Skip to content

Commit e09a3b5

Browse files
committed
Merge branch 'main' into release-rsa-sentinel-platform
2 parents e807dba + 911e200 commit e09a3b5

201 files changed

Lines changed: 2365 additions & 1747 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

articles/api-management/v2-service-tiers-overview.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: concept-article
9-
ms.date: 02/05/2026
9+
ms.date: 03/27/2026
1010
ms.author: danlep
1111
ms.custom:
1212
- references_regions
@@ -17,11 +17,11 @@ ms.custom:
1717

1818
[!INCLUDE [api-management-availability-basicv2-standardv2-premiumv2](../../includes/api-management-availability-basicv2-standardv2-premiumv2.md)]
1919

20-
The API Management v2 tiers (SKUs) are built on a new, more reliable and scalable platform and are designed to make API Management accessible to a broader set of customers and offer flexible options for a wider variety of scenarios. The v2 tiers are in addition to the existing classic tiers (Developer, Basic, Standard, and Premium) and the Consumption tier. [See detailed comparison of API Management tiers](api-management-features.md).
20+
The API Management v2 tiers (SKUs) are built on a new, more reliable and scalable platform. They're designed to make API Management accessible to a broader set of customers and offer flexible options for a wider variety of scenarios. The v2 tiers are in addition to the existing classic tiers (Developer, Basic, Standard, and Premium) and the Consumption tier. [See detailed comparison of API Management tiers](api-management-features.md).
2121

2222
The following v2 tiers are generally available:
2323

24-
* **Basic v2** - The Basic v2 tier is designed for development and testing scenarios, and is supported with an SLA.
24+
* **Basic v2** - The Basic v2 tier is designed for development and testing scenarios, and it comes with an SLA.
2525

2626
* **Standard v2** - Standard v2 is a production-ready tier with support for network-isolated backends.
2727

@@ -33,7 +33,7 @@ The following v2 tiers are generally available:
3333

3434
* **Simplified networking** - The Standard v2 and Premium v2 tiers provide [networking options](#networking-options) to isolate API Management's inbound and outbound traffic.
3535

36-
* **More options for production workloads** - The v2 tiers are all supported with an SLA.
36+
* **More options for production workloads** - The v2 tiers all come with an SLA.
3737

3838
* **Developer portal options** - Enable the [developer portal](api-management-howto-developer-portal.md) when you're ready to let API consumers discover your APIs.
3939

@@ -42,11 +42,11 @@ The following v2 tiers are generally available:
4242

4343
### API version
4444

45-
The latest capabilities of the v2 tiers are supported in API Management API version **2024-05-01** or later.
45+
API Management supports the latest capabilities of the v2 tiers in API version **2024-05-01** or later.
4646

4747
## Networking options
4848

49-
* **Standard v2** and **Premium v2** support **virtual network integration** to allow your API Management instance to reach API backends that are isolated in a single connected virtual network. The API Management gateway, management plane, and developer portal remain publicly accessible from the internet. The virtual network must be in the same region and subscription as the API Management instance. [Learn more](integrate-vnet-outbound.md).
49+
* **Standard v2** and **Premium v2** support **virtual network integration**. This feature allows your API Management instance to reach API backends that are isolated in a single connected virtual network. The API Management gateway, management plane, and developer portal remain publicly accessible from the internet. The virtual network must be in the same region and subscription as the API Management instance. [Learn more](integrate-vnet-outbound.md).
5050

5151
* **Standard v2** and **Premium v2** also support inbound [private endpoint connections](private-endpoint.md) to the API Management gateway.
5252

@@ -58,7 +58,7 @@ For a current list of regions where the v2 tiers are available, see [Availabilit
5858

5959
### Classic feature availability
6060

61-
Most capabilities of the classic API Management tiers are supported directly in the v2 tiers. However, some features have replacements in the v2 tiers, and some currently aren't available. For detailed comparisons, see
61+
The v2 tiers support most capabilities of the classic API Management tiers. However, some features have replacements in the v2 tiers, and some features currently aren't available. For detailed comparisons, see:
6262

6363
* [Feature-based comparison of the Azure API Management tiers](api-management-features.md)
6464
* [API Management gateways overview](api-management-gateways-overview.md)
@@ -76,7 +76,7 @@ Most capabilities of the classic API Management tiers are supported directly in
7676

7777
#### Currently unavailable features
7878

79-
The following are currently unavailable in the v2 tiers.
79+
The following features are currently unavailable in the v2 tiers.
8080

8181
**Infrastructure and configuration**
8282
* Multi-region deployment
@@ -111,15 +111,15 @@ The following limits apply to the v2 tiers:
111111

112112
## Deployment
113113

114-
Deploy a v2 tier instance using the Azure portal or using tools such as the Azure REST API, Azure Resource Manager, Bicep file, or Terraform.
114+
Deploy a v2 tier instance by using the Azure portal or tools such as the Azure REST API, Azure Resource Manager, Bicep file, or Terraform.
115115

116116
## Frequently asked questions
117117

118118
### Q: Can I migrate from my existing API Management instance to a new v2 tier instance?
119119

120-
A: No. Currently you can't migrate an existing API Management instance (in the Consumption, Developer, Basic, Standard, or Premium tier) to a new v2 tier instance. Currently the v2 tiers are available for newly created service instances only.
120+
A: No. Currently, there's no automated tooling to migrate an existing API Management instance (in the Consumption, Developer, Basic, Standard, or Premium tier) to a new v2 tier instance. The v2 tiers are currently available for newly created service instances only.
121121

122-
### Q: Will I still be able to provision Developer, Basic, Standard, or Premium tier services?
122+
### Q: Can I still provision Developer, Basic, Standard, or Premium tier services?
123123

124124
A: Yes, there are no changes to the classic Developer, Basic, Standard, or Premium tiers.
125125

@@ -135,10 +135,10 @@ A: No, such a deployment is only supported in the Premium and Premium v2 tiers.
135135

136136
### Q: What's the relationship between the stv2 compute platform and the v2 tiers?
137137

138-
A: They're not related. stv2 is a compute platform version of the Developer, Basic, Standard, and Premium tier service instances. stv2 is a successor to the stv1 compute platform that retired in 2024.
138+
A: There's no relationship. The stv2 compute platform is a compute platform version of the Developer, Basic, Standard, and Premium tiers only. It's the successor to the stv1 compute platform that retired in 2024.
139139

140140
## Related content
141141

142142
* Compare the API Management [tiers](api-management-features.md).
143-
* Learn more about the [API Management gateways](api-management-gateways-overview.md)
143+
* Learn more about the [API Management gateways](api-management-gateways-overview.md).
144144
* Learn about [API Management pricing](https://azure.microsoft.com/pricing/details/api-management/).

articles/app-service/app-service-hybrid-connections.md

Lines changed: 22 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -296,7 +296,7 @@ After you edit the configuration file, restart the Hybrid Connection Manager ser
296296
- **Windows**: Restart the service through **Services** from the **Start Menu**.
297297
- **Linux**: Run `systemctl restart hybridconnectionmanager.service`.
298298
299-
Configuring a proxy server routes requests from the Hybrid Connection Manager through the selected proxy server before reaching the destination. Ensure your proxy server supports HTTP/HTTPS traffic so that the Hybrid Connection Manager can communicate with the Azure Relay Service.
299+
Configuring a proxy server routes requests from the Hybrid Connection Manager through the selected proxy server before reaching the destination. Ensure your proxy server supports HTTP/HTTPS and WebSocket traffic over port 443 so that the Hybrid Connection Manager can communicate with Azure Relay. If your proxy supports DNS allowlisting, allow `*.servicebus.windows.net`. If you can't use a wildcard, allow the specific Relay namespace hostname and the gateway hostnames for that namespace.
300300

301301
> [!NOTE]
302302
> All addresses set in `appsettings.json` (`ProxyAddress`, `BypassList`) should be in RegEx format if not an exact match.
@@ -387,7 +387,7 @@ The status of **Connected** means that at least one Hybrid Connection Manager is
387387
- Does your host have outbound access to Azure on port 443? You can test from your Hybrid Connection Manager host using the PowerShell command `Test-NetConnection Destination -P Port`.
388388
- Is your Hybrid Connection Manager potentially in a bad state? Try restarting the **Azure Hybrid Connection Manager Service** local service.
389389
- Do you have conflicting software installed? Hybrid Connection Manager can't coexist with Biztalk Hybrid Connection Manager or Service Bus for Windows Server. When you install the Hybrid Connection Manager, you should remove any versions of these packages first.
390-
- Do you have a firewall between your Hybrid Connection Manager host and Azure? If so, you need to allow outbound access to both the Service Bus endpoint URL *AND* the Service Bus gateways that service your Hybrid Connection.
390+
- Do you have a firewall between your Hybrid Connection Manager host and Azure? If so, allow outbound HTTPS and WebSocket traffic over port 443. If your firewall supports DNS allowlisting, allow `*.servicebus.windows.net`, which is the preferred configuration. If you can't use a wildcard, allow the Relay namespace hostname and the gateway hostnames for that namespace. IP allowlists aren't recommended because the Relay gateway IP addresses can change.
391391
392392
- You can find the Service Bus endpoint URL in the Hybrid Connection Manager GUI.
393393
@@ -397,31 +397,33 @@ The status of **Connected** means that at least one Hybrid Connection Manager is
397397
398398
:::image type="content" source="media/app-service-hybrid-connections/hybrid-connections-service-bus-endpoint-cli.png" alt-text="Screenshot of Hybrid Connection Service Bus endpoint in the CLI.":::
399399
400-
- The Service Bus gateways are the resources that accept the request into the Hybrid Connection and pass it through the Azure Relay. You need to allow list all of the gateways. The gateways are in the format: `G#-prod-[stamp]-sb.servicebus.windows.net` and `GV#-prod-[stamp]-sb.servicebus.windows.net`. The number sign, `#`, is a number between 0 and 127 and `stamp` is the name of the instance within your Azure data center where your Service Bus endpoint exists.
400+
- The Service Bus gateways are the resources that accept the request into the Hybrid Connection and pass it through Azure Relay. The gateway hostnames are in the format `G#-prod-[stamp]-sb.servicebus.windows.net` and `GV#-prod-[stamp]-sb.servicebus.windows.net`. The number sign, `#`, is a number between 0 and 127 and `stamp` is the name of the instance within your Azure datacenter where your Service Bus endpoint exists.
401401
402-
- If you can use a wildcard, you can allow list *\*.servicebus.windows.net*.
403-
- If you can't use a wildcard, you must allow list all 256 of the gateways.
402+
- If your firewall or proxy supports DNS allowlisting, allow `*.servicebus.windows.net`. This approach is simpler to maintain and avoids relying on changing IP addresses.
403+
- If your firewall or proxy doesn't support wildcard DNS rules, allow the namespace hostname shown in the Hybrid Connection Manager and all gateway hostnames for that namespace. Use hostnames, not IP addresses.
404404

405405
You can find out the stamp using *nslookup* on the Service Bus endpoint URL.
406406

407407
:::image type="content" source="media/app-service-hybrid-connections/hybrid-connections-stamp-name.png" alt-text="Screenshot of terminal showing where to find the stamp name for the Service Bus.":::
408408

409-
In this example, the stamp is `sn3-010`. To allow list the Service Bus gateways, you need the following entries:
410-
411-
G0-prod-sn3-010-sb.servicebus.windows.net
412-
G1-prod-sn3-010-sb.servicebus.windows.net
413-
G2-prod-sn3-010-sb.servicebus.windows.net
414-
G3-prod-sn3-010-sb.servicebus.windows.net
415-
...
416-
G126-prod-sn3-010-sb.servicebus.windows.net
417-
G127-prod-sn3-010-sb.servicebus.windows.net
418-
GV0-prod-sn3-010-sb.servicebus.windows.net
419-
GV1-prod-sn3-010-sb.servicebus.windows.net
420-
GV2-prod-sn3-010-sb.servicebus.windows.net
421-
GV3-prod-sn3-010-sb.servicebus.windows.net
422-
...
423-
GV126-prod-sn3-010-sb.servicebus.windows.net
409+
In this example, the stamp is `sn3-010`. If you need namespace-specific DNS rules instead of `*.servicebus.windows.net`, allow the namespace hostname and the following gateway hostnames:
410+
411+
```text
412+
G0-prod-sn3-010-sb.servicebus.windows.net
413+
G1-prod-sn3-010-sb.servicebus.windows.net
414+
G2-prod-sn3-010-sb.servicebus.windows.net
415+
G3-prod-sn3-010-sb.servicebus.windows.net
416+
...
417+
G126-prod-sn3-010-sb.servicebus.windows.net
418+
G127-prod-sn3-010-sb.servicebus.windows.net
419+
GV0-prod-sn3-010-sb.servicebus.windows.net
420+
GV1-prod-sn3-010-sb.servicebus.windows.net
421+
GV2-prod-sn3-010-sb.servicebus.windows.net
422+
GV3-prod-sn3-010-sb.servicebus.windows.net
423+
...
424+
GV126-prod-sn3-010-sb.servicebus.windows.net
424425
GV127-prod-sn3-010-sb.servicebus.windows.net
426+
```
425427

426428
If your status says **Connected** but your app can't reach your endpoint then:
427429

articles/app-service/configure-authentication-provider-aad.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,8 @@ To use an existing registration, select either:
8080

8181
You can also configure the application to [use an identity instead of a client secret][fic-config]. Support for using an identity is currently in preview.
8282
- **Issuer URL**. This URL takes the form `<authentication-endpoint>/<tenant-id>/v2.0`. Replace `<authentication-endpoint>` with the authentication endpoint [value that's specific to the cloud environment](/entra/identity-platform/authentication-national-cloud#azure-ad-authentication-endpoints). For example, a workforce tenant in global Azure would use `https://login.microsoftonline.com` as its authentication endpoint.
83+
84+
You can find this value in the Microsoft Entra admin center. Go to **App registrations**, select your app, and then select **Endpoints**. Copy the **OpenID Connect metadata document** endpoint for your tenant, and then remove `/.well-known/openid-configuration` from the end of the URL. For example, if the metadata endpoint is `https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration`, use `https://login.microsoftonline.com/<tenant-id>/v2.0` as the issuer URL.
8385

8486
> [!NOTE]
8587
> If you created your identity provider using the express setup (Option 1), the issuer URL is automatically set to use the legacy `https://sts.windows.net` endpoint. To align with current Microsoft Entra ID best practices, edit your identity provider and update the issuer URL to use `https://login.microsoftonline.com/<tenant-id>/v2.0` instead.
@@ -169,7 +171,7 @@ To use an existing registration, select **Provide the details of an existing app
169171

170172
- **Application (client) ID**
171173
- **Client secret**
172-
- **Issuer URL**
174+
- **Issuer URL**. In the Microsoft Entra admin center, go to **App registrations**, select your app, and then select **Endpoints**. Copy the **OpenID Connect metadata document** endpoint for your tenant, and then remove `/.well-known/openid-configuration` from the end of the URL. For example, if the metadata endpoint is `https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration`, use `https://login.microsoftonline.com/<tenant-id>/v2.0` as the issuer URL.
173175

174176
If you need to manually create an app registration in an external tenant, see [Register an app in your external tenant](/entra/external-id/customers/how-to-register-ciam-app?tabs=webapp#register-your-web-app).
175177

@@ -219,6 +221,8 @@ For **Tenant requirement**, choose whether to:
219221
- Allow requests from specific tenants.
220222
- Use default restrictions based on the app registration's tenant.
221223

224+
For **Allowed token audiences**, add any audience values that your app should accept in the `aud` claim of incoming access tokens. You commonly need this setting when clients request tokens by using the app registration's **Application ID URI**, such as `api://<application-client-id>` or a custom URI like `https://contoso.com/api`. The app registration's client ID is already accepted by default, so you typically add values here only if your app accepts another audience format.
225+
222226
Your app might still need to make other authorization decisions in code. For more information, see [Use a built-in authorization policy](#use-a-built-in-authorization-policy) later in this article.
223227

224228
## Configure authentication settings

0 commit comments

Comments
 (0)