Skip to content

Commit b301ebe

Browse files
author
akarshprabhu
committed
2 parents ae91f1b + b4472eb commit b301ebe

557 files changed

Lines changed: 7444 additions & 4004 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.publish.config.json

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -506,6 +506,18 @@
506506
"branch": "dev",
507507
"branch_mapping": {}
508508
},
509+
{
510+
"path_to_root": "functions-nodejs-extensions",
511+
"url": "https://github.com/Azure/azure-functions-nodejs-extensions",
512+
"branch": "main",
513+
"branch_mapping": {}
514+
},
515+
{
516+
"path_to_root": "functions-node-sdk-bindings-blob",
517+
"url": "https://github.com/Azure-Samples/azure-functions-blob-sdk-bindings-nodejs",
518+
"branch": "main",
519+
"branch_mapping": {}
520+
},
509521
{
510522
"path_to_root": "functions-python-tensorflow-tutorial",
511523
"url": "https://github.com/Azure-Samples/functions-python-tensorflow-tutorial",
@@ -688,25 +700,25 @@
688700
{
689701
"path_to_root": "app-service-agentic-semantic-kernel-ai-foundry-agent",
690702
"url": "https://github.com/Azure-Samples/app-service-agentic-semantic-kernel-ai-foundry-agent",
691-
"branch": "agentfx",
703+
"branch": "main",
692704
"branch_mapping": {}
693705
},
694706
{
695707
"path_to_root": "app-service-agentic-langgraph-foundry-node",
696708
"url": "https://github.com/Azure-Samples/app-service-agentic-langgraph-foundry-node",
697-
"branch": "agentfx",
709+
"branch": "main",
698710
"branch_mapping": {}
699711
},
700712
{
701713
"path_to_root": "app-service-agentic-langgraph-foundry-python",
702714
"url": "https://github.com/Azure-Samples/app-service-agentic-langgraph-foundry-python",
703-
"branch": "agentfx",
715+
"branch": "main",
704716
"branch_mapping": {}
705717
},
706718
{
707719
"path_to_root": "app-service-agentic-semantic-kernel-java",
708720
"url": "https://github.com/Azure-Samples/app-service-agentic-semantic-kernel-java",
709-
"branch": "agentfx",
721+
"branch": "main",
710722
"branch_mapping": {}
711723
},
712724
{

articles/active-directory-b2c/partner-asignio.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ The following diagram illustrates the implementation.
7676

7777
## Configure an application with Asignio
7878

79-
Configurating an application with Asignio is with the Asignio Partner Administration site.
79+
Configuring an application with Asignio is with the Asignio Partner Administration site.
8080

8181
1. To request access for your organization, go to asignio.com [Asignio Partner Administration](https://partner.asignio.com) page.
8282
2. With credentials, sign into Asignio Partner Administration.

articles/api-management/api-management-howto-api-inspector.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -173,8 +173,10 @@ To help automate these steps with the [Visual Studio Code REST Client](https://m
173173
@apiEndPoint = // API URL
174174
@requestBody = // Data to send
175175
@tenantId = // Tenant ID
176-
177-
POST https://login.microsoftonline.com/{tenantId}/oauth2/token
176+
@apiId = // Api Id for which trace log is to be generated.
177+
178+
# @name login
179+
POST https://login.microsoftonline.com/{{tenantId}}/oauth2/token
178180
content-type: application/x-www-form-urlencoded
179181
180182
grant_type=client_credentials&client_id={{clientId}}&client_secret={{clientSecret}}&resource=https%3A%2F%2Fmanagement.azure.com%2F
@@ -185,6 +187,7 @@ grant_type=client_credentials&client_id={{clientId}}&client_secret={{clientSecre
185187
# @name listDebugCredentials
186188
POST https://management.azure.com/subscriptions/{{subscriptionId}}/resourceGroups/{{resourceGroup}}/providers/Microsoft.ApiManagement/service/{{apimName}}/gateways/managed/listDebugCredentials?api-version=2023-05-01-preview
187189
Authorization: Bearer {{authToken}}
190+
188191
Content-Type: application/json
189192
{
190193
"credentialsExpireAfter": "PT1H",
@@ -197,7 +200,13 @@ Content-Type: application/json
197200
198201
###
199202
# @name callApi
200-
curl -k -H "Apim-Debug-Authorization: {{debugToken}}" -H 'Host: {{externalHost}}' -H 'Ocp-Apim-Subscription-Key: {{subscriptionKey}}' -H 'Content-Type: application/json' '{{apiEndPoint}}' -d '{{requestBody}}'
203+
POST {{apiEndPoint}} HTTP/1.1
204+
Host: {{externalHost}}
205+
Apim-Debug-Authorization: {{debugToken}}
206+
Ocp-Apim-Subscription-Key: {{subscriptionKey}}
207+
Content-Type: application/json
208+
209+
{{requestBody}}
201210
202211
###
203212
@traceId = {{callApi.response.headers.Apim-Trace-Id}}

articles/api-management/api-management-howto-disaster-recovery-backup-restore.md

Lines changed: 3 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: azure-api-management
99
ms.topic: how-to
10-
ms.date: 12/05/2025
10+
ms.date: 12/18/2025
1111
ms.author: danlep
1212
ms.custom: devx-track-azurepowershell
1313
---
@@ -29,7 +29,7 @@ This article shows how to automate backup and restore operations of your API Man
2929
> Each backup expires after 30 days. If you attempt to restore a backup after the 30-day expiration period has expired, the restore will fail with a `Cannot restore: backup expired` message.
3030
3131
> [!IMPORTANT]
32-
> Restore operation doesn't change custom hostname configuration of the target service. We recommend to use the same custom hostname and TLS certificate for both active and standby services, so that, after restore operation completes, the traffic can be re-directed to the standby instance by a simple DNS CNAME change.
32+
> Restore operation doesn't change custom hostname configuration of the target service. We recommend using the same custom hostname and TLS certificate for both active and standby services, so that, after restore operation completes, the traffic can be re-directed to the standby instance by a simple DNS CNAME change.
3333
3434

3535
[!INCLUDE [updated-for-az](~/reusable-content/ce-skilling/azure/includes/updated-for-az.md)]
@@ -399,18 +399,7 @@ Restore is a long-running operation that may take several minutes to complete. I
399399
## Storage networking constraints
400400

401401

402-
If the storage account is **[firewall][azure-storage-ip-firewall] enabled**, it's recommended to use the API Management instance's system-assigned managed identity for access to the account. Ensure that you have networking line of sight from API Management. Configure one of the following network access options on the resource:
403-
404-
- Allow public access from all networks.
405-
406-
- Set a network security rule to allow API Management traffic based on the IP address or virtual network connectivity.
407-
408-
- Secure traffic from API Management with Private Link connectivity.
409-
410-
- Use a [network security perimeter](/azure/private-link/network-security-perimeter-concepts#onboarded-private-link-resources) to secure the resource and allow traffic from API Management.
411-
412-
> [!IMPORTANT]
413-
> Starting March 2026, trusted service connectivity to Azure services from API Management by enabling the **Allow Trusted Microsoft Services to bypass this firewall** firewall setting will no longer be supported. To continue accessing these services from API Management after this change, ensure that you choose a supported network access option as described above. [Learn more](breaking-changes/trusted-service-connectivity-retirement-march-2026.md)
402+
If the storage account is **[firewall][azure-storage-ip-firewall] enabled**, it's recommended to use the API Management instance's system-assigned managed identity for access to the account. Ensure that the storage account [grants access to trusted Azure services](../storage/common/storage-network-security.md?tabs=azure-portal#grant-access-to-trusted-azure-services).
414403

415404
## What is not backed up
416405
- **Usage data** used for creating analytics reports **isn't included** in the backup. Use [Azure API Management REST API][azure api management rest api] to periodically retrieve analytics reports for safekeeping.

articles/api-management/api-management-howto-use-managed-service-identity.md

Lines changed: 7 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: how-to
9-
ms.date: 05/19/2025
9+
ms.date: 12/18/2025
1010
ms.author: danlep
1111
ms.custom:
1212
- devx-track-azurepowershell
@@ -314,27 +314,17 @@ You can use the system-assigned identity to authenticate to a backend service vi
314314

315315
### Connect to Azure resources behind an IP firewall by using a system-assigned managed identity
316316

317-
For certain scenarios, API Management can communicate with resources in the following services using a system-assigned managed identity configured with an appropriate role assignment:
317+
API Management is a trusted Microsoft service to the following resources. This trusted status enables the service to connect to the following resources behind a firewall when the firewall enables a setting to **Allow Trusted Microsoft Services to bypass this firewall**. After you explicitly assign the appropriate Azure role to the [system-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md) for a resource instance, the scope of access for the instance corresponds to the Azure role that's assigned to the managed identity.
318318

319-
- Azure Key Vault
320-
- Azure Storage
321-
- Azure Service Bus
322-
- Azure Event Hubs
323-
- Azure Container Registry
324-
- Azure Managed HSM
325319

326-
For resources in these services that are protected by an IP firewall, ensure that you have networking line of sight from API Management. Configure one of the following network access options on the resource:
320+
- [Trusted access for Key Vault](/azure/key-vault/general/overview-vnet-service-endpoints#trusted-services)
321+
- [Trusted access for Azure Storage](../storage/common/storage-network-security-trusted-azure-services.md?tabs=azure-portal#trusted-access-based-on-system-assigned-managed-identity)
322+
- [Trusted access for Azure Service Bus](../service-bus-messaging/service-bus-ip-filtering.md#trusted-microsoft-services)
323+
- [Trusted access for Azure Event Hubs](../event-hubs/event-hubs-ip-filtering.md#trusted-microsoft-services)
327324

328-
- Allow public access from all networks.
329-
330-
- Set a network security rule to allow API Management traffic based on the IP address or virtual network connectivity.
331-
332-
- Secure traffic from API Management with Private Link connectivity.
333-
334-
- Use a [network security perimeter](/azure/private-link/network-security-perimeter-concepts#onboarded-private-link-resources) to secure the resource and allow traffic from API Management.
335325

336326
> [!IMPORTANT]
337-
> Starting March 2026, trusted service connectivity to Azure services from API Management by enabling the **Allow Trusted Microsoft Services to bypass this firewall** firewall setting will no longer be supported. To continue accessing these services from API Management after this change, ensure that you choose a supported network access option as described above. [Learn more](breaking-changes/trusted-service-connectivity-retirement-march-2026.md)
327+
> Starting March 2026, trusted service connectivity to Azure services from the API Management gateway by enabling the **Allow Trusted Microsoft Services to bypass this firewall** firewall setting will no longer be supported. To continue accessing these services from the API Management gateway after this change, ensure that you choose a different supported network access option. For control-plane operations, you can continue to use trusted service connectivity. [Learn more](breaking-changes/trusted-service-connectivity-retirement-march-2026.md).
338328
339329
### Log events to an event hub
340330

articles/api-management/backends.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,9 @@ To add CA certificate details, follow these steps:
118118
> [!NOTE]
119119
> When you configure details of a custom CA certificate in the backend entity, API Management always validates the certificate name and certificate chain, regardless of whether you enable or disable validation settings in the backend's `backendTlsProperties`.
120120
121+
> [!TIP]
122+
> You can also configure CA certificate details programmatically by using the API Management REST API. Set the `backendTlsProperties` in the [backend entity](/rest/api/apimanagement/backend/create-or-update?view=rest-apimanagement-2025-03-01-preview&preserve-view=true#backendtlsproperties).
123+
121124
## Reference backend using set-backend-service policy
122125

123126
After creating a backend, you can reference the backend identifier (name) in your APIs. Use the [`set-backend-service`](set-backend-service-policy.md) policy to direct an incoming API request to the backend. If you already configured a backend web service for an API, you can use the `set-backend-service` policy to redirect the request to a backend entity instead. For example:

articles/api-management/breaking-changes/trusted-service-connectivity-retirement-march-2026.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Azure API Management - Trusted service connectivity retirement (March 2026)
3-
description: Azure API Management is retiring trusted service connectivity to supported Azure services as of March 2026. Use alternative networking options for secure connectivity.
3+
description: Azure API Management is retiring trusted service connectivity by the gateway to supported Azure services as of March 2026. Use alternative networking options for secure connectivity.
44
#customer intent: As an Azure admin, I want to determine if my API Management service is affected by the trusted service connectivity retirement so that I can plan necessary changes.
55
author: dlepow
66
ms.author: danlep
7-
ms.date: 12/05/2025
7+
ms.date: 12/18/2025
88
ms.topic: reference
99
ms.service: azure-api-management
1010
ai-usage: ai-assisted
@@ -15,9 +15,9 @@ ai-usage: ai-assisted
1515

1616
[!INCLUDE [api-management-availability-all-tiers](../../../includes/api-management-availability-all-tiers.md)]
1717

18-
Effective 15 March 2026, Azure API Management is retiring trusted service connectivity to supported Azure services - Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hub, and Container Registry. If your API Management resource relies on this feature to communicate with these services after 15 March 2026, the communication will fail. Use alternative networking options to securely connect to those services.
18+
Effective 15 March 2026, Azure API Management is retiring trusted service connectivity by the API Management gateway to supported Azure services - Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, and Container Registry. If your API Management gateway relies on this feature to communicate with these services after 15 March 2026, the communication will fail. Use alternative networking options to securely connect to those services.
1919

20-
API Management services created on or after 1 December 2025 no longer support trusted service connectivity. Contact Azure support if you need to enable trusted service connectivity in those services until the retirement date.
20+
The gateway in API Management services created on or after 1 December 2025 no longer supports trusted service connectivity. Contact Azure support if you need to enable trusted service connectivity in those services until the retirement date.
2121

2222
## Is my service affected by this change?
2323

@@ -27,19 +27,19 @@ First, check for an Azure Advisor recommendation:
2727
1. Select the **Recommendations > Operational excellence** category.
2828
1. Search for "**Disable trusted service connectivity in API Management**".
2929

30-
**If you don't see a recommendation**, your API Management resource isn't affected by the change.
30+
**If you don't see a recommendation**, your API Management gateway isn't affected by the change.
3131

32-
**If you see a recommendation**, your API Management resource is affected by the breaking change and you need to take action:
32+
**If you see a recommendation**, your API Management gateway is affected by the breaking change and you need to take action:
3333

34-
1. Determine if your API Management resource relies on trusted service connectivity to Azure services.
34+
1. Determine if your API Management gateway relies on trusted service connectivity to Azure services.
3535
1. If it does, update the networking configuration to eliminate the dependency on trusted service connectivity. If it doesn’t, proceed to the next step.
36-
1. Disable trusted service connectivity in API Management.
36+
1. Disable trusted service connectivity in your API Management gateway.
3737

38-
### Step 1: Does my API Management resource rely on trusted service connectivity?
38+
### Step 1: Does my API Management gateway rely on trusted service connectivity?
3939

40-
API Management should no longer rely on trusted service connectivity to Azure services. Instead, it should establish a networking line of sight.
40+
Your API Management gateway should no longer rely on trusted service connectivity to Azure services. Instead, it should establish a networking line of sight.
4141

42-
To verify if API Management relies on trusted connectivity to Azure services, check the networking configuration of all Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hub, and Container Registry resources that API Management connects to:
42+
To verify if your API Management gateway relies on trusted connectivity to Azure services, check the networking configuration of all Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, and Container Registry resources that your API Management gateway connects to:
4343

4444
#### For Storage accounts
4545

@@ -72,7 +72,7 @@ To verify if API Management relies on trusted connectivity to Azure services, ch
7272

7373
### Step 2: Eliminate dependency on trusted service connectivity
7474

75-
If you verified that API Management relies on trusted connectivity to Azure resources, you need to eliminate this dependency by establishing a networking line of sight for communication from API Management to the listed services.
75+
If you verified that your API Management gateway relies on trusted connectivity to Azure resources, you need to eliminate this dependency by establishing a networking line of sight for communication from API Management to the listed services.
7676

7777
You can configure the networking of target resources to one of the following options:
7878

@@ -88,11 +88,11 @@ You can configure the networking of target resources to one of the following opt
8888

8989
- [Transition to a Network Security Perimeter in Azure](/azure/private-link/network-security-perimeter-transition)
9090

91-
### Step 3: Disable trusted service connectivity in API Management
91+
### Step 3: Disable trusted service connectivity in API Management gateway
9292

93-
After ensuring that API Management doesnt access other Azure services using trusted service connectivity, you must explicitly disable trusted connectivity in your API Management service to acknowledge you have verified that the service no longer depends on trusted connectivity.
93+
After ensuring that your API Management gateway doesn't access other Azure services using trusted service connectivity, you must explicitly disable trusted connectivity in your gateway to acknowledge you have verified that the service no longer depends on trusted connectivity.
9494

95-
To do so, set a custom property `Microsoft.WindowsAzure.ApiManagement.Gateway.ManagedIdentity.DisableOverPrivilegedAccess` to `"True"` on the [API Management resource](/rest/api/apimanagement/api-management-service/create-or-update). For example:
95+
To do so, set a custom property `Microsoft.WindowsAzure.ApiManagement.Gateway.ManagedIdentity.DisableOverPrivilegedAccess` to `"True"` on the [API Management gateway](/rest/api/apimanagement/api-management-service/create-or-update). For example:
9696

9797

9898
```json
@@ -116,11 +116,11 @@ To do so, set a custom property `Microsoft.WindowsAzure.ApiManagement.Gateway.Ma
116116
}
117117
```
118118

119-
The Azure Advisor recommendation should disappear within a day or two of disabling the trusted connectivity on the API Management service.
119+
The Azure Advisor recommendation should disappear within a day or two of disabling the trusted connectivity on the API Management gateway.
120120

121121
## What is the deadline for the change?
122122

123-
After 15 March 2026, the trusted connectivity from API Management to supported Azure services - Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, and Container Registry - is retired. If your API Management resource relies on this feature to establish communication with these services, the communication will start failing after that date.
123+
After 15 March 2026, the trusted connectivity from the API Management gateway to supported Azure services - Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, and Container Registry - is retired. If your API Management gateway relies on this feature to establish communication with these services, the communication will start failing after that date.
124124

125125
## Help and support
126126

0 commit comments

Comments
 (0)