Skip to content

Commit b76eb98

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ip-freshness
2 parents 9c42319 + 090cfd8 commit b76eb98

13 files changed

Lines changed: 139 additions & 94 deletions
Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
22
title: Include file
3-
description: Include file
3+
description: Notes about 'apic-extension' Azure CLI extension installation.
44
services: api-center
5-
5+
author: dlepow
66

77
ms.service: azure-api-center
88
ms.topic: include
9-
ms.date: 05/23/2024
10-
9+
ms.date: 02/20/2026
10+
ms.author: danlep
1111
ms.custom: Include file
1212
---
1313

1414
> [!NOTE]
15-
> `az apic` commands require the `apic-extension` Azure CLI extension. If you haven't used `az apic` commands, the extension can be installed dynamically when you run your first `az apic` command, or you can install the extension manually. Learn more about [Azure CLI extensions](/cli/azure/azure-cli-extensions-overview).
15+
> The `az apic` commands require the `apic-extension` Azure CLI extension. The extension can be installed dynamically when you run your first `az apic` command, or you can install the extension manually. For more information, see [Manage Azure CLI Extensions: Install, Update, and Remove](/cli/azure/azure-cli-extensions-overview).
1616
>
17-
> See the [release notes](https://github.com/Azure/azure-cli-extensions/blob/main/src/apic-extension/HISTORY.rst) for the latest changes and updates in the `apic-extension`. Certain features may require a preview or specific version of the extension.
17+
> For the latest changes and updates in the `apic-extension`, see the [release notes](https://github.com/Azure/azure-cli-extensions/blob/main/src/apic-extension/HISTORY.rst). Certain features might require a preview or specific version of the extension.
99.6 KB
Loading
Binary file not shown.
42.1 KB
Loading
73.3 KB
Loading

articles/api-center/register-apis-github-actions.md

Lines changed: 92 additions & 62 deletions
Large diffs are not rendered by default.

articles/app-service/configure-vnet-integration-routing.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This how-to article walks you through configuring routing on a regi
44
author: seligj95
55
ms.author: jordanselig
66
ms.topic: how-to
7-
ms.date: 11/24/2025
7+
ms.date: 02/25/2026
88
ms.service: azure-app-service
99
---
1010

@@ -20,7 +20,7 @@ Your app is already integrated using the regional virtual network integration fe
2020

2121
Application routing defines what traffic is routed from your app and into the virtual network. You can configure routing at two levels:
2222

23-
- **All traffic routing** (`outboundVnetRouting.allTraffic`): Routes all outbound traffic from your app through the virtual network integration, including application traffic and configuration traffic (such as container image pulls, content share access, and backup operations).
23+
- **All traffic routing** (`outboundVnetRouting.allTraffic`): Routes all outbound traffic from your app through the virtual network integration, including application traffic and configuration traffic (such as container image pulls, content share access, backup operations, and managed identity token acquisition).
2424
- **Application traffic only** (`outboundVnetRouting.applicationTraffic`): Routes only application-generated traffic through the virtual network integration, while configuration traffic continues to use the public route by default (unless individually configured in the configuration routing section).
2525

2626
We recommend that you use the `outboundVnetRouting.allTraffic` property to enable routing of all traffic. Using this property allows you to audit the behavior with [a built-in policy](https://www.azadvertizer.net/azpolicyadvertizer/a691eacb-474d-47e4-b287-b4813ca44222.html).
@@ -114,6 +114,14 @@ az resource update --resource-group <group-name> --name <app-name> --resource-ty
114114
> [!NOTE]
115115
> For backwards compatibility, the legacy `vnetBackupRestoreEnabled` property is still supported.
116116
117+
### Managed identity
118+
119+
Routing managed identity token acquisition traffic over virtual network integration can be configured using the Azure CLI. When enabled, requests to acquire Microsoft Entra tokens for managed identities are routed through the virtual network integration.
120+
121+
```azurecli-interactive
122+
az resource update --resource-group <group-name> --name <app-name> --resource-type "Microsoft.Web/sites" --set properties.outboundVnetRouting.managedIdentityTraffic=true
123+
```
124+
117125
## Next steps
118126

119127
- [Enable virtual network integration](./configure-vnet-integration-enable.md)

articles/app-service/overview-vnet-integration.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Integrate your app with an Azure virtual network
33
description: Integrate your app in Azure App Service with Azure virtual networks.
44
author: seligj95
55
ms.topic: conceptual
6-
ms.date: 09/03/2025
6+
ms.date: 02/25/2026
77
ms.update-cycle: 1095-days
88
ms.author: jordanselig
99
ms.custom:
@@ -92,7 +92,7 @@ For each App Service plan instance, you need:
9292
For 10 instances:
9393
5 x 10 = 50 IP addresses per App Service plan
9494

95-
Since you have 1 App Service plan, 1 x 50 = 50 IP addresses.
95+
Since you have 1 App Service plan, 1 x 50 = 50 IP addresses
9696

9797
You are in addition limited by the number of cores available in the worker tier used. Each core adds three networking units. The worker itself uses one unit and each virtual network connection uses one unit. The remaining units can be used for apps.
9898

@@ -151,6 +151,10 @@ When using custom containers, you can pull the container over the virtual networ
151151

152152
App Service has built-in backup/restore, but if you want to back up to your own storage account, you can use the custom backup/restore feature. If you want to route the traffic to the storage account through the virtual network integration, you must configure the route setting. Database backup isn't supported over the virtual network integration.
153153

154+
#### Managed identity
155+
156+
By default, managed identity token acquisition traffic goes over the public route. You can route this traffic through the virtual network integration so that token requests to Microsoft Entra ID are sent through the virtual network. Learn [how to configure managed identity routing](./configure-vnet-integration-routing.md#managed-identity).
157+
154158
#### App settings using Key Vault references
155159

156160
App settings using Key Vault references attempt to get secrets over the public route. If the Key Vault is blocking public traffic and the app is using virtual network integration, an attempt is made to get the secrets through the virtual network integration.

articles/communication-services/concepts/interop/tpe/teams-phone-extensibility-capabilities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ The following list of capabilities is supported for scenarios where at least one
6262
| | Cancel all Media Operations || ✔️ |
6363
| | Start continuous DTMF Recognition from end user | N/A | ✔️ |
6464
| | Stream real-time transcript of the call to a WebSocket | N/A | ✔️ |
65-
| | Mute other VoIP participants (such as other agents) | ✔️ | ✔️ |
65+
| | Mute other VoIP participants (such as other agents) | ✔️ | |
6666
| | Mute other PSTN users |||
6767
| | [Dial-pad commands](/microsoftteams/audio-conferencing-common-questions#what-in-meeting-dial-pad-commands-are-supported) for PSTN users |||
6868
| | Place call on hold and take call off hold (1:1 call only) | ✔️ ||

articles/firewall/change-sku.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: duongau
66
ms.service: azure-firewall
77
ms.topic: how-to
8-
ms.date: 09/29/2025
8+
ms.date: 02/21/2026
99
ms.author: duau
1010
ms.custom:
1111
- devx-track-azurepowershell
@@ -33,7 +33,7 @@ Before you begin, make sure you have:
3333
- A planned maintenance window (for manual migration method)
3434

3535
> [!IMPORTANT]
36-
> This article applies to Azure Firewall Standard and Premium SKUs only. [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) doesn't support SKU changes and must be migrated to Standard SKU first before any upgrade to Premium. Always perform SKU change operations during scheduled maintenance times and test the process thoroughly in a nonproduction environment first.
36+
> This article applies primarily to Azure Firewall Standard and Premium SKUs. [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) doesn't support direct change to Premium SKU and must be migrated to Standard SKU first before any upgrade to Premium. Downgrading from Azure Firewall Premium or Standard to Basic is supported only through PowerShell or Terraform. Always perform SKU change operations during scheduled maintenance times and test the process thoroughly in a nonproduction environment first.
3737
3838
## Easy SKU change method (recommended)
3939

@@ -46,7 +46,7 @@ Use the easy SKU change method when:
4646
- Your firewall is deployed in a supported region
4747
- You want to minimize downtime (zero downtime with this method)
4848
- You have a standard deployment without complex custom configurations
49-
- **For downgrade**: Your Premium policy doesn't use Premium-exclusive features that are incompatible with Standard
49+
- **For downgrade**: A firewall policy created for a higher SKU (Premium or Standard) can't be attached to a lower SKU firewall. To downgrade, you must create a new firewall policy or use an existing policy that is compatible with the target SKU.
5050

5151
### Policy considerations for SKU changes
5252

@@ -74,7 +74,6 @@ When downgrading from Premium to Standard, consider the following policy require
7474
**Policy handling options:**
7575
- **Use existing Standard policy**: Select a preexisting Standard policy that doesn't contain Premium features
7676
- **Create new Standard policy**: The system can create a new Standard policy, automatically removing Premium-specific features
77-
- **Modify current policy**: Manually remove Premium features from your current policy before downgrade
7877

7978
### Change SKU using the Azure portal
8079

@@ -88,7 +87,7 @@ To change your firewall SKU using the Azure portal:
8887
1. In the SKU change dialog box, select **Premium** as the target SKU.
8988
1. Choose your policy option:
9089
- Select an existing Premium policy, or
91-
- Allow the system to upgrade your current Standard policy to Premium
90+
- Create a new Premium policy and select it.
9291
1. Select **Save** to begin the upgrade.
9392

9493
#### Downgrade to Standard
@@ -110,22 +109,22 @@ The SKU change process typically completes within a few minutes with zero downti
110109
### PowerShell and Terraform SKU change
111110

112111
You can also perform SKU changes using:
113-
- **PowerShell**: Change the `sku_tier` property to "Premium" or "Standard"
112+
- **PowerShell**: Change the `sku_tier` property to "Premium", "Standard" or "Basic"
114113
- **Terraform**: Update the `sku_tier` attribute in your configuration to the desired SKU
115114

116115
### Limitations
117116

118117
The easy SKU change method has the following limitations:
119118

120119
**General limitations:**
121-
- Doesn't support [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) - Basic SKU users must migrate to Standard first
120+
- Doesn't support direct upgrades from [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) - Basic SKU users must migrate to Standard first
122121
- Not available for firewalls with certain complex configurations
123122
- Limited availability in some regions
124123
- Requires existing firewall policy (not available for Classic rules)
125124

126125
**Downgrade-specific limitations:**
127126
- Premium features (TLS inspection, IDPS Alert and Deny mode, URL filtering, web categories) must be removed before downgrade
128-
- If your Premium policy contains incompatible features, you must modify the policy or create a new Standard policy
127+
- For the new Firewall SKU, you mustuse an existing compatible policy or create a new Standard policy
129128
- Some rule configurations might need manual adjustment after downgrade
130129

131130
If the easy SKU change method isn't available for your scenario, use the manual migration method described in the next section.
@@ -426,7 +425,6 @@ If you're unable to downgrade from Premium to Standard:
426425

427426
2. **Policy modification options**:
428427
- Create a new Standard policy without Premium features
429-
- Modify your existing policy to remove Premium features
430428
- Use Azure PowerShell to identify and remove incompatible rules
431429

432430
3. **Validation steps**:

0 commit comments

Comments
 (0)