Skip to content

Commit efc3165

Browse files
Merge pull request #310198 from MicrosoftDocs/main
Auto Publish – main to live - 2026-01-06 23:00 UTC
2 parents 638110d + 7fed199 commit efc3165

23 files changed

Lines changed: 588 additions & 139 deletions

articles/active-directory-b2c/aad-sspr-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ The **InputClaimsTransformations** element may contain a collection of **InputCl
6464

6565
### Output claims
6666

67-
The Microsoft Entra SSPR protocol provider does not return any **OutputClaims**, thus there is no need to specify output claims. You can, however, include claims that aren't returned by the Microsoft Entra SSPR protocol provider as long as you set the `DefaultValue` attribute.
67+
The Microsoft Entra SSPR protocol provider does not return any **OutputClaims**, thus, there is no need to specify output claims. You can, however, include claims that aren't returned by the Microsoft Entra SSPR protocol provider as long as you set the `DefaultValue` attribute.
6868

6969
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
7070

articles/active-directory-b2c/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Replace the values in the query string as follows:
8585

8686
To get a feel of how the request works, paste the request into your browser and run it.
8787

88-
This's the interactive part of the flow, where you take action. You're asked to complete the user flow's workflow. This might involve entering your username and password in a sign in form or any other number of steps. The steps you complete depend on how the user flow is defined.
88+
This is the interactive part of the flow, where you take action. You're asked to complete the user flow's workflow. This might involve entering your username and password in a sign in form or any other number of steps. The steps you complete depend on how the user flow is defined.
8989

9090
The response with the authorization code should be similar to this example:
9191

articles/api-center/export-to-copilot-studio.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@ metadata:
88
ms.service: azure-api-management
99
ms.topic: how-to
1010
ms.date: 04/28/2025
11+
ms.collection: ce-skilling-ai-copilot
12+
ms.update-cycle: 180-days
1113
ms.custom: template-how-to
1214

1315
#customer intent: As an API program manager, I want to export an API from my API center inventory as a connector in Microsoft Copilot Studio for use in agents.
@@ -76,4 +78,4 @@ relatedContent:
7678
url: /microsoft-copilot-studio/nlu-gpt-overview
7779

7880
- text: Get started with Microsoft Copilot Studio
79-
url: /training/modules/power-virtual-agents-bots
81+
url: /training/modules/power-virtual-agents-bots

articles/api-management/TOC.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -364,6 +364,7 @@
364364
href: api-management-howto-ca-certificates.md
365365
- name: Manage protocols and ciphers
366366
href: api-management-howto-manage-protocols-ciphers.md
367+
displayName: TLS, TLS 1.3
367368
- name: Protect with Defender for APIs
368369
href: protect-with-defender-for-apis.md
369370
- name: Mitigate OWASP API threats

articles/api-management/api-management-howto-manage-protocols-ciphers.md

Lines changed: 10 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: how-to
9-
ms.date: 08/12/2025
9+
ms.date: 10/10/2025
1010
ms.author: danlep
1111
---
1212

@@ -21,7 +21,7 @@ Azure API Management supports multiple versions of Transport Layer Security (TLS
2121

2222
API Management also supports multiple cipher suites used by the API gateway.
2323

24-
Depending on the service tier, API Management supports TLS versions up to 1.2 or TLS 1.3 for client and backend connectivity and several supported cipher suites. This guide shows you how to manage protocols and ciphers configuration for an Azure API Management instance.
24+
API Management supports TLS versions up to TLS 1.3 for client and backend connectivity and several supported cipher suites. This guide shows you how to manage protocols and ciphers configuration for an Azure API Management instance.
2525

2626
:::image type="content" source="media/api-management-howto-manage-protocols-ciphers/api-management-protocols-ciphers.png" alt-text="Screenshot of managing protocols and ciphers in the Azure portal.":::
2727

@@ -33,7 +33,6 @@ Depending on the service tier, API Management supports TLS versions up to 1.2 or
3333
> [!NOTE]
3434
> Depending on the API Management service tier, changes can take 15 to 45 minutes or longer to apply. An instance in the Developer service tier has downtime during the process. Instances in the Basic and higher tiers don't have downtime during the process.
3535
36-
3736
## Prerequisites
3837

3938
* An API Management instance. [Create one if you haven't already](get-started-create-service-instance.md).
@@ -42,27 +41,24 @@ Depending on the service tier, API Management supports TLS versions up to 1.2 or
4241

4342
## How to manage TLS protocols and cipher suites
4443

45-
1. In the left navigation of your API Management instance, under **Security**, select **Protocols + ciphers**.
44+
1. In the sidebar of your API Management instance, under **Security**, select **Protocols + ciphers**.
4645
1. Enable or disable desired protocols or ciphers.
4746
1. Select **Save**.
4847

4948
> [!NOTE]
5049
> Some protocols or cipher suites (such as backend-side TLS 1.2) can't be enabled or disabled from the Azure portal. Instead, you'll need to apply the REST API call. Use the `properties.customProperties` structure in the [Create/Update API Management Service](/rest/api/apimanagement/current-ga/api-management-service/create-or-update) REST API.
5150
52-
## TLS 1.3 support in classic tiers
51+
## TLS 1.3 support
5352

54-
TLS 1.3 support is available in the API Management classic service tiers (**Consumption**, **Developer**, **Basic**, **Standard**, and **Premium**). In most instances created in those service tiers, TLS 1.3 is permanently enabled by default for client-side connections. Enabling backend-side TLS 1.3 is optional. TLS 1.2 is also enabled by default on both client and backend sides.
53+
TLS 1.3 support is available in all API Management service tiers. In most instances created in those service tiers, TLS 1.3 is permanently enabled by default for client-side connections. Enabling backend-side TLS 1.3 is optional. TLS 1.2 is also enabled by default on both client and backend sides.
5554

5655
TLS 1.3 is a major revision of the TLS protocol that provides improved security and performance. It includes features such as reduced handshake latency and improved security against certain types of attacks.
5756

58-
> [!NOTE]
59-
> The [v2 tiers](v2-service-tiers-overview.md) of API Management and [workspace gateways](workspaces-overview.md) support TLS 1.2 by default for client-side and backend-side connections. They don't currently support TLS 1.3.
60-
6157
### Optionally enable TLS 1.3 when clients require certificate renegotiation
6258

6359
TLS 1.3 doesn't support certificate renegotiation. Certificate renegotiation in TLS allows client and server to renegotiate connection parameters mid-session for authentication without terminating the connection.
6460

65-
Services that we identified as reliant on client certificate renegotiation do not have TLS 1.3 enabled by default.
61+
Services that API Management identifies as reliant on client certificate renegotiation do not have TLS 1.3 enabled by default. You can choose to enable TLS 1.3 manually.
6662

6763
> [!WARNING]
6864
> If your APIs are accessed by TLS-compliant clients that rely on certificate renegotiation, enabling TLS 1.3 for client-side connections will cause those clients to fail to connect. Review APIs that recently used certificate renegotiation before enabling client-side TLS 1.3 in any service that doesn't have it enabled by default.
@@ -71,15 +67,15 @@ To enable TLS 1.3 for client-side connections in these instances, configure sett
7167

7268
1. On the **Protocols + ciphers** page, in the **Client protocol** section, next to **TLS 1.3**, select **View and manage configuration**.
7369
1. Review the list of **Recent client certificate renegotiations**. The list shows API operations where clients recently used client certificate renegotiation.
74-
1. If you choose to enable TLS 1.3 for client-side connections, select **Enable**.
70+
1. If you choose to enable TLS 1.3 for client-side connections, under **Change TLS 1.3 status**, select **Enable**.
7571
1. Select **Close**.
7672

7773
After enabling TLS 1.3, review gateway request metrics or TLS-related exceptions in logs that indicate TLS connection failures. If necessary, disable TLS 1.3 for client-side connections and downgrade to TLS 1.2.
7874

7975
If you need to disable TLS 1.3 for client-side connections in these instances, configure settings on the **Protocols + ciphers** page:
8076

8177
1. On the **Protocols + ciphers** page, in the **Client protocol** section, next to **TLS 1.3**, select **View and manage configuration**.
82-
1. Select **Disable**.
78+
1. Under **Change TLS 1.3 status**, elect **Disable**.
8379
1. Select **Close**.
8480

8581
### Backend-side TLS 1.3
@@ -91,7 +87,8 @@ Enabling backend-side TLS 1.3 is optional. If you enable it, API Management uses
9187
9288
You can enable backend-side TLS 1.3 from the **Protocols + ciphers** page:
9389

94-
1. On the **Protocols + ciphers** page, in the **Backend protocol** section, enable the **TLS 1.3** setting.
90+
1. On the **Protocols + ciphers** page, in the **Backend protocol** section, next to **TLS 1.3**, select **View and manage configuration**.
91+
1. Under **Change TLS 1.3 status**, select **Enable**.
9592
1. Select **Save**.
9693

9794
## Related content

articles/api-management/inject-vnet-v2.md

Lines changed: 23 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,29 @@ If you want to enable *public* inbound access to an API Management instance in t
5454
* Minimum: /27 (32 addresses)
5555
* Recommended: /24 (256 addresses) - to accommodate scaling of API Management instance
5656

57+
### Examples
58+
59+
The following table shows subnet sizing examples for API Management virtual network injection, illustrating how different CIDR blocks affect the number of scale-out units possible:
60+
61+
| Subnet CIDR | Total IP addresses | Azure reserved IPs | API Management instance IPs | Internal load balancer IP | Remaining IPs for scale-out | Max scale-out units | Total max units |
62+
|-------------|---------------------|---------------------|------------------------------|----------------------------|-----------------------------|----------------------|------------------|
63+
| /27 | 32 | 5 | 2 | 1 | 24 | 12 | 13 |
64+
| /26 | 64 | 5 | 2 | 1 | 56 | 28 | 29 |
65+
| /25 | 128 | 5 | 2 | 1 | 120 | 30* | 30* |
66+
67+
68+
### Key Points
69+
70+
- **Minimum subnet size**: /27 (provides 24 usable IP addresses for API Management)
71+
- **Azure reserved IPs**: 5 addresses per subnet (first and last for protocol conformance, plus 3 for Azure services)
72+
- **Scale-out requirement**: Each scale-out unit requires 2 IP addresses
73+
- **Internal load balancer**: Only required when API Management is deployed in internal virtual network mode
74+
- **Premium V2 limit**: * Currently supports up to 30 units maximum.
75+
76+
> [!IMPORTANT]
77+
> API Management is a member of Azure Integration Services and is typically deployed as a pivotal service in enterprise architectures. It is prudent to err on the higher side of available IPs for the API Management subnet as changing it later can have far-reaching impact.
78+
> The private IP addresses of internal load balancer and API Management units are assigned dynamically. Therefore, it is impossible to anticipate the private IP of the API Management instance prior to its deployment. Additionally, changing to a different subnet and then returning might cause a change in the private IP address.
79+
5780
### Network security group
5881

5982
[!INCLUDE [api-management-virtual-network-v2-nsg-rules](../../includes/api-management-virtual-network-v2-nsg-rules.md)]
@@ -76,8 +99,6 @@ You must have at least the following role-based access control permissions on th
7699
| Microsoft.Network/virtualNetworks/subnets/read | Read a virtual network subnet definition |
77100
| Microsoft.Network/virtualNetworks/subnets/join/action | Joins a virtual network |
78101

79-
80-
81102
## Inject API Management in a virtual network
82103

83104
When you [create](get-started-create-service-instance.md) a Premium v2 instance using the Azure portal, you can optionally configure settings for virtual network injection.

articles/batch/batch-container-isolation-task.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Configure container isolation in Azure Batch task
33
description: Learn how to configure isolation at task level in Azure Batch.
44
ms.topic: how-to
5-
ms.date: 04/02/2025
5+
ms.date: 01/06/2026
66
ms.devlang: csharp
77
ms.custom: batch
88
# Customer intent: As an Azure Batch user, I want to configure task-level container isolation, so that I can customize data paths and enhance security by preventing data leakage between containers.
@@ -58,7 +58,7 @@ Refer to the listed data paths that you can choose to attach to the container. A
5858

5959
> [!Note]
6060
> * If you use an empty list, the NodeAgent will not mount any data paths into the task's container. If you use null, the NodeAgent will mount the entire ephemeral disk (in Windows) or `AZ_BATCH_NODE_ROOT_DIR` (in Linux).
61-
> * If you don't mount the task data path into the container, you must set the task's property [workingDirectory](/rest/api/batchservice/task/add?tabs=HTTP#containerworkingdirectory) to containerImageDefault.
61+
> * If you don't mount the task data path into the container, you must set the task's property [workingDirectory](/rest/api/batchservice/tasks/create-task#containerworkingdirectory) to containerImageDefault.
6262
6363
Before running a container isolation task, you must create a pool with a container. For more information on how to create it, see this guide [Docker container workload](batch-docker-container-workloads.md).
6464

0 commit comments

Comments
 (0)