You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/includes/scenario-secure-app-clean-up-resources.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,15 +32,15 @@ This command might take several minutes to run.
32
32
33
33
### Delete the app registration
34
34
35
-
In the [Microsoft Entra admin center](https://entra.microsoft.com), select **Applications** > **App registrations**. Then select the application you created.
35
+
In the [Microsoft Entra admin center](https://entra.microsoft.com), select **App registrations**. Then select the application you created.
36
36
:::image type="content" alt-text="Screenshot that shows selecting app registration." source="../media/scenario-secure-app-clean-up-resources/select-app-registration.png":::
37
37
38
38
In the app registration overview, select **Delete**.
39
39
:::image type="content" alt-text="Screenshot that shows deleting the app registration." source="../media/scenario-secure-app-clean-up-resources/delete-app-registration.png":::
40
40
41
41
### Delete the external tenant
42
42
43
-
If you created a new external tenant, you can [delete it](/entra/external-id/customers/how-to-delete-external-tenant-portal). In to the [Microsoft Entra admin center](https://entra.microsoft.com), browse to **Identity** > **Overview** > **Manage tenants**.
43
+
If you created a new external tenant, you can [delete it](/entra/external-id/customers/how-to-delete-external-tenant-portal). In to the [Microsoft Entra admin center](https://entra.microsoft.com), browse to **Entra ID** > **Overview** > **Manage tenants**.
44
44
45
45
Select the tenant you want to delete, and then select **Delete**.
Copy file name to clipboardExpand all lines: articles/app-service/includes/tutorial-set-up-app-service-authentication/after.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -150,7 +150,7 @@ When you enabled the App Service authentication/authorization module in the prev
150
150
1. To check the settings, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](/entra/identity/role-based-access-control/permissions-reference#application-developer).
151
151
1. If you chose external configuration, use the **Settings** icon in the top menu to switch to the external tenant with your web app from the **Directories** + **subscriptions** menu.
152
152
153
-
1. Browse to **Identity** > **Applications** > **App registrations** and select**Applications** >**App registrations** from the menu.
153
+
1. Browse to **Entra ID** > **App registrations**, and select **App registrations** from the menu.
154
154
1. Select the app registration that was created.
155
155
1. In the overview, verify that **Supported account types** is set to **My organization only**.
Copy file name to clipboardExpand all lines: articles/baremetal-infrastructure/workloads/nc2-on-azure/get-started.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ description: Learn how to sign up, set up, and use Nutanix Cloud Clusters on Azu
6
6
ms.topic: get-started
7
7
ms.subservice: baremetal-nutanix
8
8
ms.custom: engagement-fy23
9
-
ms.date: 7/30/2025
9
+
ms.date: 04/13/2026
10
10
ms.service: azure-baremetal-infrastructure
11
11
# Customer intent: As an IT administrator, I want to sign up for and configure Nutanix Cloud Clusters on Azure, so that I can efficiently manage my cloud infrastructure while ensuring connectivity and compliance with my organization’s requirements.
12
12
---
@@ -19,7 +19,7 @@ Learn how to get started with Nutanix Cloud Clusters (NC2) on Azure. You can als
19
19
20
20
To deploy NC2 on Azure you must have the following:
21
21
22
-
* An **active subscription** which will need to be allowlisted.
22
+
* An **active subscription**.
23
23
* An **Azure account** associated with an active subscription and a **Microsoft Entra ID** with permissions to create an app registration in Microsoft Entra ID with access to the subscription.
24
24
* A **My Nutanix** account.
25
25
* In addition, there are **networking and Azure quota** requirements to consider.
Copy file name to clipboardExpand all lines: articles/container-apps/storage-mounts.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -687,7 +687,7 @@ The sub path can refer to either a folder or a file in the volume.
687
687
688
688
- If the sub path refers to a file, the mount path should refer to a file that doesn't already exist in the container.
689
689
690
-
For example, suppose the sub path is `my-volume-folder/my-volume-file.txt`, and the mount path is `/my-container-folder/my-container-file`. The folder `/my-container-folder` should already exist in the container but shouldn't yet contain the file `my-container-file.txt`.
690
+
For example, suppose the sub path is `my-volume-folder/my-volume-file.txt`, and the mount path is `/my-container-folder/my-container-file.txt`. The folder `/my-container-folder` should already exist in the container but shouldn't yet contain the file `my-container-file.txt`.
@@ -212,13 +212,20 @@ You give others access to view, download, and pay invoices by assigning them the
212
212
213
213
You might need to send your monthly invoice to your accounting team or to another one of your email addresses. You can do so without granting your accounting team or the secondary email access to your billing profile.
214
214
215
-
1. Sign in to the [Azure portal](https://portal.azure.com).
216
-
1. Search for **Cost Management + Billing**.
217
-
1. Select **Invoices** from the left-hand side and then select **Invoice email preference** from the top of the page.
218
-
:::image type="content" border="true" source="./media/download-azure-invoice/mca-billing-profile-select-email-invoice.png" lightbox="./media/download-azure-invoice/mca-billing-profile-select-email-invoice-zoomed.png" alt-text="Screenshot that shows the Email invoice option for invoices.":::
219
-
1. If you have multiple billing profiles, select a billing profile.
215
+
1. Sign in to the [Azure portal](https://portal.azure.com).
216
+
1. Search for **Cost Management + Billing**.
217
+
1. Select **Invoices** from the left-hand side and then select **Invoice email preference** from the top of the page.
218
+
1. If you have multiple billing profiles, select a billing profile.
220
219
1. In the :::no-loc text="additional"::: recipients section, add the email addresses to receive invoices.
221
-
1. Select **Save**.
220
+
1. Select **Save**.
221
+
222
+
## Update the bill-to address or PO number on an invoice
223
+
224
+
1. From the **Invoice list**, select the invoice you want to update.
225
+
226
+
1. On the **Invoice details** page, select **Change bill-to + PO number** from the menu at the top of the page.
227
+
228
+
1. Update the **bill-to address** and/or **PO number**, then regenerate the invoice to apply your changes.
Copy file name to clipboardExpand all lines: articles/frontdoor/front-door-faq.yml
+52-8Lines changed: 52 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -328,34 +328,78 @@ sections:
328
328
- question: |
329
329
What actions should I take to avoid service disruption?
330
330
answer: |
331
-
Microsoft will automatically migrate eligible profiles on a "best effort" basis to Azure Front Door Standard/Premium between April 10, 2026 and April 14, 2026, unless you notify us otherwise. Classic and Azure Front Door Standard/Premium SKUs are charged differently. Please refer to the [pricing page](https://azure.microsoft.com/en-us/pricing/details/frontdoor/?msockid=06fc59dfa84d6e0612124fafa9586f44) for details.
331
+
Microsoft will automatically migrate eligible profiles on a "best effort" basis to Azure Front Door Standard/Premium between April 10 and April 14, 2026, unless you notify us otherwise. Classic and Azure Front Door Standard/Premium SKUs are charged differently. Please refer to the [pricing page](https://azure.microsoft.com/en-us/pricing/details/frontdoor/?msockid=06fc59dfa84d6e0612124fafa9586f44) for details.
332
332
333
333
If you plan to migrate to Azure Front Door Standard/Premium or switch to BYOC yourself, please notify Microsoft by April 9, 2026 by setting the required feature flag, see instructions below.
334
334
335
335
You can check the auto-migration eligibility by following [the migration steps](https://learn.microsoft.com/en-us/azure/frontdoor/migrate-tier). If step 1 Validate compatibility succeeds, your profile is eligible. If you proceed with auto‑migration, monitor your email for final migration confirmation and status updates.
336
336
337
337
**Required action**
338
338
339
-
Azure CDN from Microsoft (classic)
339
+
**Azure CDN from Microsoft (classic)**
340
340
341
341
Before April 9, 2026:
342
342
- [Migrate to Azure Front Door Standard or Premium](https://learn.microsoft.com/en-us/azure/cdn/migrate-tier?toc=%2Fazure%2Ffrontdoor%2Ftoc.json) or [move to Bring Your Own Certificate (BYOC)](https://learn.microsoft.com/en-us/azure/cdn/cdn-custom-ssl?toc=%2Fazure%2Ffrontdoor%2Ftoc.json&tabs=option-1-default-enable-https-with-a-cdn-managed-certificate).
343
343
- If you plan to migrate to Azure Front Door or move to BYOC yourself before April 14, 2026 or want to opt out of auto migration and willing to risk disruption to the HTTPS traffic, you will need to set a Feature Flag by following [instruction provided](https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/preview-features?tabs=azure-portal), and selecting the Feature Flag "Microsoft.Cdn/DoNotAutoMigrateClassicManagedCertificatesProfiles") before April 9, 2026. Doing so will prevent Microsoft from migrating your eligible classic managed certificate profiles to Azure Front Door.
344
344
345
-
Between April 10, 2026 and April 14, 2026:
346
-
- Customers who didn't set the said Feature Flag before April 9, 2026, their profiles will be migrated to Azure Front Door Standard or Premium SKU on a "best effort" basis and should watch for an email related to their migration status.
347
-
- Customers who set the said Feature Flag but are still consuming services with classic SKUs will have until April 14, 2026 to complete migration or move to BYOC.
345
+
Between April 10 and April 14, 2026:
346
+
- Customers who didn't set the said Feature Flag before April 9, 2026, their profiles will be migrated to Azure Front Door Standard or Premium SKU on a "best effort" basis and should watch for an email related to their migration status. You can also check migration status by following steps in the following question.
347
+
- Customers who set the said feature flag but are still consuming services with classic SKUs will have until April 14, 2026 to complete migration or move to BYOC.
348
348
349
-
Azure Front Door (classic)
349
+
**Azure Front Door (classic)**
350
350
351
351
Before April 9, 2026:
352
352
- [Migrate to Azure Front Door Standard or Premium](https://learn.microsoft.com/en-us/azure/frontdoor/tier-migration) or [move to Bring Your Own Certificate (BYOC)](https://learn.microsoft.com/en-us/azure/frontdoor/front-door-custom-domain-https?tabs=powershell).
353
353
354
354
- If you plan to migrate to Azure Front Door or transition to Bring Your Own Certificate (BYOC) before April 14, 2026, or if you choose to opt out of auto migration and accept the risk of HTTPS traffic disruption, you will need to set a feature flag by following the [instruction provided](https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/preview-features?tabs=azure-portal), and selecting the Feature Flag "Microsoft.Cdn/DoNotAutoMigrateClassicManagedCertificatesProfiles" before April 9, 2026. Doing so will prevent Microsoft from migrating your eligible classic managed certificate profiles to Azure Front Door.
355
355
356
-
Between April 10, 2026 and April 14, 2026:
356
+
Between April 10 and April 14, 2026:
357
+
- For customers who do not set the feature flag by April 9, 2026, Microsoft will migrate their profiles to Azure Front Door Standard or Premium SKU on a "best effort" basis. Customers are advised to monitor their email for updates on migration status. You can also check migration status by following steps in the following question.
358
+
- Customers who have set the said Feature Flag but are still consuming services with classic SKUs will have until April 14, 2026 to complete migration or move to BYOC.
357
359
358
-
- For customers who do not set the feature flag by April 9, 2026, Microsoft will migrate their profiles to Azure Front Door Standard or Premium SKU on a "best effort" basis. Customers are advised to monitor their email for updates on migration status. Customers who have set the said Feature Flag but are still consuming services with classic SKUs will have until April 14, 2026 to complete migration or move to BYOC.
360
+
- question: |
361
+
How to check the migration status?
362
+
answer: |
363
+
Between April 10 and April 14, 2026, please check the status of your profile's migration.
364
+
365
+
**Azure CDN from Microsoft (classic):**
366
+
Migration from Azure CDN (classic) is in-place tier upgrade to Azure Front Door Standard tier, using the same profile name.
367
+
- After migration, the profile will appear as Azure Front Door Standard.
368
+
- The original CDN (classic) profile will no longer be visible.
369
+
Follow steps below to check the migration status.
370
+
- Go to the Azure portal and search for Front Doors.
371
+
- Identify the classic CDN profile names. For each profile:
372
+
- If the profile is now on Azure Front Door Standard, the migration is successful. You can confirm by opening the profile and reviewing the configuration details.
373
+
- If the profile is still on Azure CDN (classic), open the profile, select Migration, and review the migration status:
374
+
- No migration step initiated: This classic instance is not eligible for auto-migration.
375
+
- Error at Step 1 Validate compatibility: Resolve the reported errors, then re-run validation and continue the migration. At this state no migration has not been done. You are responsible for completing the migration or moving to BYOC.
376
+
- Status at Step 2 Prepare for migration through Step 5 Migrate: Migration is in progress. Please wait until the migration completes. After step 2 Prepare for migration, the profile will be in a read-only state. Migration only affects control plan and there would not be any impact on traffic during the migration.
377
+
- If migration is complete, the tier will change from CDN Classic to Standard and the profile name will remain the same.
378
+
- After migration, please monitor the domain state in the standard or premium profile and check if you need to revalidate domain ownership for managed certificate renewal.
379
+
- If we are unable to migrate, profile will be rolled back to the original state. If you still wish to use managed certificates without any disruption to HTTPS traffic, you will be responsible for migrating to Azure Front Door or BYOC before 14 April 2026.
380
+
381
+
**Azure Front Door (classic):**
382
+
To validate the migration status, please follow the steps below based on the migration documentation:
383
+
- Sign in to the Azure Portal -> Front Doors, and search for Front Door (Classic).
384
+
- Select your Azure Front Door (Classic) instance and navigate to: Settings → Migration
385
+
- Review the migration status:
386
+
- No migration step initiated: This classic instance is not eligible for auto-migration.
387
+
- Error at Step 1 Validate compatibility: Resolve the reported errors, then re-run validation and continue the migration. At this state no migration has not been done. You are responsible for completing the migration or moving to BYOC.
388
+
- Status at Step 2 Prepare for migration through Step 5 Migrate: Migration is in progress. Please wait until the migration completes. After step 2 Prepare for migration, the profile will be in a read-only state. Migration only affects control plan and there would not be any impact on traffic during the migration.
389
+
- If migration is complete, the tier will change from Azure Front Door Classic to Standard and the new profile name is in the format of [Endpointprefix]-migrated. Learn more in [Azure Front Door (Classic) To Standard/Premium Tier Migration Name convention](https://learn.microsoft.com/en-us/azure/frontdoor/tier-migration#naming-convention-used-for-migration).
390
+
- After migration, please monitor the domain state in the standard or premium profile and check if you need to revalidate domain ownership for managed certificate renewal.
391
+
- If we are unable to migrate, profile will be rolled back to the original state. If you still wish to use managed certificates without any disruption to HTTPS traffic, you will be responsible for migrating to Azure Front Door or BYOC before 14 April 2026.
392
+
393
+
- question: |
394
+
Do I need to take any action to renew my managed certificate after migration?
395
+
answer: |
396
+
In most cases, no action is required. After your profile is migrated, Azure Front Door automatically attempts to rotate your managed certificate if it is within 45 days of expiry.
397
+
- If your domain is CNAME-mapped to Azure Front Door and meets CAA record and domain state requirements, the certificate is auto-rotated. Auto-rotation job runs every 6-8 hours and takes around 24-48 hours to complete. If the autorotation fails, the domain validation state goes to 'Pending validation' and you can revalidate domain ownership to manually trigger validation.
398
+
- If autorotation does not meet the above-mentioned validation requirements, the certificate state changes to Pending revalidation, and you need to revalidate domain ownership.
399
+
400
+
You can manually revalidate domain ownership for renewal by:
401
+
- Adding the required DNS validation record following step 3 for [domains pending validation]:(https://learn.microsoft.com/en-us/azure/frontdoor/standard-premium/how-to-add-custom-domain#add-a-new-custom-domain)
402
+
- Or triggering validation manually using PowerShell or Azure CLI (`RefreshValidation`).
0 commit comments