Skip to content

Commit 3b2d9de

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ARSeffectiveroutes
2 parents 2288578 + 9abeb8f commit 3b2d9de

1,160 files changed

Lines changed: 12314 additions & 11354 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 110 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,115 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/extended-zones/arc-enabled-workloads-postgre-sql.md",
5+
"redirect_url": "/azure/extended-zones/overview",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/avere-vfxt/avere-vfxt-add-storage.md",
10+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-add-storage",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/avere-vfxt/avere-vfxt-additional-resources.md",
15+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-additional-resources",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/avere-vfxt/avere-vfxt-cluster-gui.md",
20+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-cluster-gui",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/avere-vfxt/avere-vfxt-configure-dns.md",
25+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-configure-dns",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/avere-vfxt/avere-vfxt-data-ingest.md",
30+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-data-ingest",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "articles/avere-vfxt/avere-vfxt-demo-links.md",
35+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-demo-links",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "articles/avere-vfxt/avere-vfxt-deploy-overview.md",
40+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-deploy-overview",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path": "articles/avere-vfxt/avere-vfxt-deploy-plan.md",
45+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-deploy-plan",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path": "articles/avere-vfxt/avere-vfxt-deploy.md",
50+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-deploy",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "articles/avere-vfxt/avere-vfxt-enable-support.md",
55+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-enable-support",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "articles/avere-vfxt/avere-vfxt-faq.yml",
60+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-faq",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path": "articles/avere-vfxt/avere-vfxt-manage-cluster.md",
65+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-manage-cluster",
66+
"redirect_document_id": false
67+
},
68+
{
69+
"source_path": "articles/avere-vfxt/avere-vfxt-mount-clients.md",
70+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-mount-clients",
71+
"redirect_document_id": false
72+
},
73+
{
74+
"source_path": "articles/avere-vfxt/avere-vfxt-non-owner.md",
75+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-non-owner",
76+
"redirect_document_id": false
77+
},
78+
{
79+
"source_path": "articles/avere-vfxt/avere-vfxt-open-ticket.md",
80+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-open-ticket",
81+
"redirect_document_id": false
82+
},
83+
{
84+
"source_path": "articles/avere-vfxt/avere-vfxt-overview.md",
85+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-overview",
86+
"redirect_document_id": false
87+
},
88+
{
89+
"source_path": "articles/avere-vfxt/avere-vfxt-prereqs.md",
90+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-prereqs",
91+
"redirect_document_id": false
92+
},
93+
{
94+
"source_path": "articles/avere-vfxt/avere-vfxt-tuning.md",
95+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-tuning",
96+
"redirect_document_id": false
97+
},
98+
{
99+
"source_path": "articles/avere-vfxt/avere-vfxt-whitepapers.md",
100+
"redirect_url": "/previous-versions/azure/avere-vfxt/avere-vfxt-whitepapers",
101+
"redirect_document_id": false
102+
},
103+
{
104+
"source_path": "articles/avere-vfxt/disaster-recovery.md",
105+
"redirect_url": "/previous-versions/azure/avere-vfxt/disaster-recovery",
106+
"redirect_document_id": false
107+
},
108+
{
109+
"source_path": "articles/avere-vfxt/index.yml",
110+
"redirect_url": "/previous-versions/azure/avere-vfxt/index",
111+
"redirect_document_id": false
112+
},
3113
{
4114
"source_path": "articles/azure-health-insights/configure-containers.md",
5115
"redirect_url": "/previous-versions/azure/azure-health-insights/configure-containers",

articles/active-directory-b2c/partner-onfido.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ REST API settings:
113113
#### Upload your files
114114

115115
1. Store the UI folder files in your blob container.
116-
2. [Use Azure Storage Explorer to manage Azure managed disks](/azure/virtual-machines/disks-use-storage-explorer-managed-disks) and access permissions.
116+
2. [Use Azure Storage Explorer to manage Azure Managed Disks](/azure/virtual-machines/disks-use-storage-explorer-managed-disks) and access permissions.
117117

118118
### Configure Azure AD B2C
119119

articles/api-center/TOC.yml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -86,10 +86,8 @@
8686
href: set-up-notification-workflow.md
8787
- name: API discovery and consumption
8888
items:
89-
- name: Enable API Center portal
89+
- name: Enable and customize API Center portal
9090
href: set-up-api-center-portal.md
91-
- name: Customize API Center portal
92-
href: customize-api-center-portal.md
9391
- name: Enable API Center portal view - VS Code extension
9492
href: enable-api-center-portal-vs-code-extension.md
9593
- name: Self-host Azure API Center portal

articles/api-center/agent-to-agent-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: "Overview of the agent registry for discovering, registering, and m
55

66
ms.service: azure-api-center
77
ms.topic: overview
8-
ms.date: 11/03/2025
8+
ms.date: 02/24/2026
99
ms.update-cycle: 180-days
1010
ms.collection: ce-skilling-ai-copilot
1111

@@ -31,7 +31,7 @@ Azure API Center provides a centralized platform for discovering, registering, a
3131

3232
## Register an AI agent
3333

34-
You can register AI agents in API Center similar to how you register other APIs. During registration, specify the API type as **A2A** and fill in details for **Agent Card**, **Agent Skills**, and **Agent Capabilities**.
34+
You can register AI agents in API Center similar to how you register other assets such as APIs and MCP servers. During registration, fill in details for **Agent Card**, **Agent Skills**, and **Agent Capabilities**.
3535

3636
For detailed steps, see [Register agent](register-manage-agents.md#register-agent).
3737

articles/api-center/authorize-api-access.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure access to APIs in the Azure API Center inven
44

55
ms.service: azure-api-center
66
ms.topic: how-to
7-
ms.date: 06/02/2025
7+
ms.date: 02/24/2026
88

99
ms.custom:
1010
# Customer intent: As an API program manager, I want to store API authorization information in my API center and enable authorized users to test APIs in the API Center portal.
@@ -50,8 +50,8 @@ To manage the API key securely, store it in Azure Key Vault, and access the key
5050

5151
### 2. Add API key configuration in your API center
5252

53-
1. In the [portal](https://azure.microsoft.com), navigate to your API center.
54-
1. In the left menu, under **Governance**, select **Authorization (preview)** > **+ Add configuration**.
53+
1. In the [portal](https://azure.microsoft.com), go to your API center.
54+
1. In the sidebar menu, under **Governance**, select **Authorization (preview)** > **+ Add configuration**.
5555
1. In the **Add configuration** page, set the values as follows:
5656
:::image type="content" source="media/authorize-api-access/configure-api-key.png" alt-text="Screenshot of configuring an API key in the portal.":::
5757

@@ -140,7 +140,7 @@ To manage the secret securely, store it in Azure Key Vault, and access the key v
140140
After configuring settings for an API key or an OAuth 2.0 flow, add the API key or OAuth 2.0 configuration to an API version in your API center.
141141

142142
1. In the [portal](https://azure.microsoft.com), navigate to your API center.
143-
1. In the left menu, under **Assets**, select **APIs**.
143+
1. In the left menu, under **Inventory**, select **Assets**.
144144
1. Select an API that you want to associate the authorization configuration with.
145145
1. In the left menu, under **Details**, select **Versions**.
146146
1. Select the API version that you want to add the authentication configuration to.
@@ -168,8 +168,7 @@ You can manage access by specific users or groups in your organization to an API
168168
> [!TIP]
169169
> You can also remove users or groups from the access policy. In the **Manage access** page, select **Delete** in the context (...) menu for the user or group.
170170
171-
## Test API in API Center portal
172-
171+
## Test the API in API Center portal
173172

174173
You can use the API Center portal to test an API that you configured for authentication and user access.
175174

articles/api-center/customize-api-center-portal.md

Lines changed: 0 additions & 89 deletions
This file was deleted.

articles/api-center/includes/api-center-portal-app-registration.md

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,31 +6,34 @@ services: api-center
66

77
ms.service: azure-api-center
88
ms.topic: include
9-
ms.date: 08/08/2025
9+
ms.date: 02/25/2026
1010

1111
ms.custom: Include file
1212
---
1313

14-
First configure an app registration in your Microsoft Entra ID tenant. The app registration enables the API Center portal to access data from your API center on behalf of a signed-in user.
14+
To configure Microsoft Entra ID as an identity provider, first configure an app registration in your Microsoft Entra ID tenant. The app registration enables the API Center portal to access data from your API center on behalf of a signed-in user.
1515

1616
API Center can set up the app registration automatically, or you can create the app registration manually.
1717

18-
#### Set up the app registration automatically
18+
#### Set up the app registration automatically (recommended)
1919

2020
To set up the app registration automatically, follow these steps:
2121

22-
1. In the [Azure portal](https://portal.azure.com), navigate to your API center.
23-
1. In the left-hand menu, select **API Center portal** > **Settings**.
24-
1. On the **Identity provider** tab, select **Start set up**.
25-
1. On the **Quick setup** tab, select **Save + publish**.
22+
1. In the [Azure portal](https://portal.azure.com), go to your API center.
23+
1. In the sidebar menu, select **API Center portal** > **Settings**.
24+
1. On the **Access** tab, select **Configure Entra ID**.
25+
:::image type="content" source="../media/set-up-api-center-portal/configure-access-entra-id.png" alt-text="Screenshot showing configuration of Entra ID in the portal.":::
26+
27+
1. On the **Set up user sign-in with Microsoft Entra ID** page, select **Configure**.
28+
1. On the **Access** tab, select **Save + publish**.
2629

2730
If you need to access the app registration later, you can find it in the portal under **App registrations**. The application is named with the following format: **\<api-center-name>-apic-aad**.
2831

2932
#### Set up the app registration manually
3033

3134
If you want to create the app registration manually, follow these steps:
3235

33-
1. In the [Azure portal](https://portal.azure.com), navigate to **Microsoft Entra ID** > **Manage** > **App registrations**.
36+
1. In the [Azure portal](https://portal.azure.com), go to **Microsoft Entra ID** > **Manage** > **App registrations**.
3437
1. Select **+ New registration**.
3538
1. On the **Register an application** page, set the values as follows:
3639

articles/api-center/includes/api-center-portal-prerequisites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: api-center
66

77
ms.service: azure-api-center
88
ms.topic: include
9-
ms.date: 03/04/2025
9+
ms.date: 02/25/2026
1010

1111
ms.custom: Include file
1212
---

articles/api-center/includes/api-center-portal-user-sign-in.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,20 +6,21 @@ services: api-center
66

77
ms.service: azure-api-center
88
ms.topic: include
9-
ms.date: 08/05/2025
9+
ms.date: 02/25/2026
1010

1111
ms.custom: Include file
1212
---
1313

14-
To enable sign-in to the API Center portal to access APIs, assign the **Azure API Center Data Reader** role to users or groups in your organization, scoped to your API center.
14+
When Microsoft Entra ID is configured for portal access, users must sign in to the API Center portal to access APIs. To enable sign-in, assign the **Azure API Center Data Reader** role to users or groups in your organization, scoped to your API center.
1515

16-
> [!IMPORTANT]
17-
> By default, you and other administrators of the API center must sign-in to access APIs in the API Center portal. Be sure to assign the **Azure API Center Data Reader** role to yourself and other administrators.
16+
> [!NOTE]
17+
> * When the Microsoft Entra ID app registration is set up automatically, the user who configures the portal is automatically assigned the **Azure API Center Data Reader** role.
18+
> * Be sure to assign the **Azure API Center Data Reader** role to other administrators of the API center.
1819
1920
For detailed prerequisites and steps to assign a role to users and groups, see [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal). Brief steps follow:
2021

21-
1. In the [Azure portal](https://portal.azure.com), navigate to your API center.
22-
1. In the left menu, select **Access control (IAM)** > **+ Add role assignment**.
22+
1. In the [Azure portal](https://portal.azure.com), go to your API center.
23+
1. In the sidebar menu, select **Access control (IAM)** > **+ Add role assignment**.
2324
1. In the **Add role assignment** pane, set the values as follows:
2425
1. On the **Role** page, search for and select **Azure API Center Data Reader**. Select **Next**.
2526
1. On the **Members** page, In **Assign access to**, select **User, group, or service principal** > **+ Select members**.
@@ -29,7 +30,7 @@ For detailed prerequisites and steps to assign a role to users and groups, see [
2930
> [!NOTE]
3031
> To streamline access configuration for new users, we recommend that you assign the role to a Microsoft Entra group and configure a dynamic group membership rule. To learn more, see [Create or update a dynamic group in Microsoft Entra ID](/entra/identity/users/groups-create-rule).
3132
32-
After you configure access to the portal, configured users can sign in to the portal and view the APIs in your API center.
33+
After you configure access to the portal, users can sign in to the portal and view the APIs in your API center.
3334

3435
> [!NOTE]
3536
> The first user to sign in to the portal is prompted to consent to the permissions requested by the API Center portal app registration. Thereafter, other configured users aren't prompted to consent.

0 commit comments

Comments
 (0)