You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/whats-new-docs.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: "What's new in Azure Active Directory business-to-customer (B2C)"
3
3
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4
-
ms.date: 11/13/2025
4
+
ms.date: 02/03/2026
5
5
ms.service: azure-active-directory
6
6
ms.subservice: b2c
7
7
ms.topic: whats-new
@@ -19,6 +19,14 @@ ms.custom: sfi-ropc-nochange
19
19
20
20
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new and significantly updated docs from the past three months. To learn what's new with the B2C service, see [What's new in Microsoft Entra ID](../active-directory/fundamentals/whats-new.md), [Azure AD B2C developer release notes](custom-policy-developer-notes.md) and [What's new in Microsoft Entra External ID](/entra/external-id/whats-new-docs).
21
21
22
+
## January 2026
23
+
24
+
### Updated articles
25
+
26
+
-[OAuth 2.0 authorization code flow in Azure Active Directory B2C](authorization-code-flow.md) - Added security guidance on using the `state` parameter
27
+
-[Azure Active Directory B2C service limits and restrictions](service-limits.md) - Updated region specific service limits
28
+
-[Securing phone-based multifactor authentication](phone-based-mfa.md) - Updated the XML code snippets
29
+
22
30
## October 2025
23
31
24
32
### Updated articles
@@ -33,9 +41,3 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
33
41
34
42
-[Azure Active Directory B2C service limits and restrictions](service-limits.md) - Added new object limits
35
43
-[StringCollection claims transformations](stringcollection-transformations.md) - Updated claim type information
36
-
37
-
## July 2025
38
-
39
-
### Updated articles
40
-
41
-
-[Azure Active Directory B2C service limits and restrictions](service-limits.md) - Added new region limits
Copy file name to clipboardExpand all lines: articles/api-management/breaking-changes/trusted-service-connectivity-retirement-march-2026.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,6 +54,8 @@ If your API Management service has an established networking line of sight to th
54
54
55
55
For backup and restore and custom hostname certificates, you need to ensure the target key vault or storage account is publicly accessible or you need to preserve its trusted connectivity setting to allow traffic from API Management resources, even if your API Management service has a networking line of sight established with it.
56
56
57
+
APIs in workspaces aren't affect by this change, since they [do not support managed identity](../workspaces-overview.md).
58
+
57
59
### Step 1: Does my API Management gateway rely on trusted service connectivity?
58
60
59
61
Your API Management gateway should no longer rely on trusted service connectivity to Azure services. Instead, it should establish a networking line of sight.
Copy file name to clipboardExpand all lines: articles/application-gateway/migrate-v1-v2.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,9 +38,13 @@ This article primarily helps with the configuration migration. Client traffic mi
38
38
* Make sure you have the latest PowerShell modules, or you can use Azure Cloud Shell in the portal.
39
39
* If you're running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure.
40
40
* Ensure that there's no existing Application gateway with the provided AppGW V2 Name and Resource group name in V1 subscription. This rewrites the existing resources.
41
+
* Ensure that no other operation is planned on the V1 gateway or any associated resources during migration.
41
42
* If a public IP address is provided, ensure that it's in a succeeded state. If not provided and AppGWResourceGroupName is provided ensure that public IP resource with name AppGWV2Name-IP doesn’t exist in a resource group with the name AppGWResourceGroupName in the V1 subscription.
42
43
* For the V1 SKU, authentication certificates are required to set up TLS connections with backend servers. The V2 SKU requires uploading [trusted root certificates](./certificates-for-backend-authentication.md) for the same purpose. While V1 allows the use of self-signed certificates as authentication certificates, V2 mandates [generating and uploading a self-signed Root certificate](./self-signed-certificates.md) if self-signed certificates are used in the backend.
43
-
* Ensure that no other operation is planned on the V1 gateway or any associated resources during migration.
44
+
45
+
> [!NOTE]
46
+
> Application Gateway V2 includes [customer controlled Backend TLS Relaxation](configuration-http-settings.md#backend-https-validation-settings), a capability that streamlines backend certificate validation during migration. This feature allows you to temporarily relax TLS checks by skipping certificate‑chain , expiry validation or overriding SNI validation, aligning behavior with what is already permitted in the V1 SKU. When the [enhanced migration script](migrate-v1-v2.md#1-enhanced-cloning-script) runs, these relaxation settings are enabled by default for HTTPS backends to prevent disruptions caused by the stricter certificate enforcement in V2. After completing the migration, you can upload the appropriate trusted root certificates and disable Backend TLS Relaxation to align with the recommended security posture for V2.
Copy file name to clipboardExpand all lines: articles/backup/manage-backup-vault.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Manage Backup vaults
3
3
description: Learn how to manage the Backup vaults.
4
4
ms.topic: how-to
5
-
ms.date: 07/22/2025
5
+
ms.date: 02/05/2026
6
6
ms.custom: references_regions
7
7
ms.service: azure-backup
8
8
author: AbhishekMallick-MS
@@ -15,7 +15,7 @@ This article describes how to manage Backup vaults once they're created.
15
15
16
16
A Backup vault is a storage entity in Azure that houses backup data for certain newer workloads that Azure Backup supports. You can use Backup vaults to hold backup data for various Azure services, such Azure Database for PostgreSQL servers and newer workloads that Azure Backup will support. Backup vaults make it easy to organize your backup data, while minimizing management overhead. Backup vaults are based on the Azure Resource Manager model of Azure, which provides the **Azure role-based access control (Azure RBAC)** feature. Azure RBAC provides fine-grained access management control in Azure. [Azure provides various built-in roles](../role-based-access-control/built-in-roles.md), and Azure Backup has three [built-in roles to manage recovery points](backup-rbac-rs-vault.md). Backup vaults are compatible with Azure RBAC, which restricts backup and restore access to the defined set of user roles. [Learn more](backup-rbac-rs-vault.md).
17
17
18
-
Learn [how to create a Backup vault using Azure Business Continuity Center](../business-continuity-center/backup-vaults.md).
18
+
Learn [how to create a Backup vault using Resiliency](../resiliency/backup-vaults.md).
19
19
20
20
## Monitor and manage the Backup vault
21
21
@@ -35,17 +35,17 @@ In the **Jobs** tile, you get a summarized view of all backup and restore relate
35
35
36
36
:::image type="content" source="./media/backup-vault-overview/backup-jobs.png" alt-text="Screenshot shows the Backup jobs.":::
37
37
38
-
## Optimize backup and recovery with Azure Business Continuity Center Copilot
38
+
## Optimize backup and recovery with Resiliency Copilot
39
39
40
-
Azure Business Continuity Center Copilot introduces new capabilities in the Backup vaults pane, enabling you to configure/manage a secure, resilient backup and recovery environment:
40
+
Resiliency Copilot introduces new capabilities in the Backup vaults pane, enabling you to configure/manage a secure, resilient backup and recovery environment:
41
41
42
-
-[Increase security level](../business-continuity-center/tutorial-manage-data-using-copilot.md#increase-security-level-of-recovery-service-vault-and-backup-vault) to strengthen protection for backup data and disaster recovery operations.
43
-
-[Analyze job failures](../business-continuity-center/tutorial-manage-data-using-copilot.md#analyze-job-failures-for-recovery-service-vault-and-backup-vault) to gain insights into failures for precise analysis and faster resolution.
44
-
-[Configure protection for unprotected resources](..\business-continuity-center\tutorial-manage-data-using-copilot.md#configure-protection-for-resources-in-recovery-services-vault-and-backup-vault).
45
-
-[Delete a vault](..\business-continuity-center\tutorial-manage-data-using-copilot.md#delete-recovery-services-vault-and-backup-vault-using-copilot).
46
-
-[Troubleshoot common errors efficiently](../business-continuity-center/tutorial-manage-data-using-copilot.md#troubleshoot-error-codes-for-recovery-service-vaults-and-backup-vaults).
42
+
-[Increase security level](../resiliency/tutorial-manage-data-using-copilot.md#increase-security-level-of-recovery-service-vault-and-backup-vault) to strengthen protection for backup data and disaster recovery operations.
43
+
-[Analyze job failures](../resiliency/tutorial-manage-data-using-copilot.md#analyze-job-failures-for-recovery-service-vault-and-backup-vault) to gain insights into failures for precise analysis and faster resolution.
44
+
-[Configure protection for unprotected resources](..\resiliency\tutorial-manage-data-using-copilot.md#configure-protection-for-resources-in-recovery-services-vault-and-backup-vault).
45
+
-[Delete a vault](..\resiliency\tutorial-manage-data-using-copilot.md#delete-recovery-services-vault-and-backup-vault-using-copilot).
46
+
-[Troubleshoot common errors efficiently](../resiliency/tutorial-manage-data-using-copilot.md#troubleshoot-error-codes-for-recovery-service-vaults-and-backup-vaults).
47
47
48
-
Learn more about [managing the Business Continuity and Disaster Recovery estate using Copilot (preview)](../business-continuity-center/tutorial-manage-data-using-copilot.md).
48
+
Learn more about [managing the Business Continuity and Disaster Recovery estate using Copilot (preview)](../resiliency/tutorial-manage-data-using-copilot.md).
49
49
50
50
## Move a Backup vault across Azure subscriptions/resource groups
51
51
@@ -146,7 +146,7 @@ The Cross Region Restore option allows you to restore data in a secondary Azur
146
146
147
147
1. Once the backup is complete in the primary region, it can take up to *12 hours* for the recovery point in the primary region to get replicated to the secondary region.
148
148
149
-
To check the availability of recovery point in the secondary region, go to the **Backup center** > **Backup Instances** > **Filter to Azure Database for PostgreSQL servers**, filter **Instance Region** as *Secondary Region*, and then select the required Backup Instance.
149
+
To check the availability of recovery point in the secondary region, go to the **Backup vault** > **Backup Instances** > **Filter to Azure Database for PostgreSQL servers**, filter **Instance Region** as *Secondary Region*, and then select the required Backup Instance.
150
150
151
151
:::image type="content" source="./media/backup-vault-overview/check-availability-of-recovery-point-in-secondary-region.png" alt-text="Screenshot shows how to check availability for the recovery points in the secondary region." lightbox="./media/backup-vault-overview/check-availability-of-recovery-point-in-secondary-region.png":::
@@ -125,7 +125,7 @@ To assign the permissions, follow these steps:
125
125
126
126
3. The Recovery Services vault identity requires the **Set permission on Secret** to create and add the passphrase as a Secret to the Key Vault.
127
127
128
-
You can select a *built-in role* such as **Key Vault Secrets Officer** that has the permission (along with other permissions not required for this feature) or [create a custom role](/azure/key-vault/general/rbac-guide?tabs=azurepowershell#creating-custom-roles) with only Set permission on Secret.
128
+
You can select a *built-in role* such as [**Key Vault Secrets Officer**](/azure/role-based-access-control/built-in-roles/security#key-vault-secrets-officer) that has the permission (along with other permissions not required for this feature) or [create a custom role](/azure/key-vault/general/rbac-guide?tabs=azurepowershell#creating-custom-roles) with only Set permission on Secret.
129
129
130
130
Under **Details**, select **View** to view the permissions granted by the role and ensure *Set* permission on *Secret* is available.
0 commit comments