70%** for a long period of time (for example, 30 minutes). Different values may work better for your service or scenario.
172172
+ If your instance or workspace gateway is configured with only 1 unit, upgrade or scale it when a capacity metric value exceeds **40%** for a long period. This recommendation is based on the need to reserve capacity for guest OS updates in the underlying service platform.
173-
+ Use [available diagnostics](monitor-api-management.md) to monitor the response times of API calls. Consider adjusting scaling thresholds if you notice degraded response times with increasing value of capacity metric.
173+
+ Use [available diagnostics](monitor-api-management.md) to monitor the response times of API calls. Consider adjusting scaling thresholds if you notice degraded response times with increasing value of capacity metric.
174+
+ For classic tiers, discard the most recent 1‑minute data point when reading raw Azure API Management capacity metrics because the derived value can be invalid if source data isn’t available at aggregation time; do not base operational or scaling decisions on 1‑minute values — for autoscaling use average aggregation windows of 30 minutes or longer, evaluate sustained conditions before scaling, and annotate dashboards to exclude the final 1‑minute point so trends reflect reliable data.
174175

175176
> [!TIP]
176177
> If you are able to estimate your traffic beforehand, test your API Management instance or workspace gateway on workloads you expect. You can increase the request load gradually and monitor the value of the capacity metric that corresponds to your peak load. Follow the steps from the previous section to use Azure portal to understand how much capacity is used at any given time.

articles/api-management/azure-openai-token-limit-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.collection: ce-skilling-ai-copilot
99
ms.custom:
1010
- build-2024
1111
ms.topic: reference
12-
ms.date: 11/10/2025
12+
ms.date: 04/01/2026
1313
ms.update-cycle: 180-days
1414
ms.author: danlep
1515
---
@@ -49,8 +49,8 @@ By relying on token usage metrics returned from the Azure OpenAI endpoint, the p
4949
| -------------- | ----------------------------------------------------------------------------------------------------- | -------- | ------- |
5050
| counter-key | The key to use for the token limit policy. For each key value, a single counter is used for all scopes at which the policy is configured. Policy expressions are allowed.| Yes | N/A |
5151
| tokens-per-minute | The maximum number of tokens consumed by prompt and completion per minute. | Either a rate limit (`tokens-per-minute`), a quota (`token-quota` over a `token-quota-period`), or both must be specified. | N/A |
52-
| token-quota | The maximum number of tokens allowed during the time interval specified in the `token-quota-period`. Policy expressions aren't allowed. | Either a rate limit (`tokens-per-minute`), a quota (`token-quota` over a `token-quota-period`), or both must be specified. | N/A |
53-
| token-quota-period | The length of the fixed window after which the `token-quota` resets. The value must be one of the following: `Hourly`,`Daily`, `Weekly`, `Monthly`, `Yearly`. The start time of a quota period is calculated using the UTC timestamp truncated to the unit (hour, day, etc.) used for the period. | Either a rate limit (`tokens-per-minute`), a quota (`token-quota` over a `token-quota-period`), or both must be specified. | N/A |
52+
| token-quota | The maximum number of tokens allowed during the time interval specified in the `token-quota-period`. Policy expressions are allowed. | Either a rate limit (`tokens-per-minute`), a quota (`token-quota` over a `token-quota-period`), or both must be specified. | N/A |
53+
| token-quota-period | The length of the fixed window after which the `token-quota` resets. The value must be one of the following: `Hourly`,`Daily`, `Weekly`, `Monthly`, `Yearly`. The start time of a quota period is calculated using the UTC timestamp truncated to the unit (hour, day, etc.) used for the period. Policy expressions are allowed. | Either a rate limit (`tokens-per-minute`), a quota (`token-quota` over a `token-quota-period`), or both must be specified. | N/A |
5454
| estimate-prompt-tokens | Boolean value that determines whether to estimate the number of tokens required for a prompt: <br> - `true`: estimate the number of tokens based on prompt schema in API; may reduce performance. <br> - `false`: don't estimate prompt tokens. <br><br>When set to `false`, the remaining tokens per `counter-key` are calculated using the actual token usage from the response of the model. This could result in prompts being sent to the model that exceed the token limit. In such case, this will be detected in the response, and all succeeding requests will be blocked by the policy until the token limit resets. | Yes | N/A |
5555
| retry-after-header-name | The name of a custom response header whose value is the recommended retry interval in seconds after the specified `tokens-per-minute` or `token-quota` is exceeded. Policy expressions aren't allowed. | No | `Retry-After` |
5656
| retry-after-variable-name | The name of a variable that stores the recommended retry interval in seconds after the specified `tokens-per-minute` or `token-quota` is exceeded. Policy expressions aren't allowed. | No | N/A |

articles/api-management/breaking-changes/managed-certificates-suspension-august-2025.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,31 @@
11
---
22
title: Azure API Management - Managed certificates suspension for custom domains (August 2025)
3-
description: Azure API Management is temporarily suspending creation of managed certificates for custom domains from August 15, 2025 to March 15, 2026 due to industry-wide changes in domain validation.
3+
description: Azure API Management is temporarily suspending creation of managed certificates for custom domains from August 15, 2025 to June 30, 2026 due to industry-wide changes in domain validation.
44
services: api-management
55
author: dlepow
66
ms.service: azure-api-management
77
ms.topic: reference
88
ai-usage: ai-assisted
9-
ms.date: 02/06/2026
9+
ms.date: 04/03/2026
1010
ms.author: danlep
1111
---
1212

13-
# Creation of managed certificates temporarily suspended for custom domains (August 2025 - March 2026)
13+
# Creation of managed certificates temporarily suspended for custom domains (August 2025 - June 2026)
1414

1515
[!INCLUDE [premium-dev-standard-basic.md](../../../includes/api-management-availability-premium-dev-standard-basic.md)]
1616

17-
Creation of Azure-managed certificates for custom domains in API Management will be temporarily turned off from August 15, 2025 to March 15, 2026. Existing managed certificates will be autorenewed as long as your API Management service allows inbound traffic from DigiCert IP addresses on port 80 and DNS is properly configured.
17+
> [!IMPORTANT]
18+
> The suspension period for managed certificates was recently extended to June 30, 2026.
19+
20+
Creation of Azure-managed certificates for custom domains in API Management will be temporarily turned off from August 15, 2025 to June 30, 2026. Existing managed certificates will be autorenewed as long as your API Management service allows inbound traffic from DigiCert IP addresses on port 80 and DNS is properly configured.
1821

1922
In the classic service tiers, Azure API Management offers [free, managed TLS certificates for custom domains](../configure-custom-domain.md#domain-certificate-options) (preview), allowing customers to secure their endpoints without purchasing and managing their own certificates. Because of an industry-wide deprecation of CNAME-based Domain Control Validation (DCV), our Certificate Authority (CA), DigiCert, is moving to a new open-source software (OSS) domain control validation (DCV) platform that provides transparency and accountability increasing the trustworthiness of domain validation. As part of this transition, DigiCert will deprecate support for the legacy CNAME Delegation DCV workflow. This migration requires us to temporarily suspend the creation of managed certificates for custom domains.
2023

2124
Note that this does not impact the standard CNAME DCV workflow (where DigiCert validates a random value in the CNAME record) which is still supported in the OSS validation system. This change affects several Azure services that currently rely on the soon-to-be deprecated CNAME for automated certificate issuance and renewal.
2225

2326
## Is my service affected by this?
2427

25-
You're affected if you plan to create new managed certificates for custom domains in Azure API Management between August 15, 2025 and March 15, 2026.
28+
You're affected if you plan to create new managed certificates for custom domains in Azure API Management between August 15, 2025 and June 30, 2026.
2629

2730
As part of this change, starting January 2026, for Azure API Management to be able to renew (rotate) your existing managed certificate, inbound access is required on port 80 to allow [specific DigiCert IP addresses](https://knowledge.digicert.com/alerts/ip-address-domain-validation?utm_medium=organic&utm_source=docs-digicert&referrer=https://docs.digicert.com/en/certcentral/manage-certificates/domain-control-validation-methods/automatic-domain-control-validation-check.html).
2831

@@ -32,7 +35,7 @@ The suspension of managed certificates for custom domains will be enforced from
3235

3336
## What do I need to do?
3437

35-
If you need to add new managed certificates, plan to do so before August 15, 2025 or after March 15, 2026. During the suspension period, you can still configure custom domains with certificates you manage from other sources.
38+
If you need to add new managed certificates, plan to do so before August 15, 2025 or after June 30, 2026. During the suspension period, you can still configure custom domains with certificates you manage from other sources.
3639

3740
If you already have managed certificates for your custom domains, do the following to ensure continued access:
3841

0 commit comments

Comments
 (0)