Skip to content

Commit b7c92fe

Browse files
Dirty PR
2 parents 213ae9e + 846803f commit b7c92fe

272 files changed

Lines changed: 5091 additions & 2349 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

articles/api-management/private-endpoint.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: azure-api-management
55
author: dlepow
66
ms.author: danlep
77
ms.topic: how-to
8-
ms.date: 11/17/2025
8+
ms.date: 03/17/2026
99
ms.custom:
1010
- build-2025
1111
- sfi-image-nochange
@@ -32,7 +32,9 @@ You can configure an inbound [private endpoint](../private-link/private-endpoint
3232
* Only the API Management instance's **Gateway endpoint** supports inbound Private Link connections.
3333
* Each API Management instance supports at most 100 Private Link connections.
3434
* Connections aren't supported on the [self-hosted gateway](self-hosted-gateway-overview.md) or on a [workspace gateway](workspaces-overview.md#workspace-gateway).
35-
* In the classic API Management tiers, private endpoints aren't supported in instances injected in an internal or external virtual network.
35+
* In the classic API Management tiers, private endpoints aren't supported in instances injected in an internal or external virtual network.
36+
> [!NOTE]
37+
> In the Standard v2 and Premium v2 tiers, private endpoints are supported in instances with any supported virtual network configuration when fronted with [Azure Front Door Premium](../frontdoor/standard-premium/how-to-enable-private-link-apim.md).
3638
3739
## Typical scenarios
3840

@@ -43,9 +45,6 @@ Supported configurations include:
4345
* Pass client requests through a firewall and configure rules to route requests privately to the API Management gateway.
4446
* Configure Azure Front Door (or Azure Front Door with Azure Application Gateway) to receive external traffic and then route traffic privately to the API Management gateway. For example, see [Connect Azure Front Door Premium to an Azure API Management with Private Link](../frontdoor/standard-premium/how-to-enable-private-link-apim.md).
4547

46-
> [!NOTE]
47-
> Currently, routing traffic privately from Azure Front Door to an API Management Premium v2 instance isn't supported.
48-
4948
## Prerequisites
5049

5150
- An existing API Management instance. [Create one if you haven't already](get-started-create-service-instance.md).

articles/app-service/environment/how-to-upgrade-preference.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Configure the upgrade preference for Azure App Service Environment
55
author: seligj95
66
ms.author: jordanselig
77
ms.topic: how-to
8-
ms.date: 03/12/2026
8+
ms.date: 03/17/2026
99
ms.service: azure-app-service
1010
ms.custom:
1111
- devx-track-azurecli
@@ -35,6 +35,8 @@ When you configure automatic upgrades, the platform upgrades your App Service En
3535

3636
In smaller regions, the Early and Late upgrade preferences might be very close to each other.
3737

38+
When automatic upgrades are enabled for an App Service Environment, upgrades from other Azure dependency services are permitted outside of the regional business hours. When manual upgrades are configured, these other service upgrades are gated with the App Service upgrade deployments.
39+
3840
## Review manual upgrade options
3941

4042
When you configure manual upgrades, you receive a notification when an upgrade is available. The availability is also visible in the Azure portal. After the upgrade is available, you typically have 15 days to start the upgrade process. If you don't start the upgrade within the 15 days, the upgrade is processed with the remaining automatic upgrades in the region.

articles/app-service/overview-tls.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ App Service supports the following TLS versions for incoming requests to your we
4040

4141
- **TLS 1.3**. The latest and most secure version, now fully supported.
4242
- **TLS 1.2**. The default minimum TLS version for new web apps.
43-
- **TLS 1.1 and TLS 1.0**. Versions supported for backward compatibility but not recommended.
43+
- **TLS 1.1 and TLS 1.0**. These are legacy protocols and are no longer considered secure.
4444

4545
You can configure the *minimum TLS version* for incoming requests to your web app and its Source Control Manager (SCM) site. By default, the minimum is set to **TLS 1.2**.
4646

@@ -71,12 +71,7 @@ App Service uses a secure set of TLS 1.2 cipher suites to help ensure encrypted
7171

7272
### TLS 1.1 and TLS 1.0
7373

74-
TLS 1.1 and TLS 1.0 are legacy protocols and are no longer considered secure. These versions are supported on App Service only for backward compatibility and should be avoided when possible. The default minimum TLS version for new apps is TLS 1.2, and we recommend that you migrate apps that use TLS 1.1 or TLS 1.0.
75-
76-
> [!IMPORTANT]
77-
> Incoming requests to web apps and incoming requests to Azure are handled differently. App Service continues to support TLS 1.1 and TLS 1.0 for incoming requests to web apps.
78-
>
79-
> For incoming requests made directly to the Azure control plane, for example, through Azure Resource Manager or API calls, we don't recommend that you use TLS 1.1 or TLS 1.0.
74+
TLS 1.1 and TLS 1.0 are legacy protocols and are no longer considered secure. The default minimum TLS version for new apps is TLS 1.2, and we recommend that you migrate apps that use TLS 1.1 or TLS 1.0 to using TLS 1.2 or higher.
8075

8176
## Minimum TLS cipher suite
8277

articles/app-service/webjobs-sdk-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ The following table shows built-in roles that we recommend when you use triggers
158158
[Azure Service Bus Data Receiver]: ../role-based-access-control/built-in-roles.md#azure-service-bus-data-receiver
159159
[Azure Service Bus Data Sender]: ../role-based-access-control/built-in-roles.md#azure-service-bus-data-sender
160160
[Azure Service Bus Data Owner]: ../role-based-access-control/built-in-roles.md#azure-service-bus-data-owner
161-
[role-assignment-scope]: ../service-bus-messaging/service-bus-managed-service-identity.md#resource-scope
161+
[role-assignment-scope]: ../service-bus-messaging/service-bus-managed-service-identity.md#choose-the-resource-scope
162162

163163
#### Connection strings in version 2.*x*
164164

0 commit comments

Comments
 (0)