You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The API Management v2 tiers (SKUs) are built on a new, more reliable and scalable platform and are designed to make API Management accessible to a broader set of customers and offer flexible options for a wider variety of scenarios. The v2 tiers are in addition to the existing classic tiers (Developer, Basic, Standard, and Premium) and the Consumption tier. [See detailed comparison of API Management tiers](api-management-features.md).
20
+
The API Management v2 tiers (SKUs) are built on a new, more reliable and scalable platform. They're designed to make API Management accessible to a broader set of customers and offer flexible options for a wider variety of scenarios. The v2 tiers are in addition to the existing classic tiers (Developer, Basic, Standard, and Premium) and the Consumption tier. [See detailed comparison of API Management tiers](api-management-features.md).
21
21
22
22
The following v2 tiers are generally available:
23
23
24
-
***Basic v2** - The Basic v2 tier is designed for development and testing scenarios, and is supported with an SLA.
24
+
***Basic v2** - The Basic v2 tier is designed for development and testing scenarios, and it comes with an SLA.
25
25
26
26
***Standard v2** - Standard v2 is a production-ready tier with support for network-isolated backends.
27
27
@@ -33,7 +33,7 @@ The following v2 tiers are generally available:
33
33
34
34
***Simplified networking** - The Standard v2 and Premium v2 tiers provide [networking options](#networking-options) to isolate API Management's inbound and outbound traffic.
35
35
36
-
***More options for production workloads** - The v2 tiers are all supported with an SLA.
36
+
***More options for production workloads** - The v2 tiers all come with an SLA.
37
37
38
38
***Developer portal options** - Enable the [developer portal](api-management-howto-developer-portal.md) when you're ready to let API consumers discover your APIs.
39
39
@@ -42,11 +42,11 @@ The following v2 tiers are generally available:
42
42
43
43
### API version
44
44
45
-
The latest capabilities of the v2 tiers are supported in API Management API version **2024-05-01** or later.
45
+
API Management supports the latest capabilities of the v2 tiers in API version **2024-05-01** or later.
46
46
47
47
## Networking options
48
48
49
-
***Standard v2** and **Premium v2** support **virtual network integration** to allow your API Management instance to reach API backends that are isolated in a single connected virtual network. The API Management gateway, management plane, and developer portal remain publicly accessible from the internet. The virtual network must be in the same region and subscription as the API Management instance. [Learn more](integrate-vnet-outbound.md).
49
+
***Standard v2** and **Premium v2** support **virtual network integration**. This feature allows your API Management instance to reach API backends that are isolated in a single connected virtual network. The API Management gateway, management plane, and developer portal remain publicly accessible from the internet. The virtual network must be in the same region and subscription as the API Management instance. [Learn more](integrate-vnet-outbound.md).
50
50
51
51
***Standard v2** and **Premium v2** also support inbound [private endpoint connections](private-endpoint.md) to the API Management gateway.
52
52
@@ -58,7 +58,7 @@ For a current list of regions where the v2 tiers are available, see [Availabilit
58
58
59
59
### Classic feature availability
60
60
61
-
Most capabilities of the classic API Management tiers are supported directly in the v2 tiers. However, some features have replacements in the v2 tiers, and some currently aren't available. For detailed comparisons, see
61
+
The v2 tiers support most capabilities of the classic API Management tiers. However, some features have replacements in the v2 tiers, and some features currently aren't available. For detailed comparisons, see:
62
62
63
63
*[Feature-based comparison of the Azure API Management tiers](api-management-features.md)
@@ -76,7 +76,7 @@ Most capabilities of the classic API Management tiers are supported directly in
76
76
77
77
#### Currently unavailable features
78
78
79
-
The following are currently unavailable in the v2 tiers.
79
+
The following features are currently unavailable in the v2 tiers.
80
80
81
81
**Infrastructure and configuration**
82
82
* Multi-region deployment
@@ -111,15 +111,15 @@ The following limits apply to the v2 tiers:
111
111
112
112
## Deployment
113
113
114
-
Deploy a v2 tier instance using the Azure portal or using tools such as the Azure REST API, Azure Resource Manager, Bicep file, or Terraform.
114
+
Deploy a v2 tier instance by using the Azure portal or tools such as the Azure REST API, Azure Resource Manager, Bicep file, or Terraform.
115
115
116
116
## Frequently asked questions
117
117
118
118
### Q: Can I migrate from my existing API Management instance to a new v2 tier instance?
119
119
120
-
A: No. Currently you can't migrate an existing API Management instance (in the Consumption, Developer, Basic, Standard, or Premium tier) to a new v2 tier instance. Currently the v2 tiers are available for newly created service instances only.
120
+
A: No. Currently, there's no automated tooling to migrate an existing API Management instance (in the Consumption, Developer, Basic, Standard, or Premium tier) to a new v2 tier instance. The v2 tiers are currently available for newly created service instances only.
121
121
122
-
### Q: Will I still be able to provision Developer, Basic, Standard, or Premium tier services?
122
+
### Q: Can I still provision Developer, Basic, Standard, or Premium tier services?
123
123
124
124
A: Yes, there are no changes to the classic Developer, Basic, Standard, or Premium tiers.
125
125
@@ -135,10 +135,10 @@ A: No, such a deployment is only supported in the Premium and Premium v2 tiers.
135
135
136
136
### Q: What's the relationship between the stv2 compute platform and the v2 tiers?
137
137
138
-
A: They're not related. stv2 is a compute platform version of the Developer, Basic, Standard, and Premium tier service instances. stv2 is a successor to the stv1 compute platform that retired in 2024.
138
+
A: There's no relationship. The stv2 compute platform is a compute platform version of the Developer, Basic, Standard, and Premium tiers only. It's the successor to the stv1 compute platform that retired in 2024.
139
139
140
140
## Related content
141
141
142
142
* Compare the API Management [tiers](api-management-features.md).
143
-
* Learn more about the [API Management gateways](api-management-gateways-overview.md)
143
+
* Learn more about the [API Management gateways](api-management-gateways-overview.md).
144
144
* Learn about [API Management pricing](https://azure.microsoft.com/pricing/details/api-management/).
Copy file name to clipboardExpand all lines: articles/app-service/app-service-hybrid-connections.md
+22-20Lines changed: 22 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -296,7 +296,7 @@ After you edit the configuration file, restart the Hybrid Connection Manager ser
296
296
- **Windows**: Restart the service through **Services** from the **Start Menu**.
297
297
- **Linux**: Run `systemctl restart hybridconnectionmanager.service`.
298
298
299
-
Configuring a proxy server routes requests from the Hybrid Connection Manager through the selected proxy server before reaching the destination. Ensure your proxy server supports HTTP/HTTPS traffic so that the Hybrid Connection Manager can communicate with the Azure Relay Service.
299
+
Configuring a proxy server routes requests from the Hybrid Connection Manager through the selected proxy server before reaching the destination. Ensure your proxy server supports HTTP/HTTPS and WebSocket traffic over port 443 so that the Hybrid Connection Manager can communicate with Azure Relay. If your proxy supports DNS allowlisting, allow `*.servicebus.windows.net`. If you can't use a wildcard, allow the specific Relay namespace hostname and the gateway hostnames for that namespace.
300
300
301
301
> [!NOTE]
302
302
> All addresses setin`appsettings.json` (`ProxyAddress`, `BypassList`) should be in RegEx format if not an exact match.
@@ -387,7 +387,7 @@ The status of **Connected** means that at least one Hybrid Connection Manager is
387
387
- Does your host have outbound access to Azure on port 443? You can test from your Hybrid Connection Manager host using the PowerShell command`Test-NetConnection Destination -P Port`.
388
388
- Is your Hybrid Connection Manager potentially in a bad state? Try restarting the **Azure Hybrid Connection Manager Service**local service.
389
389
- Do you have conflicting software installed? Hybrid Connection Manager can't coexist with Biztalk Hybrid Connection Manager or Service Bus for Windows Server. When you install the Hybrid Connection Manager, you should remove any versions of these packages first.
390
-
- Do you have a firewall between your Hybrid Connection Manager host and Azure? If so, you need to allow outbound access to both the Service Bus endpoint URL *AND* the Service Bus gateways that service your Hybrid Connection.
390
+
- Do you have a firewall between your Hybrid Connection Manager host and Azure? If so, allow outbound HTTPS and WebSocket traffic over port 443. If your firewall supports DNS allowlisting, allow `*.servicebus.windows.net`, which is the preferred configuration. If you can't use a wildcard, allow the Relay namespace hostname and the gateway hostnames forthat namespace. IP allowlists aren't recommended because the Relay gateway IP addresses can change.
391
391
392
392
- You can find the Service Bus endpoint URL in the Hybrid Connection Manager GUI.
393
393
@@ -397,31 +397,33 @@ The status of **Connected** means that at least one Hybrid Connection Manager is
397
397
398
398
:::image type="content" source="media/app-service-hybrid-connections/hybrid-connections-service-bus-endpoint-cli.png" alt-text="Screenshot of Hybrid Connection Service Bus endpoint in the CLI.":::
399
399
400
-
- The Service Bus gateways are the resources that accept the request into the Hybrid Connection and pass it through the Azure Relay. You need to allow list all of the gateways. The gateways are in the format: `G#-prod-[stamp]-sb.servicebus.windows.net` and `GV#-prod-[stamp]-sb.servicebus.windows.net`. The number sign, `#`, is a number between 0 and 127 and `stamp` is the name of the instance within your Azure data center where your Service Bus endpoint exists.
400
+
- The Service Bus gateways are the resources that accept the request into the Hybrid Connection and pass it through Azure Relay. The gateway hostnames are in the format `G#-prod-[stamp]-sb.servicebus.windows.net` and `GV#-prod-[stamp]-sb.servicebus.windows.net`. The number sign, `#`, is a number between 0 and 127 and `stamp` is the name of the instance within your Azure datacenter where your Service Bus endpoint exists.
401
401
402
-
- If you can use a wildcard, you can allow list *\*.servicebus.windows.net*.
403
-
- If you can't use a wildcard, you must allow list all 256 of the gateways.
402
+
- If your firewall or proxy supports DNS allowlisting, allow `*.servicebus.windows.net`. This approach is simpler to maintain and avoids relying on changing IP addresses.
403
+
- If your firewall or proxy doesn't support wildcard DNS rules, allow the namespace hostname shown inthe Hybrid Connection Manager and all gateway hostnames for that namespace. Use hostnames, not IP addresses.
404
404
405
405
You can find out the stamp using *nslookup* on the Service Bus endpoint URL.
406
406
407
407
:::image type="content" source="media/app-service-hybrid-connections/hybrid-connections-stamp-name.png" alt-text="Screenshot of terminal showing where to find the stamp name for the Service Bus.":::
408
408
409
-
In this example, the stamp is `sn3-010`. To allow list the Service Bus gateways, you need the following entries:
410
-
411
-
G0-prod-sn3-010-sb.servicebus.windows.net
412
-
G1-prod-sn3-010-sb.servicebus.windows.net
413
-
G2-prod-sn3-010-sb.servicebus.windows.net
414
-
G3-prod-sn3-010-sb.servicebus.windows.net
415
-
...
416
-
G126-prod-sn3-010-sb.servicebus.windows.net
417
-
G127-prod-sn3-010-sb.servicebus.windows.net
418
-
GV0-prod-sn3-010-sb.servicebus.windows.net
419
-
GV1-prod-sn3-010-sb.servicebus.windows.net
420
-
GV2-prod-sn3-010-sb.servicebus.windows.net
421
-
GV3-prod-sn3-010-sb.servicebus.windows.net
422
-
...
423
-
GV126-prod-sn3-010-sb.servicebus.windows.net
409
+
In this example, the stamp is `sn3-010`. If you need namespace-specific DNS rules instead of `*.servicebus.windows.net`, allow the namespace hostname and the following gateway hostnames:
410
+
411
+
```text
412
+
G0-prod-sn3-010-sb.servicebus.windows.net
413
+
G1-prod-sn3-010-sb.servicebus.windows.net
414
+
G2-prod-sn3-010-sb.servicebus.windows.net
415
+
G3-prod-sn3-010-sb.servicebus.windows.net
416
+
...
417
+
G126-prod-sn3-010-sb.servicebus.windows.net
418
+
G127-prod-sn3-010-sb.servicebus.windows.net
419
+
GV0-prod-sn3-010-sb.servicebus.windows.net
420
+
GV1-prod-sn3-010-sb.servicebus.windows.net
421
+
GV2-prod-sn3-010-sb.servicebus.windows.net
422
+
GV3-prod-sn3-010-sb.servicebus.windows.net
423
+
...
424
+
GV126-prod-sn3-010-sb.servicebus.windows.net
424
425
GV127-prod-sn3-010-sb.servicebus.windows.net
426
+
```
425
427
426
428
If your status says **Connected** but your app can't reach your endpoint then:
Copy file name to clipboardExpand all lines: articles/app-service/configure-authentication-provider-aad.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,6 +80,8 @@ To use an existing registration, select either:
80
80
81
81
You can also configure the application to [use an identity instead of a client secret][fic-config]. Support for using an identity is currently in preview.
82
82
-**Issuer URL**. This URL takes the form `<authentication-endpoint>/<tenant-id>/v2.0`. Replace `<authentication-endpoint>` with the authentication endpoint [value that's specific to the cloud environment](/entra/identity-platform/authentication-national-cloud#azure-ad-authentication-endpoints). For example, a workforce tenant in global Azure would use `https://login.microsoftonline.com` as its authentication endpoint.
83
+
84
+
You can find this value in the Microsoft Entra admin center. Go to **App registrations**, select your app, and then select **Endpoints**. Copy the **OpenID Connect metadata document** endpoint for your tenant, and then remove `/.well-known/openid-configuration` from the end of the URL. For example, if the metadata endpoint is `https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration`, use `https://login.microsoftonline.com/<tenant-id>/v2.0` as the issuer URL.
83
85
84
86
> [!NOTE]
85
87
> If you created your identity provider using the express setup (Option 1), the issuer URL is automatically set to use the legacy `https://sts.windows.net` endpoint. To align with current Microsoft Entra ID best practices, edit your identity provider and update the issuer URL to use `https://login.microsoftonline.com/<tenant-id>/v2.0` instead.
@@ -169,7 +171,7 @@ To use an existing registration, select **Provide the details of an existing app
169
171
170
172
-**Application (client) ID**
171
173
-**Client secret**
172
-
-**Issuer URL**
174
+
-**Issuer URL**. In the Microsoft Entra admin center, go to **App registrations**, select your app, and then select **Endpoints**. Copy the **OpenID Connect metadata document** endpoint for your tenant, and then remove `/.well-known/openid-configuration` from the end of the URL. For example, if the metadata endpoint is `https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration`, use `https://login.microsoftonline.com/<tenant-id>/v2.0` as the issuer URL.
173
175
174
176
If you need to manually create an app registration in an external tenant, see [Register an app in your external tenant](/entra/external-id/customers/how-to-register-ciam-app?tabs=webapp#register-your-web-app).
175
177
@@ -219,6 +221,8 @@ For **Tenant requirement**, choose whether to:
219
221
- Allow requests from specific tenants.
220
222
- Use default restrictions based on the app registration's tenant.
221
223
224
+
For **Allowed token audiences**, add any audience values that your app should accept in the `aud` claim of incoming access tokens. You commonly need this setting when clients request tokens by using the app registration's **Application ID URI**, such as `api://<application-client-id>` or a custom URI like `https://contoso.com/api`. The app registration's client ID is already accepted by default, so you typically add values here only if your app accepts another audience format.
225
+
222
226
Your app might still need to make other authorization decisions in code. For more information, see [Use a built-in authorization policy](#use-a-built-in-authorization-policy) later in this article.
0 commit comments