Skip to content

Commit 618de18

Browse files
Merge pull request #304322 from MicrosoftDocs/main
Auto Publish – main to live - 2025-08-18 17:00 UTC
2 parents 1b176f7 + e54c9aa commit 618de18

70 files changed

Lines changed: 934 additions & 760 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

articles/application-gateway/secure-application-gateway.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: mbender
66
ms.service: azure-application-gateway
77
ms.topic: concept-article
88
ms.custom: security
9-
ms.date: 07/29/2025
9+
ms.date: 08/15/2025
1010
ai-usage: ai-assisted
1111
---
1212

@@ -54,7 +54,7 @@ Proper authentication and authorization controls ensure only authorized users an
5454

5555
Data protection for Application Gateway focuses on securing data in transit and managing certificates and secrets properly.
5656

57-
* **Enable TLS encryption**: Configure TLS termination to encrypt data in transit between clients and your Application Gateway. Use TLS v1.2 or later and disable legacy versions like SSL 3.0 and TLS v1.0 to protect against known vulnerabilities. For more information, see [Overview of TLS termination and end to end TLS with Application Gateway](./ssl-overview.md).
57+
* **Enable TLS encryption**: Configure TLS termination to encrypt data in transit between clients and your Application Gateway. Ensure you are using the latest version to protect against known vulnerabilities. For more information, see [Overview of TLS termination and end to end TLS with Application Gateway](./ssl-overview.md).
5858

5959
* **Store certificates in Azure Key Vault**: Use Azure Key Vault to securely store and manage your TLS certificates instead of embedding them in configuration files. This enables automatic certificate rotation and centralized management of secrets. For more information, see [TLS termination with Key Vault certificates](./key-vault-certs.md).
6060

@@ -90,4 +90,4 @@ Asset management ensures your Application Gateway configurations are properly mo
9090

9191
- Learn more about [Azure security architecture and design](/azure/well-architected/security/)
9292
- Review [Security in the Microsoft Cloud Adoption Framework](/azure/cloud-adoption-framework/secure/overview)
93-
- Explore [Web Application Firewall on Azure Application Gateway](/azure/web-application-firewall/ag/ag-overview)
93+
- Explore [Web Application Firewall on Azure Application Gateway](/azure/web-application-firewall/ag/ag-overview)

articles/application-gateway/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,8 +80,6 @@
8080
href: understanding-pricing.md
8181
- name: Security
8282
items:
83-
- name: Security baseline
84-
href: /security/benchmark/azure/baselines/application-gateway-security-baseline?toc=/azure/application-gateway/toc.json
8583
- name: Secure your Application Gateway
8684
href: secure-application-gateway.md
8785
- name: Private Deployment
@@ -102,6 +100,8 @@
102100
href: ssl-certificate-management.md
103101
- name: TLS 1.0 and 1.1 retirement
104102
href: application-gateway-tls-version-retirement.md
103+
- name: Security baseline
104+
href: /security/benchmark/azure/baselines/application-gateway-security-baseline?toc=/azure/application-gateway/toc.json
105105
- name: Network security blog
106106
href: https://techcommunity.microsoft.com/category/azure-network-security/blog/azurenetworksecurityblog
107107
- name: Reliability

articles/azure-resource-manager/management/overview.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -137,6 +137,11 @@ Resource Manager is designed for resiliency and continuous availability. Resourc
137137

138138
This resiliency applies to services that receive requests through Resource Manager. Azure Key Vault is one service that benefits from this consistency.
139139

140+
141+
Using the global endpoint `management.azure.com` is recommended for Azure Resource Manager routing because it enables DNS-based traffic distribution, automatic failover, and optimal routing to the closest or healthiest region, which improves latency and reliability for users worldwide.
142+
Global endpoints typically result in faster response times, as users are directed to the nearest available region, reducing network hops and delays.
143+
144+
140145
## Resolve concurrent operations
141146

142147
Concurrent resource updates can cause unexpected results. When two or more operations try to update the same resource at the same time, Resource Manager detects the conflict, allows only one operation to complete successfully, blocks the other operations, and returns an error. This resolution ensures that your updates are conclusive and reliable; you know the status of your resources and avoid any inconsistency or data loss.

articles/backup/offline-backup-azure-data-box-dpm-mabs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Offline Backup with Azure Data Box for DPM and MABS
33
description: You can use Azure Data Box to seed initial Backup data offline from DPM and MABS.
44
ms.topic: how-to
5-
ms.date: 09/11/2024
5+
ms.date: 12/03/2024
66
ms.service: azure-backup
77
author: AbhishekMallick-MS
88
ms.author: v-mallicka

articles/communication-services/concepts/sms/messaging-connect.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -265,7 +265,7 @@ Here’s how the Marketplace flow works:
265265

266266
This setup simplifies procurement and allows Messaging Connect usage to count toward your Azure MACC commitment.
267267

268-
Learn more: [Azure Marketplace](https://learn.microsoft.com/marketplace/azure-marketplace-overview)
268+
Learn more: [Azure Marketplace](/marketplace/azure-marketplace-overview)
269269

270270
> [!TIP]
271271
> Whether you choose Partner or Marketplace billing, the technical experience in Azure remains exactly the same.

articles/communication-services/quickstarts/identity/includes/entra-id/support-entra-id-users-js.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -134,13 +134,13 @@ From the project directory:
134134

135135
export default App;
136136
```
137-
You can import any implementation of the [TokenCredential](https://learn.microsoft.com/javascript/api/%40azure/core-auth/tokencredential) interface from the [Azure Identity SDK for JavaScript](https://www.npmjs.com/package/@azure/identity) to authenticate with Microsoft Entra ID. In this quickstart, we use the `InteractiveBrowserCredential` class, which is suitable for browser basic authentication scenarios. For a full list of the credentials offered, see [Credential Classes](https://learn.microsoft.com/javascript/api/overview/azure/identity-readme#credential-classes).
137+
You can import any implementation of the [TokenCredential](/javascript/api/%40azure/core-auth/tokencredential) interface from the [Azure Identity SDK for JavaScript](https://www.npmjs.com/package/@azure/identity) to authenticate with Microsoft Entra ID. In this quickstart, we use the `InteractiveBrowserCredential` class, which is suitable for browser basic authentication scenarios. For a full list of the credentials offered, see [Credential Classes](/javascript/api/overview/azure/identity-readme#credential-classes).
138138

139139
<a name='step-1-obtain-entra-user-token-via-the-identity-library'></a>
140140

141141
### Step 1: Initialize implementation of TokenCredential from Azure Identity SDK
142142

143-
The first step in obtaining Communication Services access token for Entra ID user is getting an Entra ID access token for your Entra ID user by using [Azure Identity](https://learn.microsoft.com/javascript/api/overview/azure/identity-readme) SDK. To enable authentication for users across multiple tenants, initialize the `InteractiveBrowserCredential` class with the authority set to `https://login.microsoftonline.com/organizations`. For more information, see [Authority](https://learn.microsoft.com//entra/identity-platform/msal-client-application-configuration#authority).
143+
The first step in obtaining Communication Services access token for Entra ID user is getting an Entra ID access token for your Entra ID user by using [Azure Identity](/javascript/api/overview/azure/identity-readme) SDK. To enable authentication for users across multiple tenants, initialize the `InteractiveBrowserCredential` class with the authority set to `https://login.microsoftonline.com/organizations`. For more information, see [Authority](/entra/identity-platform/msal-client-application-configuration#authority).
144144

145145
```javascript
146146
// Initialize InteractiveBrowserCredential for use with AzureCommunicationTokenCredential.

articles/communication-services/quickstarts/identity/includes/entra-id/support-entra-id-users-net.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ namespace EntraIdUsersSupportQuickstart
7777

7878
### Step 1: Initialize implementation of TokenCredential from Azure Identity SDK
7979

80-
The first step in obtaining Communication Services access token for Entra ID user is getting an Entra ID access token for your Entra ID user by using [Azure.Identity](https://learn.microsoft.com/dotnet/api/overview/azure/identity-readme?view=azure-dotnet) SDK. The code below retrieves the Contoso Entra client ID and the Fabrikam tenant ID from environment variables named `ENTRA_CLIENT_ID` and `ENTRA_TENANT_ID`. To enable authentication for users across multiple tenants, initialize the `InteractiveBrowserCredential` class with the authority set to `https://login.microsoftonline.com/organizations`. For more information, see [Authority](https://learn.microsoft.com/entra/identity-platform/msal-client-application-configuration#authority).
80+
The first step in obtaining Communication Services access token for Entra ID user is getting an Entra ID access token for your Entra ID user by using [Azure.Identity](/dotnet/api/overview/azure/identity-readme) SDK. The code below retrieves the Contoso Entra client ID and the Fabrikam tenant ID from environment variables named `ENTRA_CLIENT_ID` and `ENTRA_TENANT_ID`. To enable authentication for users across multiple tenants, initialize the `InteractiveBrowserCredential` class with the authority set to `https://login.microsoftonline.com/organizations`. For more information, see [Authority](/entra/identity-platform/msal-client-application-configuration#authority).
8181

8282
```csharp
8383
// This code demonstrates how to fetch your Microsoft Entra client ID and tenant ID from environment variables.

articles/communication-services/quickstarts/identity/microsoft-entra-id-authentication-integration.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This quickstart demonstrates how to use the Communication Services Common SDK al
2323
## Prerequisites
2424
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
2525
- An active Azure Communication Services resource and endpoint URI. For more information, see [Create an Azure Communication Services resource](../create-communication-resource.md).
26-
- A Microsoft Entra ID instance. For more information, see [Microsoft Entra ID overview](https://learn.microsoft.com/entra/fundamentals/whatis?source=docs).
26+
- A Microsoft Entra ID instance. For more information, see [Microsoft Entra ID overview](/entra/fundamentals/whatis?source=docs).
2727

2828
## Introduction
2929

@@ -49,7 +49,7 @@ The Administrator role has extended permissions in Microsoft Entra ID. Members o
4949
To enable the Contoso application to access Azure Communication Services Clients application API permissions, the Contoso Administrator must create a service principal for Azure Communication Services Clients application in the Contoso Microsoft Entra ID tenant.
5050
The Contoso Administrator can create a service principal in Contoso tenant by one of the following methods:
5151

52-
- Use the [Microsoft Graph REST API](https://learn.microsoft.com/graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0&tabs=http#request) to run the following request:
52+
- Use the [Microsoft Graph REST API](/graph/api/serviceprincipal-post-serviceprincipals#request) to run the following request:
5353

5454
```http
5555
POST https://graph.microsoft.com/v1.0/servicePrincipals
@@ -62,7 +62,7 @@ Content-Type: application/json
6262

6363
This request can also be executed in [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer/). Make sure to include your full tenant domain in the URL `https://developer.microsoft.com/graph/graph-explorer?tenant={tenant domain}`, sign in, and provide consent for `Application.ReadWrite.All` permission.
6464

65-
- Use the [Azure CLI](https://learn.microsoft.com/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create) to run the following command:
65+
- Use the [Azure CLI](/cli/azure/ad/sp#az-ad-sp-create) to run the following command:
6666

6767
```azurecli-interactive
6868
az ad sp create --id 2a04943b-b6a7-4f65-8786-2bb6131b59f6
@@ -205,4 +205,4 @@ In this quickstart, you learned how to:
205205
Learn about the following concepts:
206206

207207
- [Support Microsoft Entra ID users in Azure Communication Services](../../concepts/identity-model.md#microsoft-entra-id-integrating-with-entra-id)
208-
- [Tenancy in Microsoft Entra ID](https://learn.microsoft.com/entra/identity-platform/single-and-multi-tenant-apps)
208+
- [Tenancy in Microsoft Entra ID](/entra/identity-platform/single-and-multi-tenant-apps)

articles/event-grid/troubleshoot-subscription-validation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@ During event subscription creation, if you're seeing an error message such as `T
1111

1212
- Do an HTTP POST to your webhook url with a [sample SubscriptionValidationEvent](end-point-validation-event-grid-events-schema.md#validation-details) request body using curl or similar tool.
1313
- If your webhook is implementing synchronous validation handshake mechanism, verify that the ValidationCode is returned as part of the response.
14-
- If your webhook is implementing asynchronous validation handshake mechanism, verify that you're the HTTP POST is returning 200 OK.
15-
- If your webhook is returning `403 (Forbidden)` in the response, check if your webhook is behind an Azure Application Gateway or Web Application Firewall. If it is, then your need to disable these firewall rules and do an HTTP POST again:
14+
- If your webhook is implementing asynchronous validation handshake mechanism, verify that your POST endpoint is returning 200 OK.
15+
- If your webhook is returning `403 (Forbidden)` in the response, check if your webhook is behind an Azure Application Gateway or Web Application Firewall. If it is, then you need to disable these firewall rules and do an HTTP POST again:
1616
- 920300 (Request missing an accept header)
1717
- 942430 (Restricted SQL character anomaly detection (args): # of special characters exceeded (12))
1818
- 920230 (Multiple URL encoding detected)

articles/iot-operations/connect-to-cloud/concept-dataflow-conversions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Convert data by using data flow conversions
33
description: Learn about data flow conversions for transforming data in Azure IoT Operations.
4-
author: PatAltimore
5-
ms.author: patricka
4+
author: SoniaLopezBravo
5+
ms.author: sonialopez
66
ms.subservice: azure-data-flows
77
ms.topic: concept-article
88
ms.date: 11/11/2024

0 commit comments

Comments
 (0)