You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-center/register-discover-mcp-server.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about how Azure API Center can be a centralized registry for
4
4
author: dlepow
5
5
ms.service: azure-api-center
6
6
ms.topic: concept-article
7
-
ms.date: 04/28/2025
7
+
ms.date: 07/22/2025
8
8
ms.author: danlep
9
9
# Customer intent: As an API program manager, I want to register and discover MCP servers as APIs in my API Center inventory.
10
10
ms.custom:
@@ -27,6 +27,9 @@ To register an MCP server in your API center inventory, specify the API type as
27
27
28
28
As described in the following sections, when you register an MCP server, you can specify an environment, deployment, and definition.
29
29
30
+
> [!TIP]
31
+
> If you manage MCP servers in Azure API Management, you can enable automatic synchronization to keep your API center up to date with MCP servers and other APIs from your API Management instance. To learn more, see [Synchronize APIs from Azure API Management instance](synchronize-api-management-apis.md).
Copy file name to clipboardExpand all lines: articles/api-center/synchronize-api-management-apis.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Integrate an API Management instance to Azure API Center for automa
4
4
author: dlepow
5
5
ms.service: azure-api-center
6
6
ms.topic: how-to
7
-
ms.date: 06/25/2025
7
+
ms.date: 07/22/2025
8
8
ms.author: danlep
9
9
ms.custom: devx-track-azurecli
10
10
# Customer intent: As an API program manager, I want to integrate my Azure API Management instance with my API center and synchronize API Management APIs to my inventory.
@@ -23,7 +23,7 @@ Although you can use the Azure CLI to [import](import-api-management-apis.md) AP
23
23
24
24
When you integrate an API Management instance as an API source, the following happens:
25
25
26
-
1. All APIs, and optionally API definitions (specs), from the API Management instance are added to the API center inventory.
26
+
1. All APIs, and optionally API definitions (specs), from the API Management instance are added to the API center inventory. MCP servers in API Management are included in the APIs added to the inventory.
27
27
1. You configure an [environment](key-concepts.md#environment) of type *Azure API Management* in the API center.
28
28
1. An associated [deployment](key-concepts.md#deployment) is created for each synchronized API definition from API Management.
29
29
@@ -106,4 +106,5 @@ The API Management instance is integrated as an environment in your API center.
106
106
107
107
*[Manage API inventory with Azure CLI commands](manage-apis-azure-cli.md)
108
108
*[Import APIs from API Management to your Azure API center](import-api-management-apis.md)
109
+
*[Register and discover MCP servers in your API center](register-discover-mcp-server.md)
109
110
*[Azure API Management documentation](../api-management/index.yml)
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-ssl-policy-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: application gateway
5
5
author: mbender-ms
6
6
ms.service: azure-application-gateway
7
7
ms.topic: concept-article
8
-
ms.date: 03/04/2025
8
+
ms.date: 07/23/2025
9
9
ms.author: mbender
10
10
# Customer intent: As an IT administrator, I want to configure a TLS policy for the Application Gateway, so that I can centralize certificate management and ensure compliance with security standards while optimizing backend performance.
11
11
---
@@ -19,7 +19,7 @@ The TLS policy includes control of the TLS protocol version as well as the ciphe
19
19
## Usage and version details
20
20
21
21
> [!IMPORTANT]
22
-
> Starting **August 31, 2025**, all clients and backend servers interacting with Azure Application Gateway must use Transport Layer Security (TLS) 1.2 or higher, as [support for TLS 1.0 and 1.1 will be discontinued](https://azure.microsoft.com/updates/azure-application-gateway-support-for-tls-10-and-tls-11-will-end-by-31-august-2025).
22
+
> Starting **August 31, 2025**, all clients and backend servers interacting with Azure Application Gateway must use Transport Layer Security (TLS) 1.2 or higher, as [support for TLS 1.0 and 1.1 will be discontinued](https://azure.microsoft.com/updates/azure-application-gateway-support-for-tls-10-and-tls-11-will-end-by-31-august-2025). Visit [TLS 1.0 and 1.1 retirement](application-gateway-tls-version-retirement.md) for more details on deprecating policies and resource configuration changes.
23
23
24
24
- SSL 2.0 and 3.0 are disabled for all application gateways and are not configurable.
25
25
- A custom TLS policy allows you to select any TLS protocol as the minimum protocol version for your gateway: TLSv1_0, TLSv1_1, TLSv1_2, or TLSv1_3.
Copy file name to clipboardExpand all lines: articles/application-gateway/for-containers/migrate-from-agic-to-agc.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: application gateway
5
5
author: mbender-ms
6
6
ms.service: azure-appgw-for-containers
7
7
ms.topic: concept-article
8
-
ms.date: 10/28/2024
8
+
ms.date: 7/22/2025
9
9
ms.author: mbender
10
10
# Customer intent: As a Kubernetes administrator, I want to migrate services from Application Gateway Ingress Controller to Application Gateway for Containers, so that I can leverage improved performance, seamless scaling, and modern API compatibility without experiencing downtime during the transition.
11
11
---
@@ -43,7 +43,6 @@ Prior to migration, it is important to identify any dependencies on Application
43
43
44
44
Such dependencies include:
45
45
46
-
- Web Application Firewall (WAF)
47
46
- Private IP
48
47
- Ports other than 80 and 443
49
48
- Configurable request timeout values
@@ -65,7 +64,7 @@ Here's a summarized list of AGIC annotations and whether Application Gateway for
|[Frontend port other than 80 and 443](migrate-from-agic-to-agc.md#frontend-port-override)| appgw.ingress.kubernetes.io/override-frontend-port | Not supported | Not supported |
67
66
|[Private frontend](migrate-from-agic-to-agc.md#private-frontend)| appgw.ingress.kubernetes.io/use-private-ip | Not supported | Not supported |
68
-
|[WAF](migrate-from-agic-to-agc.md#waf)| appgw.ingress.kubernetes.io/waf-policy-for-path |Not supported| Not supported |
|[Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes)| appgw.ingress.kubernetes.io/health-probe-hostname |[HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy)|[HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy)|
70
69
|[Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes)| appgw.ingress.kubernetes.io/health-probe-port |[HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy)|[HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy)|
71
70
|[Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes)| appgw.ingress.kubernetes.io/health-probe-path |[HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy)|[HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy)|
@@ -298,7 +297,9 @@ AGIC annotation
298
297
299
298
Application Gateway for Containers implementation
300
299
301
-
WAF isn't supported by Application Gateway for Containers.
300
+
#### Web Application Firewall Policy
301
+
302
+
The equivalent is a new WebApplicationFirewallPolicy resource with a reference to a defined resource or resource section. More details can be found in the [Web Application Firewall](web-application-firewall.md) document.
0 commit comments