You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Notes about 'apic-extension' Azure CLI extension installation.
4
4
services: api-center
5
-
5
+
author: dlepow
6
6
7
7
ms.service: azure-api-center
8
8
ms.topic: include
9
-
ms.date: 05/23/2024
10
-
9
+
ms.date: 02/20/2026
10
+
ms.author: danlep
11
11
ms.custom: Include file
12
12
---
13
13
14
14
> [!NOTE]
15
-
> `az apic` commands require the `apic-extension` Azure CLI extension. If you haven't used `az apic` commands, the extension can be installed dynamically when you run your first `az apic` command, or you can install the extension manually. Learn more about [Azure CLI extensions](/cli/azure/azure-cli-extensions-overview).
15
+
> The `az apic` commands require the `apic-extension` Azure CLI extension. The extension can be installed dynamically when you run your first `az apic` command, or you can install the extension manually. For more information, see [Manage Azure CLI Extensions: Install, Update, and Remove](/cli/azure/azure-cli-extensions-overview).
16
16
>
17
-
> See the [release notes](https://github.com/Azure/azure-cli-extensions/blob/main/src/apic-extension/HISTORY.rst) for the latest changes and updates in the `apic-extension`. Certain features may require a preview or specific version of the extension.
17
+
> For the latest changes and updates in the `apic-extension`, see the [release notes](https://github.com/Azure/azure-cli-extensions/blob/main/src/apic-extension/HISTORY.rst). Certain features might require a preview or specific version of the extension.
Copy file name to clipboardExpand all lines: articles/app-service/configure-vnet-integration-routing.md
+10-2Lines changed: 10 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This how-to article walks you through configuring routing on a regi
4
4
author: seligj95
5
5
ms.author: jordanselig
6
6
ms.topic: how-to
7
-
ms.date: 11/24/2025
7
+
ms.date: 02/25/2026
8
8
ms.service: azure-app-service
9
9
---
10
10
@@ -20,7 +20,7 @@ Your app is already integrated using the regional virtual network integration fe
20
20
21
21
Application routing defines what traffic is routed from your app and into the virtual network. You can configure routing at two levels:
22
22
23
-
-**All traffic routing** (`outboundVnetRouting.allTraffic`): Routes all outbound traffic from your app through the virtual network integration, including application traffic and configuration traffic (such as container image pulls, content share access, and backup operations).
23
+
-**All traffic routing** (`outboundVnetRouting.allTraffic`): Routes all outbound traffic from your app through the virtual network integration, including application traffic and configuration traffic (such as container image pulls, content share access, backup operations, and managed identity token acquisition).
24
24
-**Application traffic only** (`outboundVnetRouting.applicationTraffic`): Routes only application-generated traffic through the virtual network integration, while configuration traffic continues to use the public route by default (unless individually configured in the configuration routing section).
25
25
26
26
We recommend that you use the `outboundVnetRouting.allTraffic` property to enable routing of all traffic. Using this property allows you to audit the behavior with [a built-in policy](https://www.azadvertizer.net/azpolicyadvertizer/a691eacb-474d-47e4-b287-b4813ca44222.html).
> For backwards compatibility, the legacy `vnetBackupRestoreEnabled` property is still supported.
116
116
117
+
### Managed identity
118
+
119
+
Routing managed identity token acquisition traffic over virtual network integration can be configured using the Azure CLI. When enabled, requests to acquire Microsoft Entra tokens for managed identities are routed through the virtual network integration.
Copy file name to clipboardExpand all lines: articles/app-service/overview-vnet-integration.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Integrate your app with an Azure virtual network
3
3
description: Integrate your app in Azure App Service with Azure virtual networks.
4
4
author: seligj95
5
5
ms.topic: conceptual
6
-
ms.date: 09/03/2025
6
+
ms.date: 02/25/2026
7
7
ms.update-cycle: 1095-days
8
8
ms.author: jordanselig
9
9
ms.custom:
@@ -92,7 +92,7 @@ For each App Service plan instance, you need:
92
92
For 10 instances:
93
93
5 x 10 = 50 IP addresses per App Service plan
94
94
95
-
Since you have 1 App Service plan, 1 x 50 = 50 IP addresses.
95
+
Since you have 1 App Service plan, 1 x 50 = 50 IP addresses
96
96
97
97
You are in addition limited by the number of cores available in the worker tier used. Each core adds three networking units. The worker itself uses one unit and each virtual network connection uses one unit. The remaining units can be used for apps.
98
98
@@ -151,6 +151,10 @@ When using custom containers, you can pull the container over the virtual networ
151
151
152
152
App Service has built-in backup/restore, but if you want to back up to your own storage account, you can use the custom backup/restore feature. If you want to route the traffic to the storage account through the virtual network integration, you must configure the route setting. Database backup isn't supported over the virtual network integration.
153
153
154
+
#### Managed identity
155
+
156
+
By default, managed identity token acquisition traffic goes over the public route. You can route this traffic through the virtual network integration so that token requests to Microsoft Entra ID are sent through the virtual network. Learn [how to configure managed identity routing](./configure-vnet-integration-routing.md#managed-identity).
157
+
154
158
#### App settings using Key Vault references
155
159
156
160
App settings using Key Vault references attempt to get secrets over the public route. If the Key Vault is blocking public traffic and the app is using virtual network integration, an attempt is made to get the secrets through the virtual network integration.
Copy file name to clipboardExpand all lines: articles/firewall/change-sku.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: duongau
6
6
ms.service: azure-firewall
7
7
ms.topic: how-to
8
-
ms.date: 09/29/2025
8
+
ms.date: 02/21/2026
9
9
ms.author: duau
10
10
ms.custom:
11
11
- devx-track-azurepowershell
@@ -33,7 +33,7 @@ Before you begin, make sure you have:
33
33
- A planned maintenance window (for manual migration method)
34
34
35
35
> [!IMPORTANT]
36
-
> This article applies to Azure Firewall Standard and Premium SKUs only. [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) doesn't support SKU changes and must be migrated to Standard SKU first before any upgrade to Premium. Always perform SKU change operations during scheduled maintenance times and test the process thoroughly in a nonproduction environment first.
36
+
> This article applies primarily to Azure Firewall Standard and Premium SKUs. [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) doesn't support direct change to Premium SKU and must be migrated to Standard SKU first before any upgrade to Premium. Downgrading from Azure Firewall Premium or Standard to Basic is supported only through PowerShell or Terraform. Always perform SKU change operations during scheduled maintenance times and test the process thoroughly in a nonproduction environment first.
37
37
38
38
## Easy SKU change method (recommended)
39
39
@@ -46,7 +46,7 @@ Use the easy SKU change method when:
46
46
- Your firewall is deployed in a supported region
47
47
- You want to minimize downtime (zero downtime with this method)
48
48
- You have a standard deployment without complex custom configurations
49
-
-**For downgrade**: Your Premium policy doesn't use Premium-exclusive features that are incompatible with Standard
49
+
-**For downgrade**: A firewall policy created for a higher SKU (Premium or Standard) can't be attached to a lower SKU firewall. To downgrade, you must create a new firewall policy or use an existing policy that is compatible with the target SKU.
50
50
51
51
### Policy considerations for SKU changes
52
52
@@ -74,7 +74,6 @@ When downgrading from Premium to Standard, consider the following policy require
74
74
**Policy handling options:**
75
75
-**Use existing Standard policy**: Select a preexisting Standard policy that doesn't contain Premium features
76
76
-**Create new Standard policy**: The system can create a new Standard policy, automatically removing Premium-specific features
77
-
-**Modify current policy**: Manually remove Premium features from your current policy before downgrade
78
77
79
78
### Change SKU using the Azure portal
80
79
@@ -88,7 +87,7 @@ To change your firewall SKU using the Azure portal:
88
87
1. In the SKU change dialog box, select **Premium** as the target SKU.
89
88
1. Choose your policy option:
90
89
- Select an existing Premium policy, or
91
-
-Allow the system to upgrade your current Standard policy to Premium
90
+
-Create a new Premium policy and select it.
92
91
1. Select **Save** to begin the upgrade.
93
92
94
93
#### Downgrade to Standard
@@ -110,22 +109,22 @@ The SKU change process typically completes within a few minutes with zero downti
110
109
### PowerShell and Terraform SKU change
111
110
112
111
You can also perform SKU changes using:
113
-
-**PowerShell**: Change the `sku_tier` property to "Premium"or "Standard"
112
+
-**PowerShell**: Change the `sku_tier` property to "Premium", "Standard" or "Basic"
114
113
-**Terraform**: Update the `sku_tier` attribute in your configuration to the desired SKU
115
114
116
115
### Limitations
117
116
118
117
The easy SKU change method has the following limitations:
119
118
120
119
**General limitations:**
121
-
- Doesn't support [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) - Basic SKU users must migrate to Standard first
120
+
- Doesn't support direct upgrades from [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) - Basic SKU users must migrate to Standard first
122
121
- Not available for firewalls with certain complex configurations
123
122
- Limited availability in some regions
124
123
- Requires existing firewall policy (not available for Classic rules)
125
124
126
125
**Downgrade-specific limitations:**
127
126
- Premium features (TLS inspection, IDPS Alert and Deny mode, URL filtering, web categories) must be removed before downgrade
128
-
-If your Premium policy contains incompatible features, you must modify the policy or create a new Standard policy
127
+
-For the new Firewall SKU, you mustuse an existing compatible policy or create a new Standard policy
129
128
- Some rule configurations might need manual adjustment after downgrade
130
129
131
130
If the easy SKU change method isn't available for your scenario, use the manual migration method described in the next section.
@@ -426,7 +425,6 @@ If you're unable to downgrade from Premium to Standard:
426
425
427
426
2.**Policy modification options**:
428
427
- Create a new Standard policy without Premium features
429
-
- Modify your existing policy to remove Premium features
430
428
- Use Azure PowerShell to identify and remove incompatible rules
0 commit comments