Skip to content

Commit 395e18c

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into afd-limit
2 parents 01a28a5 + 50ae576 commit 395e18c

800 files changed

Lines changed: 13685 additions & 7419 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

articles/active-directory-b2c/add-password-change-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,12 +26,12 @@ ms.custom: sfi-image-nochange
2626

2727
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2828

29-
You can configure Azure Active Directory B2C (Azure AD B2C) so that a user who is signed in with a local account can change their password without using email verification to prove their identity.
29+
You can configure Azure Active Directory B2C (Azure AD B2C) to allow users who are signed in with a local account to change their password without using email verification to prove their identity.
3030

3131
The password change flow involves the following steps:
3232

3333
1. The user signs in to their local account. If the session is still active, Azure AD B2C authorizes the user and skips to the next step.
34-
1. In **Old password**, the user verifies their old password. In **New password**, they create and confirm their new password.
34+
1. In **Old password**, the user verifies their current password. In **New password**, they create and confirm their new password.
3535

3636
![Screenshot that shows two numbered dialogs for making a password change.](./media/add-password-change-policy/password-change-flow.png)
3737

articles/active-directory-b2c/add-profile-editing-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ If you haven't already done so, [register a web application in Azure Active Dire
4444

4545
## Create a profile editing user flow
4646

47-
If you want to enable users to edit their profile in your application, you use a profile editing user flow.
47+
To enable users to edit their profile in your application, use a profile editing user flow.
4848

4949
1. In the menu of the Azure AD B2C tenant overview page, select **User flows**, and then select **New user flow**.
5050
1. On the **Create a user flow** page, select the **Profile editing** user flow.

articles/api-center/agent-to-agent-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Azure API Center provides a centralized platform for discovering, registering, a
2525

2626
**Governance and Security**: Addresses shadow IT and uncontrolled AI tool adoption by providing a governed channel for accessing AI agents, improving security and compliance.
2727

28-
**Integration with API Management**: AI agents can be placed behind an API Management gateway for private endpoints, enhanced security, and controlled access.
28+
**Integration with API Management**: AI agents can be placed behind an API Management gateway for private endpoints, enhanced security, and controlled access. A2A agent APIs in a linked API Management instance synchronize automatically to API Center.
2929

3030
**Customizable Metadata**: Organizations can define and store relevant metadata for each registered AI agent, facilitating filtering and searching.
3131

articles/api-center/synchronize-api-management-apis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Although you can use the Azure CLI to [import](import-api-management-apis.md) AP
2525

2626
When you integrate an API Management instance as an API source, the following happens:
2727

28-
1. All APIs, and optionally API definitions (specs), from the API Management instance are added to the API center inventory. MCP servers in API Management are included in the APIs added to the inventory.
28+
1. All APIs, and optionally API definitions (specs), from the API Management instance are added to the API center inventory. MCP servers and A2A agent APIs in API Management are included in the APIs added to the inventory.
2929
1. You configure an [environment](key-concepts.md#environment) of type *Azure API Management* in the API center.
3030
1. An associated [deployment](key-concepts.md#deployment) is created for each synchronized API definition from API Management.
3131

articles/api-management/api-management-howto-use-managed-service-identity.md

Lines changed: 30 additions & 31 deletions
Large diffs are not rendered by default.

articles/api-management/private-endpoint.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: azure-api-management
55
author: dlepow
66
ms.author: danlep
77
ms.topic: how-to
8-
ms.date: 11/17/2025
8+
ms.date: 03/17/2026
99
ms.custom:
1010
- build-2025
1111
- sfi-image-nochange
@@ -32,7 +32,9 @@ You can configure an inbound [private endpoint](../private-link/private-endpoint
3232
* Only the API Management instance's **Gateway endpoint** supports inbound Private Link connections.
3333
* Each API Management instance supports at most 100 Private Link connections.
3434
* Connections aren't supported on the [self-hosted gateway](self-hosted-gateway-overview.md) or on a [workspace gateway](workspaces-overview.md#workspace-gateway).
35-
* In the classic API Management tiers, private endpoints aren't supported in instances injected in an internal or external virtual network.
35+
* In the classic API Management tiers, private endpoints aren't supported in instances injected in an internal or external virtual network.
36+
> [!NOTE]
37+
> In the Standard v2 and Premium v2 tiers, private endpoints are supported in instances with any supported virtual network configuration when fronted with [Azure Front Door Premium](../frontdoor/standard-premium/how-to-enable-private-link-apim.md).
3638
3739
## Typical scenarios
3840

@@ -43,9 +45,6 @@ Supported configurations include:
4345
* Pass client requests through a firewall and configure rules to route requests privately to the API Management gateway.
4446
* Configure Azure Front Door (or Azure Front Door with Azure Application Gateway) to receive external traffic and then route traffic privately to the API Management gateway. For example, see [Connect Azure Front Door Premium to an Azure API Management with Private Link](../frontdoor/standard-premium/how-to-enable-private-link-apim.md).
4547

46-
> [!NOTE]
47-
> Currently, routing traffic privately from Azure Front Door to an API Management Premium v2 instance isn't supported.
48-
4948
## Prerequisites
5049

5150
- An existing API Management instance. [Create one if you haven't already](get-started-create-service-instance.md).

articles/app-service/app-service-plan-manage.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.assetid: 4859d0d5-3e3c-40cc-96eb-f318b2c51a3d
66
ms.topic: how-to
77
ms.author: msangapu
88
author: msangapu-msft
9-
ms.date: 11/17/2025
9+
ms.date: 03/19/2026
1010
ms.update-cycle: 1095-days
1111
ms.custom: "UpdateFrequency3"
1212

@@ -102,6 +102,19 @@ When creating or manually scaling out an App Service Plan you may experience sit
102102

103103
The preview of App Service Plan Asynchronous enables you to request your target number of instances and the platform scales out to the target number, without you having to modify your original request and retrying. The platform scales to the number of available instances and then triggers the underlying platform to make more instances available. You can make use of this functionality during scale-out operations or at plan creation time. This functionality is supported for all Basic, Standard, and Premium pricing plans.
104104

105+
> [!NOTE]
106+
> This behavior is NOT configurable for App Service Plans created in App Service Environments. App Service Environments create and scale App Service Plans asynchronously by default.
107+
108+
### Scaling up or down App Service Plan SKUs
109+
110+
When using asynchronous scaling, it's possible to scale up or down to a larger or smaller SKU. During this type of operation, no other properties of the App Service Plan can be changed. Scaling up or down to a new SKU may fail if there aren't enough App Service Plan instances available to fully satisfy the request, this is to prevent your App Service Plan having fewer workers than requested.
111+
112+
If a scale up or down operation fails, you can either scale in or out within the current SKU or perform the operation with the minim number of acceptable workers and then scale out asynchronously to the desired target.
113+
114+
### Cancelling an asynchronous scaling operation
115+
116+
An in-progress asynchronous scale operation is canceled only when you explicitly change the TargetWorkerCount property. Changes to other App Service Plan properties don't cancel the operation, including changes to the SKU, or App Service Plan instance count. App Service Plan instance count changes that can't be completed synchronously are ignored unless the TargetWorkerCount is also changed. To explicitly cancel the scale operation, set the TargetWorkerCount to 0.
117+
105118
### [Scale-out (CLI)](#tab/asyncscaleout)
106119
```azurecli-interactive
107120
az appservice plan update -g <resourceGroupName> -n <App Service Plan Name> --async-scaling-enabled true --number-of-workers <number of workers to scale out to>
@@ -111,7 +124,6 @@ az appservice plan update -g <resourceGroupName> -n <App Service Plan Name> --as
111124
```azurecli-interactive
112125
az appservice plan create -g asyncasp -n asyncasplinuxexample --number-of-workers 25 --sku p1v3 --async-scaling-enabled true --location northeurope
113126
```
114-
115127
---
116128

117129
<a name="delete"></a>

0 commit comments

Comments
 (0)