Skip to content

Commit 56bd148

Browse files
Merge pull request #311851 from MicrosoftDocs/main
Auto Publish – main to live - 2026-02-16 12:00 UTC
2 parents 2348776 + 32be8f2 commit 56bd148

19 files changed

Lines changed: 117 additions & 42 deletions

articles/application-gateway/ssl-overview.md

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: mbender-ms
66
ms.service: azure-application-gateway
77
ms.topic: concept-article
8-
ms.date: 10/09/2025
8+
ms.date: 02/16/2026
99
ms.author: mbender
1010

1111
# Customer intent: "As a cloud architect, I want to configure end to end TLS on the application gateway, so that I can ensure secure communication and compliance for sensitive data transmitted between clients and backend servers."
@@ -125,10 +125,22 @@ The following tables outline the differences in SNI between the v1 and v2 SKU in
125125
| --- | --- | --- |
126126
| If the client specifies SNI header and all the multi-site listeners are enabled with "Require SNI" flag | Returns the appropriate certificate and if the site doesn't exist (according to the server_name), then the connection is reset. | Returns appropriate certificate if available, otherwise, returns the certificate of the first HTTPS listener according to the order specified by the request routing rules associated with the HTTPS listeners|
127127
| If the client doesn't specify a SNI header and if all the multi-site headers are enabled with "Require SNI" | Resets the connection | Returns the certificate of the first HTTPS listener according to the order specified by the request routing rules associated with the HTTPS listeners
128-
| If the client doesn't specify SNI header and if there's a basic listener configured with a certificate | Returns the certificate configured in the basic listener to the client (default or fallback certificate) | Returns the certificate configured in the basic listener |
128+
| If the client doesn't specify SNI header and if there's a basic listener configured with a certificate | Returns the certificate configured in the basic listener to the client (default or fallback certificate) | Returns the certificate of the HTTPS listener with the highest priority routing rule. The basic listener certificate is **not** used as a fallback. |
129+
130+
> [!IMPORTANT]
131+
> **V2 SKU default certificate behavior:** When a client connects without an SNI header (for example, using an IP address), Application Gateway V2 does **not** fall back to a basic listener's certificate. Instead, it always returns the certificate from the HTTPS listener whose associated request routing rule has the **highest priority** (lowest priority number). This behavior differs from the V1 SKU, which returns the basic listener's certificate as a fallback.
132+
133+
> [!TIP]
134+
> **Controlling the default certificate with an SNI hole:** To prevent Application Gateway V2 from exposing a production site certificate when clients connect by IP address without SNI, you can configure an "SNI hole":
135+
>
136+
> 1. Create a **multi-site HTTPS listener** with a dummy hostname that doesn't match any real site (for example, `sni-hole.invalid`).
137+
> 2. Upload a **self-signed certificate** to this listener.
138+
> 3. Create a **request routing rule** associated with this listener and assign it the **highest priority** (lowest priority number) among all your rules.
139+
>
140+
> With this configuration, any connection without a matching SNI header receives the self-signed certificate instead of a valid site certificate. This prevents IP-only connections from obtaining information about your hosted sites.
129141
130142
> [!NOTE]
131-
> When the client does not specify an SNI header, it is recommended that the user add a basic listener and rule to present a default SSL/TLS certificate.
143+
> For the V1 SKU, when the client doesn't specify an SNI header, it's recommended that the user add a basic listener and rule to present a default SSL/TLS certificate.
132144
133145
> [!TIP]
134146
> The SNI flag can be configured with PowerShell or by using an ARM template. For more information, see [RequireServerNameIndication](/powershell/module/az.network/set-azapplicationgatewayhttplistener#-requireservernameindication) and [Quickstart: Direct web traffic with Azure Application Gateway - ARM template](quick-create-template.md#review-the-template).
@@ -140,7 +152,7 @@ The following tables outline the differences in SNI between the v1 and v2 SKU in
140152

141153
|Scenario | v1 | v2 |
142154
| --- | --- | --- |
143-
| When an FQDN or SNI is configured | Set as FQDN from the backend pool. As per [RFC 6066](https://tools.ietf.org/html/rfc6066), literal IPv4 and IPv6 addresses aren't permitted in SNI hostname. | The SNI value is set based on the [TLS validation type](configuration-http-settings.md?tabs=backendhttpsettings#backend-https-validation-settings) in the Backend Settings.<br><br> 1. **Complete validation** – The probes uses the SNI in the following order of precedence:<br> a) Custom Health Probe's hostname <br> b) Backend Setting's hostname (as per Overridden value or Pick from backend server) <br><br> 2. **Configurable** <br> Use specific SNI: The probes use this fixed hostname for validation.<br> Skip SNI: No Subject Name validation.
155+
| When an FQDN or SNI is configured | Set as FQDN from the backend pool. As per [RFC 6066](https://tools.ietf.org/html/rfc6066), literal IPv4 and IPv6 addresses aren't permitted in SNI hostname. | The SNI value is set based on the [TLS validation type](configuration-http-settings.md?tabs=backendhttpsettings#backend-https-validation-settings) in the Backend Settings.<br><br> 1. **Complete validation** – The probe uses the SNI in the following order of precedence:<br> a) Custom Health Probe's hostname <br> b) Backend Setting's hostname (as per Overridden value or Pick from backend server) <br><br> 2. **Configurable** <br> Use specific SNI: The probes use this fixed hostname for validation.<br> Skip SNI: No Subject Name validation.
144156
| When an FQDN or SNI is NOT configured (only IP address is available) | SNI (server_name) won’t be set. <br> **Note:** In this case, the backend server should be able to return a default/fallback certificate and this should be allow-listed in HTTP settings under authentication certificate. If there’s no default/fallback certificate configured in the backend server and SNI is expected, the server might reset the connection and will lead to probe failures | If the Custom Probe or Backend Settings use an IP address in the hostname field, the SNI is not set, in accordance with [RFC 6066](https://tools.ietf.org/html/rfc6066). This includes cases where the default probe uses 127.0.0.1. |
145157

146158
#### For live traffic

articles/backup/backup-azure-arm-userestapi-createorupdatepolicy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Create backup policies via REST API in Azure Backup
33
description: In this article, you'll learn how to create and manage backup policies (schedule and retention) using REST API.
44
ms.topic: how-to
5-
ms.date: 02/25/2025
5+
ms.date: 02/16/2026
66
ms.assetid: 5ffc4115-0ae5-4b85-a18c-8a942f6d4870
77
ms.service: azure-backup
88
ms.custom: engagement-fy24
@@ -16,7 +16,7 @@ This article describes how to create policies for the backup of Azure VM, SQL da
1616

1717
Learn more about [creating or modifying a backup policy for an Azure Recovery Services vault by using REST API](/rest/api/backup/protection-policies/create-or-update).
1818

19-
## Create or update a policy
19+
## Create or update a policy in Azure Recovery Services vault
2020

2121
To create or update an Azure Backup policy, use the following *PUT* operation.
2222

@@ -26,7 +26,7 @@ PUT https://management.azure.com/Subscriptions/{subscriptionId}/resourceGroups/{
2626

2727
The `{policyName}` and `{vaultName}` are provided in the URI. Additional information is provided in the request body.
2828

29-
## Create the request body
29+
## Create the request body for Azure VM backup policy
3030

3131
If you want to create a policy for Azure VM backup, the request body needs to have the following components:
3232

@@ -685,7 +685,7 @@ This policy:
685685

686686
---
687687

688-
## Responses
688+
## Responses for backup policy creation or update
689689

690690
The backup policy creation/update is a [asynchronous operation](../azure-resource-manager/management/async-operations.md). It means this operation creates another operation that needs to be tracked separately.
691691

articles/backup/backup-azure-backup-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ metadata:
44
description: 'Answers to common questions about'
55
ms.topic: faq
66
ms.service: azure-backup
7-
ms.date: 01/07/2025
7+
ms.date: 01/07/2026
88
author: AbhishekMallick-MS
99
ms.author: v-mallicka
1010
ms.custom: engagement-fy24

articles/backup/tutorial-configure-backup-aks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: "Tutorial: Configure item-level backup for an Azure Kubernetes Service cluster"
33
description: Learn how to configure backup for an Azure Kubernetes Service (AKS) cluster, and use Azure Backup to back up specific items from the cluster.
44
ms.topic: tutorial
5-
ms.date: 01/21/2025
5+
ms.date: 01/09/2026
66
ms.service: azure-backup
77
ms.custom:
88
- ignite-2023

articles/frontdoor/front-door-faq.yml

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,6 +127,10 @@ sections:
127127
Can AFD provide protection from ‘HTTP/2 Rapid Reset’ DDoS attacks?
128128
answer: |
129129
Yes. For more information, see [Microsoft response to DDoS attacks against HTTP/2](front-door-ddos.md).
130+
- question: |
131+
Can I force traffic from one country/region to use a specific Azure Front Door POP in another country/region?
132+
answer: |
133+
No. Azure Front Door can't force client traffic to a specific POP. Requests are routed to the nearest available edge location for performance and reliability. If you need to restrict access by geography, use Azure Web Application Firewall (WAF) custom rules with `GeoMatch` conditions. This approach allows or blocks requests based on client country/region, but it doesn't reroute those clients to a different POP in another country/region. For example, if you block country/region A, requests from clients in country/region A are blocked regardless of which POP would have served them. For more information, see [Geo-filtering in Azure WAF for Azure Front Door](../web-application-firewall/afds/waf-front-door-geo-filtering.md).
130134
- question: |
131135
Does Azure Front Door preserve `x-forwarded-for` headers?
132136
answer: |
@@ -138,6 +142,21 @@ sections:
138142
answer: |
139143
To use Azure Front Door Standard, or (classic) tier, you need a public IP or a DNS name that can be resolved publicly. This requirement of a public IP or a DNS name that can be resolved publicly allows Azure Front Door to route traffic to your backend resources. You can use Azure resources like Application Gateways or Azure Load Balancers to route traffic to resources in a virtual network. If you use Front Door Premium tier, you can use Private Link to connect to origins behind an internal load balancer with a private endpoint. For more information, see [Secure origins with Private Link](private-link.md).
140144
145+
- question: |
146+
Can I use Private Link to connect Azure Front Door to Azure Key Vault?
147+
answer: |
148+
No. For security, Azure Front Door supports only managed identity-based authentication when accessing certificates in Key Vault. For more information, see [Use managed identities in Azure Front Door](managed-identity.md).
149+
150+
- question: |
151+
Does Azure Front Door support managed identity with Azure Event Hub?
152+
answer: |
153+
No. Azure Front Door doesn't currently support managed identity integration with Azure Event Hub.
154+
155+
- question: |
156+
Does Azure Front Door support custom error pages?
157+
answer: |
158+
No. Azure Front Door doesn't currently support custom error pages.
159+
141160
- name: Deploying Front Door with other services
142161
questions:
143162
- question: |
@@ -244,7 +263,7 @@ sections:
244263
- question: |
245264
Azure Front Door Privatelink integration is not supported in the region where my origin is located. What do I do?
246265
answer: |
247-
Azure Front Door Private Link feature is region agnostic and will work even if you choose a region that is different from the region where your origin is located. In such cases, to ensure lower latency, you should always pick an Azure region closest to your origin when choosing to enable Azure Front Door Private Link endpoint. We are in the process of enabling support for more regions. Once a new region is supported, you can follow these [instructions](blue-green-deployment.md) to gradually shift traffic to the new region.
266+
The Azure Front Door Private Link feature is region agnostic but for the best latency, you should always pick an Azure region closest to your origin when choosing to enable Azure Front Door Private Link endpoint. If your origin's region isn't supported in the list of regions Front Door Private Link supports, pick the next nearest region. Traffic flows from the client to the Azure Front Door Private Link endpoint in the supported region, then traverses the Microsoft backbone network to your origin, maintaining private connectivity. Be aware that this configuration introduces additional latency due to the extra network hop between regions. You can use [Azure network round-trip latency statistics](../networking/azure-network-latency.md) to determine the additional latency due to choosing the next nearest region. Once a new region is supported, you can follow these [instructions](blue-green-deployment.md) to gradually shift traffic to the new region.
248267
249268
- name: Performance
250269
questions:

articles/frontdoor/private-link.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,12 @@ Azure Front Door private link is available in the following regions:
7272
| US Sec East | | | | |
7373
| US Sec West | | | | |
7474

75-
The Azure Front Door Private Link feature is region agnostic but for the best latency, you should always pick an Azure region closest to your origin when choosing to enable Azure Front Door Private Link endpoint. If your origin's region isn't supported in the list of regions Front Door Private Link supports, pick the next nearest region. You can use [Azure network round-trip latency statistics](../networking/azure-network-latency.md) to determine the next nearest region in terms of latency. We are in the process of enabling support for more regions. Once a new region is supported, you can follow these [instructions](blue-green-deployment.md) to gradually shift traffic to the new region.
75+
> [!NOTE]
76+
> Azure Front Door Private Link is only available in regions with Availability Zone support. This is to ensure zonal resiliency for region based feature like Private link.
77+
78+
The Azure Front Door Private Link feature is region agnostic but for the best latency, you should always pick an Azure region closest to your origin when choosing to enable Azure Front Door Private Link endpoint. If your origin's region isn't supported in the list of regions Front Door Private Link supports, pick the next nearest region. Traffic flows from the client to the Azure Front Door Private Link endpoint in the supported region, then traverses the Microsoft backbone network to your origin, maintaining private connectivity. Be aware that this configuration introduces additional latency due to the extra network hop between regions.
79+
80+
You can use [Azure network round-trip latency statistics](../networking/azure-network-latency.md) to determine the additional latency due to choosing the next nearest region. Once a new region is supported, you can follow these [instructions](blue-green-deployment.md) to gradually shift traffic to the new region.
7681

7782
## Association of a private endpoint with an Azure Front Door profile
7883

articles/hdinsight/hdinsight-with-entra-authentication/manage-entra-id-enabled-azure-hdinsight-clusters-with-arm-templates.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -264,6 +264,27 @@ To create a Microsoft.HDInsight/clusters resource, add the following JSON to you
264264
}
265265
}
266266
```
267+
## Troubleshooting
268+
269+
### Issue
270+
The problem occurs with the restAuthEntraUsers value in the gateway configuration. Azure Resource Manager (ARM) treats any string that starts with [ as an ARM expression. As a result, when ARM encounters the JSON array value, it attempts to interpret it as an ARM function, which causes the deployment to fail.
271+
272+
### Resolution
273+
To prevent ARM from interpreting the value as an expression, escape the opening bracket by using [[ instead of [. This forces ARM to treat the value as a literal string and pass it through correctly to HDInsight.
274+
275+
### Example
276+
Before (deployment fails):
277+
```json
278+
"restAuthEntraUsers": "[{\"displayName\":\"John Doe\",\"objectId\":\"<Object ID>\",\"upn\":\"[email protected]\"},{\"displayName\":\"Jane Doe\",\"objectId\":\"<Object ID>\",\"upn\":\"[email protected]\"},{\"displayName\":\"abc\",\"objectId\":\"<Object ID>\",\"upn\":\"[email protected]\"}]"
279+
```
280+
281+
After (deployment succeeds):
282+
283+
```json
284+
"restAuthEntraUsers": "[[{\"displayName\":\"John Doe\",\"objectId\":\"<Object ID>\",\"upn\":\"[email protected]\"},{\"displayName\":\"Jane Doe\",\"objectId\":\"<Object ID>\",\"upn\":\"[email protected]\"},{\"displayName\":\"abc\",\"objectId\":\"<Object ID>\",\"upn\":\"[email protected]\"}]"
285+
```
286+
> [!NOTE]
287+
> The only required change is the additional "[" at the beginning of the value.
267288
268289
## Property Values
269290

articles/migrate/best-practices-least-privileged-account.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,9 @@ The Azure Migrate appliance is a lightweight tool that discovers on-premises ser
1919

2020
To use these features, you add server and guest credentials in the appliance configuration manager. Following the principle of least privilege helps keep the setup secure and efficient.
2121

22+
>[!IMPORTANT]
23+
> In addition to configuring least‑privileged credentials for the Azure Migrate appliance, ensure that users are assigned the appropriate Azure Migrate built‑in roles in Azure. These roles provide the minimum required permissions for discovery, assessment, and migration activities. [Learn more](prepare-azure-accounts.md).
24+
2225
## Discovery of the VMware estate
2326

2427
To discover the basic settings of servers running in the VMware estate, you need the following permissions.

articles/migrate/create-project.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,10 @@ Ensure you have the correct permissions to create a project using the following
2727

2828
1. In the Azure portal, open the relevant subscription, and select **Access control (IAM)**.
2929
2. In **Check access**, find the relevant account, and select it and view permissions. You should have *Azure Migrate Owner* or a role with higher permissions. [Learn more](prepare-azure-accounts.md).
30-
> [!Note]
31-
> Starting November 2025, only users assigned the **Azure Migrate Owner** or a higher privileged role will be able to create Azure Migrate projects. Users without these role assignments will no longer have the required permissions to create new projects.
30+
31+
> [!NOTE]
32+
> - Starting November 2025, only users assigned the **Azure Migrate Owner** or a higher privileged role will be able to create Azure Migrate projects. Users without these role assignments will no longer have the required permissions to create new projects.
33+
> - For the required Azure Migrate built‑in roles and permission details to create a project and run discovery, assessments, and migrations, see [Prepare Azure accounts for Azure Migrate](prepare-azure-accounts.md).
3234
3335
::: moniker range="migrate"
3436

articles/migrate/discovered-metadata.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -298,6 +298,8 @@ Published date | `apt-get -s dist-upgrade, yum -q check-update, zypper list-upda
298298

299299
> [!NOTE]
300300
> If your Red Hat Enterprise Linux (RHEL) servers use `yum` and aren't patched regularly, pending updates data can consume storage in the cache under `var\tmp\yum\-<username>`. To manage disk space, it is recommended to clear the cache regularly.
301+
>
302+
> To disable discovery of pending updates, visit 'HKLM:\SOFTWARE\Microsoft\AzureAppliance' and set the registry of type 'REG_DWORD EnablePendingUpdatesDiscovery' to 0. You must restart the appliance after setting the registry to ensure changes are reflected. To re-enable discovery of pending updates, set the registry 'EnablePendingUpdatesDiscovery' to 1.
301303
302304
## SQL Server instance and database data
303305

0 commit comments

Comments
 (0)