Skip to content

Commit 8fde33b

Browse files
authored
Merge branch 'main' into Release_Archive_main_2026-03-26-17-30-05
2 parents 2c717cf + 120d0cd commit 8fde33b

232 files changed

Lines changed: 8225 additions & 3937 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -123,6 +123,10 @@
123123
{
124124
"source_path": "articles/iot/tutorial-send-telemetry-iot-hub.md",
125125
"redirect_url": "/previous-versions/azure/iot/tutorial-send-telemetry-iot-hub",
126+
},
127+
{
128+
"source_path": "articles/backup/backup-azure-enhanced-soft-delete-about.md",
129+
"redirect_url": "/azure/backup/secure-by-default",
126130
"redirect_document_id": false
127131
},
128132
{

articles/api-management/api-management-gateways-overview.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: azure-api-management
88
ms.custom:
99
- build-2024
1010
ms.topic: concept-article
11-
ms.date: 02/17/2026
11+
ms.date: 03/23/2026
1212
ms.author: danlep
1313
---
1414

@@ -85,15 +85,16 @@ The following tables compare features available in the following API Management
8585
| [Managed domain certificates](configure-custom-domain.md?tabs=managed#domain-certificate-options) | ✔️ || ✔️ |||
8686
| [TLS settings](api-management-howto-manage-protocols-ciphers.md) | ✔️ | ✔️ | ✔️ | ✔️ ||
8787
| **HTTP/2** (Client-to-gateway) | ✔️<sup>4</sup> | ✔️<sup>4</sup> || ✔️ ||
88-
| **HTTP/2** (Gateway-to-backend) | ||| ✔️<sup>5</sup> ||
88+
| **HTTP/2** (Gateway-to-backend) | ✔️<sup>7</sup> ||| ✔️<sup>5</sup> ||
8989
| API threat detection with [Defender for APIs](protect-with-defender-for-apis.md) | ✔️ | ✔️ ||||
9090

9191
<sup>1</sup> Depends on how the gateway is deployed, but is the responsibility of the customer.<br/>
9292
<sup>2</sup> Connectivity to the self-hosted gateway v2 [configuration endpoint](self-hosted-gateway-overview.md#fqdn-dependencies) requires DNS resolution of the endpoint hostname.<br/>
9393
<sup>3</sup> CA root certificates for self-hosted gateway are managed separately per gateway.<br/>
9494
<sup>4</sup> Client protocol needs to be enabled.<br/>
9595
<sup>5</sup> Configure using the [forward-request](forward-request-policy.md) policy.<br/>
96-
<sup>6</sup> Configure CA certificate details for backend certificate authentication in [backend](backends.md) settings.
96+
<sup>6</sup> Configure CA certificate details for backend certificate authentication in [backend](backends.md) settings.<br/>
97+
<sup>7</sup> In preview for classic tier instances created starting January 2026. Contact support to enable for existing classic tier instances.
9798

9899
### Backend APIs
99100

@@ -110,7 +111,7 @@ The following tables compare features available in the following API Management
110111
| [Pass-through GraphQL](graphql-apis-overview.md) | ✔️ | ✔️ |✔️ | ✔️ | ✔️ |
111112
| [Synthetic GraphQL](graphql-apis-overview.md)| ✔️ | ✔️ | ✔️<sup>1</sup> | ✔️<sup>1</sup> ||
112113
| [Pass-through WebSocket](websocket-api.md) | ✔️ | ✔️ || ✔️ | ✔️ |
113-
| [Pass-through gRPC](grpc-api.md) | ✔️ ||| ✔️ ||
114+
| [Pass-through gRPC](grpc-api.md) | ✔️<sup>1</sup> ||| ✔️ ||
114115
| [OData](import-api-from-odata.md) | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ |
115116
| [Azure OpenAI in Microsoft Foundry models and LLMs](azure-ai-foundry-api.md) | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ |
116117
| [Pass-through MCP server](expose-existing-mcp-server.md) | ✔️ | ✔️ || ✔️ ||
@@ -119,6 +120,9 @@ The following tables compare features available in the following API Management
119120
| [Circuit breaker in backend](backends.md#circuit-breaker) | ✔️ | ✔️ || ✔️ | ✔️ |
120121
| [Load-balanced backend pool](backends.md#load-balanced-pool) | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ |
121122

123+
<sup>1</sup> In preview for classic tier instances created starting January 2026. Contact support to enable for existing classic tier instances.
124+
125+
122126
### Policies
123127

124128
Managed and self-hosted gateways support all available [policies](api-management-policies.md) in policy definitions with the following exceptions. See the policy reference for details about each policy.

articles/api-management/azure-ai-foundry-api.md

Lines changed: 20 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: azure-api-management
55
author: dlepow
66
ms.author: danlep
77
ms.topic: how-to
8-
ms.date: 10/07/2025
8+
ms.date: 03/24/2026
99
ms.update-cycle: 180-days
1010
ms.collection: ce-skilling-ai-copilot
1111
ms.custom: template-how-to, build-2024
@@ -21,32 +21,31 @@ Learn more about managing AI APIs in API Management:
2121

2222
* [AI gateway capabilities in Azure API Management](genai-gateway-capabilities.md)
2323

24-
2524
## Client compatibility options
2625

2726
API Management supports two client compatibility options for AI APIs from Microsoft Foundry. When you import the API using the wizard, choose the option suitable for your model deployment. The option determines how clients call the API and how the API Management instance routes requests to the Foundry tool.
2827

29-
* **Azure OpenAI** - Manage Azure OpenAI in Microsoft Foundry model deployments.
28+
* **Azure OpenAI**: Manage Azure OpenAI in Microsoft Foundry model deployments.
3029

31-
Clients call the deployment at an `/openai` endpoint such as `/openai/deployments/my-deployment/chat/completions`. Deployment name is passed in the request path. Use this option if your Foundry tool only includes Azure OpenAI model deployments.
30+
Clients call the deployment at an `/openai` endpoint such as `/openai/deployments/my-deployment/chat/completions`. Deployment name is passed in the request path. Use this option if your Foundry tool only includes Azure OpenAI model deployments.
3231

33-
* **Azure AI** - Manage model endpoints in Microsoft Foundry that are exposed through the [Azure AI Model Inference API](/azure/ai-studio/reference/reference-model-inference-api).
32+
* **Azure AI**: Manage model endpoints in Microsoft Foundry that are exposed through the [Azure AI Model Inference API](/rest/api/aifoundry/modelinference/).
3433

3534
Clients call the deployment at a `/models` endpoint such as `/my-model/models/chat/completions`. Deployment name is passed in the request body. Use this option if you want flexibility to switch between models exposed through the Azure AI Model Inference API and those deployed in Azure OpenAI in Foundry Models.
3635

3736
## Prerequisites
3837

39-
- An existing API Management instance. [Create one if you haven't already](get-started-create-service-instance.md).
38+
* An existing API Management instance. [Create one if you haven't already](get-started-create-service-instance.md).
4039

41-
- A Foundry tool in your subscription with one or more models deployed. Examples include models deployed in Microsoft Foundry or Azure OpenAI.
40+
* A Foundry tool in your subscription with one or more models deployed. Examples include models deployed in Microsoft Foundry or Azure OpenAI.
4241

4342
## Import Microsoft Foundry API using the portal
4443

45-
Use the following steps to import an AI API to API Management.
44+
Use the following steps to import an AI API to API Management.
4645

4746
When you import the API, API Management automatically configures:
4847

49-
* Operations for each of the API's REST API endpoints
48+
* Operations for each of the API's REST API endpoints.
5049
* A system-assigned identity with the necessary permissions to access the Foundry tool deployment.
5150
* A [backend](backends.md) resource and a [set-backend-service](set-backend-service-policy.md) policy that direct API requests to the Azure AI Services endpoint.
5251
* Authentication to the backend using the instance's system-assigned managed identity.
@@ -62,37 +61,38 @@ To import a Microsoft Foundry API to API Management:
6261
1. On the **Select AI Service** tab:
6362
1. Select the **Subscription** in which to search for Foundry Tools. To get information about the model deployments in a service, select the **deployments** link next to the service name.
6463
:::image type="content" source="media/azure-ai-foundry-api/deployments.png" alt-text="Screenshot of deployments for an AI service in the portal.":::
65-
1. Select a Foundry tool.
64+
1. Select a Foundry tool.
6665
1. Select **Next**.
6766
1. On the **Configure API** tab:
6867
1. Enter a **Display name** and optional **Description** for the API.
6968
1. In **Base path**, enter a path that your API Management instance uses to access the deployment endpoint.
70-
1. Optionally select one or more **Products** to associate with the API.
69+
1. Optionally, select one or more **Products** to associate with the API.
7170
1. In **Client compatibility**, select either of the following based on the types of client you intend to support. See [Client compatibility options](#client-compatibility-options) for more information.
72-
* **Azure OpenAI** - Select this option if your clients only need to access Azure OpenAI in Microsoft Foundry model deployments.
73-
* **Azure AI** - Select this option if your clients need to access other models in Microsoft Foundry.
71+
* **Azure OpenAI**: Select this option if your clients only need to access Azure OpenAI in Microsoft Foundry model deployments.
72+
* **Azure AI**: Select this option if your clients need to access other models in Microsoft Foundry.
7473
1. Select **Next**.
7574

7675
:::image type="content" source="media/azure-ai-foundry-api/client-compatibility.png" alt-text="Screenshot of Microsoft Foundry API configuration in the portal.":::
7776

78-
1. On the **Manage token consumption** tab, optionally enter settings or accept defaults that define the following policies to help monitor and manage the API:
77+
1. On the **Manage token consumption** tab, optionally enter settings, or accept defaults that define the following policies to help monitor and manage the API:
7978
* [Manage token consumption](llm-token-limit-policy.md)
80-
* [Track token usage](llm-emit-token-metric-policy.md)
81-
1. On the **Apply semantic caching** tab, optionally enter settings or accept defaults that define the policies to help optimize performance and reduce latency for the API:
79+
* [Track token usage](llm-emit-token-metric-policy.md)
80+
1. On the **Apply semantic caching** tab, optionally enter settings, or accept defaults that define the policies to help optimize performance and reduce latency for the API:
8281
* [Enable semantic caching of responses](azure-openai-enable-semantic-caching.md)
83-
1. On the **AI content safety**, optionally enter settings or accept defaults to configure the Azure AI Content Safety service to block prompts with unsafe content:
82+
1. On the **AI content safety**, optionally enter settings, or accept defaults to configure the Azure AI Content Safety service to block prompts with unsafe content:
8483
* [Enforce content safety checks on LLM requests](llm-content-safety-policy.md)
8584
1. Select **Review**.
86-
1. After settings are validated, select **Create**.
85+
1. After settings are validated, select **Create**.
8786

8887
## Test the AI API
8988

90-
To ensure that your AI API is working as expected, test it in the API Management test console.
89+
To ensure that your AI API is working as expected, test it in the API Management test console.
90+
9191
1. Select the API you created in the previous step.
9292
1. Select the **Test** tab.
9393
1. Select an operation that's compatible with the model deployment.
9494
The page displays fields for parameters and headers.
95-
1. Enter parameters and headers as needed. Depending on the operation, you might need to configure or update a **Request body**. Here's a very basic example request body for a chat completions operation:
95+
1. Enter parameters and headers as needed. Depending on the operation, you might need to configure or update a **Request body**. Here's a basic example request body for a chat completions operation:
9696

9797
```json
9898
{
@@ -113,5 +113,4 @@ To ensure that your AI API is working as expected, test it in the API Management
113113

114114
When the test is successful, the backend responds with a successful HTTP response code and some data. Appended to the response is token usage data to help you monitor and manage your language model token consumption.
115115

116-
117116
[!INCLUDE [api-management-define-api-topics.md](../../includes/api-management-define-api-topics.md)]

articles/app-service/tutorial-java-tomcat-connect-managed-identity-postgresql-database.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: 'Tutorial: Access data with managed identity in Java'
33
description: Secure Azure Database for PostgreSQL connectivity with managed identity from a sample Java Tomcat app, and apply it to other Azure services.
44
ms.devlang: java
55
ms.topic: tutorial
6-
ms.date: 06/04/2024
6+
ms.date: 03/26/2026
77
author: KarlErickson
88
ms.author: karler
99
ms.reviewer: edburns

articles/azure-maps/private-endpoints.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ title: Use private endpoints with Azure Maps
33
description: Learn how to use private endpoints with Azure Maps.
44
author: pbrasil
55
ms.author: peterbr
6-
ms.date: 02/27/2026
7-
ms.topic: how-to
6+
ms.date: 03/26/2026
7+
ms.topic: article
88
ms.service: azure-maps
99
ms.subservice: authentication
1010
---
1111

12-
# Use private endpoints with Azure Maps
12+
# Use private endpoints with Azure Maps (preview)
1313

14-
Azure Maps supports [Azure Private Link](/../private-link/private-link-overview.md), enabling secure access to Azure Maps services through a private endpoint in your virtual network. A private endpoint assigns a private IP address from your virtual network to the Azure Maps service, so traffic between your applications and Azure Maps stays on the Microsoft backbone network instead of the public internet. This provides improved security and network isolation. You can create a private endpoint when you create an Azure Maps account or add one to an existing account.
14+
Azure Maps supports [Azure Private Link](../private-link/private-link-overview.md), enabling secure access to Azure Maps services through a private endpoint in your virtual network. A private endpoint assigns a private IP address from your virtual network to the Azure Maps service, so traffic between your applications and Azure Maps stays on the Microsoft backbone network instead of the public internet. This provides improved security and network isolation. You can create a private endpoint when you create an Azure Maps account or add one to an existing account.
1515

1616
## Benefits of private endpoints for Azure Maps
1717

@@ -82,7 +82,7 @@ Within this zone, a DNS record maps your Azure Maps account's unique ID and regi
8282
Clients inside the virtual network resolve the hostname to a private IP address for private connectivity, while clients outside the network resolve the same hostname to the Azure Maps public endpoint. This split‑horizon DNS approach lets you use a single endpoint URL both inside and outside the virtual network.
8383

8484
If you don't use automatic DNS integration, configure DNS manually so the Azure Maps account hostname
85-
(`<maps-account-client-id>.<location>.privatelink.account.maps.azure.com`) resolves to the private endpoint IP address within your network. For more information, see [Azure Private Endpoint DNS documentation](/../private-link/private-endpoint-dns.md).
85+
(`<maps-account-client-id>.<location>.account.maps.azure.com`) resolves to the private endpoint IP address within your network. For more information, see [Azure Private Endpoint DNS documentation](../private-link/private-endpoint-dns.md).
8686

8787
### 3. Use the private endpoint in your applications
8888

@@ -92,7 +92,7 @@ To use the private endpoint, configure your applications to call the **Azure Map
9292

9393
The access pattern is:
9494

95-
`https://{maps-account-client-id}.{location}.privatelink.account.maps.azure.com`
95+
`https://{maps-account-client-id}.{location}.account.maps.azure.com`
9696

9797
> [!Important]
9898
> If your application continues to use the default Azure Maps endpoint (such as `atlas.microsoft.com`), requests won't be routed through the private endpoint. Azure Maps SDKs support overriding the default endpoint, so configure your SDK or connection code to use your Azure Maps account–specific hostname. When configured, requests from within your network are automatically routed through Private Link.
@@ -118,5 +118,5 @@ Ask Copilot
118118

119119
## Related content
120120

121-
- [Azure Private Endpoint private DNS zone values](/../private-link/private-endpoint-dns.md)
122-
- [Azure Private Link availability](/../private-link/availability.md)
121+
- [Azure Private Endpoint private DNS zone values](../private-link/private-endpoint-dns.md)
122+
- [Azure Private Link availability](../private-link/availability.md)

0 commit comments

Comments
 (0)