You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can configure Azure Active Directory B2C (Azure AD B2C) so that a user who is signed in with a local account can change their password without using email verification to prove their identity.
29
+
You can configure Azure Active Directory B2C (Azure AD B2C) to allow users who are signed in with a local account to change their password without using email verification to prove their identity.
30
30
31
31
The password change flow involves the following steps:
32
32
33
33
1. The user signs in to their local account. If the session is still active, Azure AD B2C authorizes the user and skips to the next step.
34
-
1. In **Old password**, the user verifies their old password. In **New password**, they create and confirm their new password.
34
+
1. In **Old password**, the user verifies their current password. In **New password**, they create and confirm their new password.
35
35
36
36

Copy file name to clipboardExpand all lines: articles/app-service/samples-terraform.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,19 +6,20 @@ ms.custom: devx-track-terraform
6
6
7
7
ms.assetid: 1e5ecfa8-4ab1-47d3-ab23-97abf723516d
8
8
ms.topic: sample
9
-
ms.date: 06/25/2024
9
+
ms.date: 03/16/2026
10
10
author: ericgre
11
11
ms.author: ericg
12
12
ms.service: azure-app-service
13
13
---
14
+
14
15
# Terraform samples for Azure App Service
15
16
16
17
The following table includes links to Terraform scripts.
17
18
18
19
| Script | Description |
19
20
|-|-|
20
21
|**Create app**||
21
-
|[Create two apps and connect securely with Private Endpoint and VNet integration](./scripts/terraform-secure-backend-frontend.md)| Creates two App Service apps and connect apps together with Private Endpoint and VNet integration. |
22
+
|[Create two apps and connect them securely with Private Endpoint and VNet integration](./scripts/terraform-secure-backend-frontend.md)| Creates two App Service apps and connects the apps together with Private Endpoint and virtual network integration. |
22
23
|[Provision App Service and use slot swap to deploy](/azure/developer/terraform/provision-infrastructure-using-azure-deployment-slots)| Provision App Service infrastructure with Azure deployment slots. |
23
24
|[Create an Azure Windows web app with a backup](./scripts/terraform-backup.md)| Create an Azure Windows web app with a backup schedule. |
24
25
|[Create a Windows container app on App Service](/azure/app-service/provision-resource-terraform?tabs=windows-container)| Create an Azure Windows web app with a backup schedule. |
Copy file name to clipboardExpand all lines: articles/app-service/scripts/template-deploy-private-endpoint.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: 'Use an Azure Resource Manager template to deploy a private endpoint for a web app'
3
-
description: Learn how to use ARM template to deploy a private endpoint for your web app.
3
+
description: Learn how to use an ARM template to deploy a private endpoint for your web app.
4
4
author: ericgre
5
5
ms.assetid: 49e460d0-7759-4ceb-b5a4-f1357e4fde56
6
6
ms.topic: sample
7
-
ms.date: 07/08/2020
7
+
ms.date: 03/16/2026
8
8
ms.author: ericg
9
9
ms.service: azure-app-service
10
10
ms.custom: devx-track-arm-template
@@ -32,14 +32,14 @@ This template creates a private endpoint for an Azure web app.
32
32
33
33
Here's how to deploy the Azure Resource Manager template to Azure:
34
34
35
-
1. To sign in to Azure and open the template, select this link: [Deploy to Azure](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fquickstarts%2Fmicrosoft.web%2Fprivate-endpoint-webapp%2Fazuredeploy.json). The template creates the virtual network, the web app, the private endpoint, and the private DNS zone.
36
-
2. Select or create your resource group.
37
-
3. Enter the name of your web app, Azure App Service plan, and private endpoint.
38
-
5. Read the statement about terms and conditions. If you agree, select **I agree to the terms and conditions stated above** > **Purchase**. The deployment can take several minutes to finish.
35
+
1. To sign in to Azure and open the template, select this link: [Deploy to Azure](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fquickstarts%2Fmicrosoft.web%2Fprivate-endpoint-webapp%2Fazuredeploy.json). The template creates the virtual network, the web app, the private endpoint, and the private DNS zone.
36
+
1. Select or create your resource group.
37
+
1. Enter the name of your web app, Azure App Service plan, and private endpoint.
38
+
1. Read the statement about terms and conditions. If you agree, select **I agree to the terms and conditions stated above** > **Purchase**. The deployment can take several minutes to finish.
39
39
40
40
## Clean up resources
41
41
42
-
When you no longer need the resources that you created with the private endpoint, delete the resource group. This removes the private endpoint and all the related resources.
42
+
When you no longer need the resources that you created with the private endpoint, delete the resource group. By removing the resource group, you remove the private endpoint and all the related resources.
43
43
44
44
To delete the resource group, call the `Remove-AzResourceGroup` cmdlet:
|[Regional capacity quota per subscription](regional-capacity-quota.md)| 25 TiB | Yes |
27
-
| Number of NetApp accounts per Azure region per subscription |10| Yes |
27
+
| Number of NetApp accounts per Azure region per subscription |100| Yes |
28
28
| Number of capacity pools per NetApp account | 25 | Yes |
29
29
| Number of volumes per subscription | 500 | Yes |
30
30
| Number of volumes per capacity pool | 500 | Yes |
@@ -43,7 +43,7 @@ The following table describes resource limits for the Flexible, Standard, Premiu
43
43
| Maximum size of a single file | 16 TiB | No |
44
44
| Maximum size of directory metadata in a single directory | 320 MB | No |
45
45
| Maximum number of files in a single directory |*Approximately* 4 million. <br> See [Determine if a directory is approaching the limit size](directory-sizes-concept.md#directory-limit). | No |
46
-
| Maximum number of `maxfiles` per volume | See [`maxfiles`](maxfiles-concept.md)| Yes |
46
+
| Maximum number of `maxfiles` per volume | See [`maxfiles`](maxfiles-concept.md)| Yes****|
47
47
| Maximum number of export policy rules per volume | 5 | No |
48
48
| Maximum number of quota rules per volume | 1,000 | No |
49
49
| Minimum assigned throughput for a manual Quality of Service (QoS) volume | 1 MiB/s | No |
@@ -64,6 +64,13 @@ The following table describes resource limits for the Flexible, Standard, Premiu
64
64
65
65
\*** This feature is available [when cool access is enabled and by request](large-volumes-requirements-considerations.md#requirements-and-considerations-for-large-volumes-up-to-72-pib-preview). When enabled, the minimum size of the volume is 2,400 GiB.
66
66
67
+
\**** Support request to adjust maxfiles limits is appropriate only when the volume is already provisioned at a size that supports the requested file count. While Azure NetApp Files support can adjust maxfiles limits within supported backend thresholds, these adjustments cannot override the fundamental relationship between volume size and inode capacity. If a workload requires a higher maxfiles limit, then the volume must be provisioned at a size that natively supports that file count. Support requests cannot be used to keep a small volume size while enabling a maxfiles limit that is only supported by a much larger volume. Support requests should not be opened in the following situations as support engineers cannot make backend changes to satisfy the request:
68
+
69
+
* To avoid increasing volume size
70
+
* To request maxfiles limits that exceed what the current volume size supports
71
+
* To request backend exceptions for inode limits
72
+
73
+
67
74
For more information, see [Capacity management FAQs](faq-capacity-management.md).
Copy file name to clipboardExpand all lines: articles/data-factory/automatic-connector-upgrade.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.topic: concept-article
9
9
ms.custom:
10
10
- references_regions
11
11
- build-2025
12
-
ms.date: 01/08/2026
12
+
ms.date: 03/24/2026
13
13
---
14
14
15
15
# Automatic connector upgrade
@@ -73,7 +73,7 @@ You can find more details from the table below on the connector list that is pla
73
73
|[Greenplum](connector-greenplum.md)| If your pipeline runs on self-hosted integration runtime, it requires SHIR version 5.56 or above. |
74
74
|[Hive](connector-hive.md)| Scenario that doesn't rely on below capability in Hive (version 1.0):<br><br>• Use Username authentication type.<br>• Thrift transport protocol:<br> • HiveServer1<br>• Service discovery mode: True<br>• Use native query: True <br><br>If your pipeline runs on self-hosted integration runtime, it requires SHIR version 5.59 or above.|
75
75
|[Impala](connector-impala.md)| Scenario that doesn't rely on below capability in Impala (version 1.0):<br><br>• Use SASL Username authentication type.<br><br>If your pipeline runs on self-hosted integration runtime, it requires SHIR version 5.59 or above. |
76
-
|[Jira](connector-jira.md)| Scenario that doesn't rely on below capability in Jira (version 1.0):<br><br>• Use `useEncryptedEndpoints`, `useHostVerification` and `usePeerVerification` as connection properties. <br>• Use `query`. <br><br>The following Jira tables are supported for automatic upgrade:<br> Platform.Api_Groups_Picker, Platform.Api_Issue_Type, Platform.Api_Project, Platform.Api_Field, Platform.Api_Status, Platform.Api_Status_Category, Platform.Api_Project_Type, Platform.Api_Resolution, Platform.Api_Priority, Platform.ApiAllUsers, Platform.Api_Issue_Link_Type, Platform.Api_Role, Platform.Api_Project_Versions, Platform.Api_Component, Platform.Api_Project_IssueTypes, Agile.Agile_Board_Epic, Agile.Agile_Board, Agile.Agile_Board_Sprint, Agile.Agile_Board_Issue, Agile.Agile_Board_Epic_Issue. <br><br>If your pipeline runs on self-hosted integration runtime, it requires SHIR version 5.63 or above. |
76
+
| [Jira](connector-jira.md) | Scenario that doesn't rely on below capability in Jira (version 1.0):<br><br>• Use `useEncryptedEndpoints`, `useHostVerification` and `usePeerVerification` as connection properties. <br>• Use `query`. <br><br>The following Jira tables are supported for automatic upgrade:<br> Platform.Api_Groups_Picker, Platform.Api_Issue_Type, Platform.Api_Project, Platform.Api_Field, Platform.Api_Status, Platform.Api_Status_Category, Platform.Api_Project_Type, Platform.Api_Resolution, Platform.Api_Priority, Platform.ApiAllUsers, Platform.Api_Issue_Link_Type, Platform.Api_Role, Platform.Api_Project_Versions, Platform.Api_Component, Platform.Api_Project_IssueTypes, Platform.Api_Issue, Agile.Agile_Board_Epic, Agile.Agile_Board, Agile.Agile_Board_Sprint, Agile.Column_Config_Columns, Agile.Agile_Board_Issue_Fields_Components, Agile.Agile_Board_Issue_Fields_Closed_Sprints, Agile.AgileBoardProjects. <br><br>If your pipeline runs on self-hosted integration runtime, it requires SHIR version 5.64 or above. |
77
77
|[MariaDB](connector-mariadb.md)| If your pipeline runs on self-hosted integration runtime, it requires SHIR version 5.58 or above. |
78
78
|[MySQL](connector-mysql.md)| If your pipeline runs on self-hosted integration runtime, it requires SHIR version 5.58 or above. |
79
79
|[Netezza](connector-netezza.md)| If your pipeline runs on self-hosted integration runtime, it requires SHIR version 5.59 or above. |
Copy file name to clipboardExpand all lines: articles/event-grid/authenticate-with-namespaces-using-webhook-authentication.md
+54-3Lines changed: 54 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article shows you how to authenticate with Azure Event Grid na
4
4
ms.topic: how-to
5
5
ms.custom:
6
6
- build-2025
7
-
ms.date: 07/30/2025
7
+
ms.date: 03/23/2026
8
8
author: Connected-Seth
9
9
ms.author: seshanmugam
10
10
---
@@ -47,6 +47,40 @@ az eventgrid namespace update --resource-group <resource group name> --name <nam
47
47
48
48
For information on how to configure system and user-assigned identities by using the Azure portal, see [Enable managed identity for an Event Grid namespace](event-grid-namespace-managed-identity.md).
Azure Functions can host the webhook logic using `Microsoft.Identity.Web` to validate token automatically. We need Microsoft Entra app registration for Webhook API for validating Event Grid caller tokens, which has an Application ID URI for token issuance. Client side (Event Grid) already has managed identity.
This implementation can be any external HTTPS Endpoint (any cloud, any backend), using Microsoft Entra ID JWT validation with `Microsoft.IdentityModel` libraries.
71
+
72
+
Use any runtime: .NET / Node / Java / Python.
73
+
74
+
Key requirements:
75
+
76
+
- Must be HTTPS
77
+
- Must validate caller JWT
78
+
- Must validate device JWT
79
+
- Must respond within timeout (~5 sec recommended)
80
+
81
+
:::image type="content" source="./media/authenticate-with-namespaces-using-webhook-authentication/custom-webhook-implementations.svg" alt-text="Diagram that shows custom webhook implementations." lightbox="./media/authenticate-with-namespaces-using-webhook-authentication/custom-webhook-implementations.svg":::
82
+
83
+
50
84
## Grant the managed identity appropriate access to a function or webhook
51
85
52
86
Grant the managed identity of your Event Grid namespace the appropriate access to the target Azure function or webhook.
@@ -131,7 +165,11 @@ Replace `<NAMESPACE_NAME>` and `<RESOURCE_GROUP_NAME>` with your actual values.
131
165
132
166
### Request headers
133
167
168
+
Azure Event Grid sends the following headers in the request to the webhook:
169
+
170
+
```
134
171
**Authorization**: Bearer token
172
+
```
135
173
136
174
The token is a Microsoft Entra token for the managed identity that was configured to call the webhook.
137
175
@@ -158,9 +196,8 @@ The token is a Microsoft Entra token for the managed identity that was configure
158
196
|`password`| Optional | Password from MQTT CONNECT packet in Base64 encoding. |
|`authenticationData`| Optional | Authentication data from MQTT CONNECT packet in Base64 encoding (MQTT5 only). |
161
-
|`clientCertificate`| Optional | Client certificate in PEM format. |
199
+
|`clientCertificate`| Optional | Client certificate in Privacy-Enhanced Mail (PEM) format. |
162
200
|`clientCertificateChain`| Optional | Other certificates provided by the client required to build the chain from the client certificate to the Certificate Authority certificate. |
163
-
|`userProperties`| Optional | User properties from CONNECT packet (MQTT5 only). |
0 commit comments