You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/aad-sspr-technical-profile.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,7 +64,7 @@ The **InputClaimsTransformations** element may contain a collection of **InputCl
64
64
65
65
### Output claims
66
66
67
-
The Microsoft Entra SSPR protocol provider does not return any **OutputClaims**, thus there is no need to specify output claims. You can, however, include claims that aren't returned by the Microsoft Entra SSPR protocol provider as long as you set the `DefaultValue` attribute.
67
+
The Microsoft Entra SSPR protocol provider does not return any **OutputClaims**, thus, there is no need to specify output claims. You can, however, include claims that aren't returned by the Microsoft Entra SSPR protocol provider as long as you set the `DefaultValue` attribute.
68
68
69
69
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/access-tokens.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,7 +85,7 @@ Replace the values in the query string as follows:
85
85
86
86
To get a feel of how the request works, paste the request into your browser and run it.
87
87
88
-
This's the interactive part of the flow, where you take action. You're asked to complete the user flow's workflow. This might involve entering your username and password in a sign in form or any other number of steps. The steps you complete depend on how the user flow is defined.
88
+
This is the interactive part of the flow, where you take action. You're asked to complete the user flow's workflow. This might involve entering your username and password in a sign in form or any other number of steps. The steps you complete depend on how the user flow is defined.
89
89
90
90
The response with the authorization code should be similar to this example:
Copy file name to clipboardExpand all lines: articles/api-center/export-to-copilot-studio.yml
+3-1Lines changed: 3 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -8,6 +8,8 @@ metadata:
8
8
ms.service: azure-api-management
9
9
ms.topic: how-to
10
10
ms.date: 04/28/2025
11
+
ms.collection: ce-skilling-ai-copilot
12
+
ms.update-cycle: 180-days
11
13
ms.custom: template-how-to
12
14
13
15
#customer intent: As an API program manager, I want to export an API from my API center inventory as a connector in Microsoft Copilot Studio for use in agents.
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-manage-protocols-ciphers.md
+10-13Lines changed: 10 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlepow
6
6
7
7
ms.service: azure-api-management
8
8
ms.topic: how-to
9
-
ms.date: 08/12/2025
9
+
ms.date: 10/10/2025
10
10
ms.author: danlep
11
11
---
12
12
@@ -21,7 +21,7 @@ Azure API Management supports multiple versions of Transport Layer Security (TLS
21
21
22
22
API Management also supports multiple cipher suites used by the API gateway.
23
23
24
-
Depending on the service tier, API Management supports TLS versions up to 1.2 or TLS 1.3 for client and backend connectivity and several supported cipher suites. This guide shows you how to manage protocols and ciphers configuration for an Azure API Management instance.
24
+
API Management supports TLS versions up to TLS 1.3 for client and backend connectivity and several supported cipher suites. This guide shows you how to manage protocols and ciphers configuration for an Azure API Management instance.
25
25
26
26
:::image type="content" source="media/api-management-howto-manage-protocols-ciphers/api-management-protocols-ciphers.png" alt-text="Screenshot of managing protocols and ciphers in the Azure portal.":::
27
27
@@ -33,7 +33,6 @@ Depending on the service tier, API Management supports TLS versions up to 1.2 or
33
33
> [!NOTE]
34
34
> Depending on the API Management service tier, changes can take 15 to 45 minutes or longer to apply. An instance in the Developer service tier has downtime during the process. Instances in the Basic and higher tiers don't have downtime during the process.
35
35
36
-
37
36
## Prerequisites
38
37
39
38
* An API Management instance. [Create one if you haven't already](get-started-create-service-instance.md).
@@ -42,27 +41,24 @@ Depending on the service tier, API Management supports TLS versions up to 1.2 or
42
41
43
42
## How to manage TLS protocols and cipher suites
44
43
45
-
1. In the left navigation of your API Management instance, under **Security**, select **Protocols + ciphers**.
44
+
1. In the sidebar of your API Management instance, under **Security**, select **Protocols + ciphers**.
46
45
1. Enable or disable desired protocols or ciphers.
47
46
1. Select **Save**.
48
47
49
48
> [!NOTE]
50
49
> Some protocols or cipher suites (such as backend-side TLS 1.2) can't be enabled or disabled from the Azure portal. Instead, you'll need to apply the REST API call. Use the `properties.customProperties` structure in the [Create/Update API Management Service](/rest/api/apimanagement/current-ga/api-management-service/create-or-update) REST API.
51
50
52
-
## TLS 1.3 support in classic tiers
51
+
## TLS 1.3 support
53
52
54
-
TLS 1.3 support is available in the API Management classic service tiers (**Consumption**, **Developer**, **Basic**, **Standard**, and **Premium**). In most instances created in those service tiers, TLS 1.3 is permanently enabled by default for client-side connections. Enabling backend-side TLS 1.3 is optional. TLS 1.2 is also enabled by default on both client and backend sides.
53
+
TLS 1.3 support is available in all API Management service tiers. In most instances created in those service tiers, TLS 1.3 is permanently enabled by default for client-side connections. Enabling backend-side TLS 1.3 is optional. TLS 1.2 is also enabled by default on both client and backend sides.
55
54
56
55
TLS 1.3 is a major revision of the TLS protocol that provides improved security and performance. It includes features such as reduced handshake latency and improved security against certain types of attacks.
57
56
58
-
> [!NOTE]
59
-
> The [v2 tiers](v2-service-tiers-overview.md) of API Management and [workspace gateways](workspaces-overview.md) support TLS 1.2 by default for client-side and backend-side connections. They don't currently support TLS 1.3.
60
-
61
57
### Optionally enable TLS 1.3 when clients require certificate renegotiation
62
58
63
59
TLS 1.3 doesn't support certificate renegotiation. Certificate renegotiation in TLS allows client and server to renegotiate connection parameters mid-session for authentication without terminating the connection.
64
60
65
-
Services that we identified as reliant on client certificate renegotiation do not have TLS 1.3 enabled by default.
61
+
Services that API Management identifies as reliant on client certificate renegotiation do not have TLS 1.3 enabled by default. You can choose to enable TLS 1.3 manually.
66
62
67
63
> [!WARNING]
68
64
> If your APIs are accessed by TLS-compliant clients that rely on certificate renegotiation, enabling TLS 1.3 for client-side connections will cause those clients to fail to connect. Review APIs that recently used certificate renegotiation before enabling client-side TLS 1.3 in any service that doesn't have it enabled by default.
@@ -71,15 +67,15 @@ To enable TLS 1.3 for client-side connections in these instances, configure sett
71
67
72
68
1. On the **Protocols + ciphers** page, in the **Client protocol** section, next to **TLS 1.3**, select **View and manage configuration**.
73
69
1. Review the list of **Recent client certificate renegotiations**. The list shows API operations where clients recently used client certificate renegotiation.
74
-
1. If you choose to enable TLS 1.3 for client-side connections, select **Enable**.
70
+
1. If you choose to enable TLS 1.3 for client-side connections, under **Change TLS 1.3 status**, select **Enable**.
75
71
1. Select **Close**.
76
72
77
73
After enabling TLS 1.3, review gateway request metrics or TLS-related exceptions in logs that indicate TLS connection failures. If necessary, disable TLS 1.3 for client-side connections and downgrade to TLS 1.2.
78
74
79
75
If you need to disable TLS 1.3 for client-side connections in these instances, configure settings on the **Protocols + ciphers** page:
80
76
81
77
1. On the **Protocols + ciphers** page, in the **Client protocol** section, next to **TLS 1.3**, select **View and manage configuration**.
Copy file name to clipboardExpand all lines: articles/api-management/inject-vnet-v2.md
+23-2Lines changed: 23 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,6 +54,29 @@ If you want to enable *public* inbound access to an API Management instance in t
54
54
* Minimum: /27 (32 addresses)
55
55
* Recommended: /24 (256 addresses) - to accommodate scaling of API Management instance
56
56
57
+
### Examples
58
+
59
+
The following table shows subnet sizing examples for API Management virtual network injection, illustrating how different CIDR blocks affect the number of scale-out units possible:
60
+
61
+
| Subnet CIDR | Total IP addresses | Azure reserved IPs | API Management instance IPs | Internal load balancer IP | Remaining IPs for scale-out | Max scale-out units | Total max units |
-**Minimum subnet size**: /27 (provides 24 usable IP addresses for API Management)
71
+
-**Azure reserved IPs**: 5 addresses per subnet (first and last for protocol conformance, plus 3 for Azure services)
72
+
-**Scale-out requirement**: Each scale-out unit requires 2 IP addresses
73
+
-**Internal load balancer**: Only required when API Management is deployed in internal virtual network mode
74
+
-**Premium V2 limit**: * Currently supports up to 30 units maximum.
75
+
76
+
> [!IMPORTANT]
77
+
> API Management is a member of Azure Integration Services and is typically deployed as a pivotal service in enterprise architectures. It is prudent to err on the higher side of available IPs for the API Management subnet as changing it later can have far-reaching impact.
78
+
> The private IP addresses of internal load balancer and API Management units are assigned dynamically. Therefore, it is impossible to anticipate the private IP of the API Management instance prior to its deployment. Additionally, changing to a different subnet and then returning might cause a change in the private IP address.
@@ -76,8 +99,6 @@ You must have at least the following role-based access control permissions on th
76
99
| Microsoft.Network/virtualNetworks/subnets/read | Read a virtual network subnet definition |
77
100
| Microsoft.Network/virtualNetworks/subnets/join/action | Joins a virtual network |
78
101
79
-
80
-
81
102
## Inject API Management in a virtual network
82
103
83
104
When you [create](get-started-create-service-instance.md) a Premium v2 instance using the Azure portal, you can optionally configure settings for virtual network injection.
Copy file name to clipboardExpand all lines: articles/batch/batch-container-isolation-task.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Configure container isolation in Azure Batch task
3
3
description: Learn how to configure isolation at task level in Azure Batch.
4
4
ms.topic: how-to
5
-
ms.date: 04/02/2025
5
+
ms.date: 01/06/2026
6
6
ms.devlang: csharp
7
7
ms.custom: batch
8
8
# Customer intent: As an Azure Batch user, I want to configure task-level container isolation, so that I can customize data paths and enhance security by preventing data leakage between containers.
@@ -58,7 +58,7 @@ Refer to the listed data paths that you can choose to attach to the container. A
58
58
59
59
> [!Note]
60
60
> * If you use an empty list, the NodeAgent will not mount any data paths into the task's container. If you use null, the NodeAgent will mount the entire ephemeral disk (in Windows) or `AZ_BATCH_NODE_ROOT_DIR` (in Linux).
61
-
> * If you don't mount the task data path into the container, you must set the task's property [workingDirectory](/rest/api/batchservice/task/add?tabs=HTTP#containerworkingdirectory) to containerImageDefault.
61
+
> * If you don't mount the task data path into the container, you must set the task's property [workingDirectory](/rest/api/batchservice/tasks/create-task#containerworkingdirectory) to containerImageDefault.
62
62
63
63
Before running a container isolation task, you must create a pool with a container. For more information on how to create it, see this guide [Docker container workload](batch-docker-container-workloads.md).
0 commit comments