Skip to content

Commit fd0c9ed

Browse files
Merge pull request #310248 from MicrosoftDocs/main
Auto Publish – main to live - 2026-01-08 06:00 UTC
2 parents 94009d7 + f79ffd2 commit fd0c9ed

12 files changed

Lines changed: 63 additions & 126 deletions

File tree

articles/api-management/api-management-howto-manage-protocols-ciphers.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Manage protocols and ciphers in Azure API Management | Microsoft Learn
2+
title: Manage Protocols and Ciphers in Azure API Management
33
description: Learn how to manage transport layer security (TLS) protocols and cipher suites in Azure API Management.
44
services: api-management
55
author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: how-to
9-
ms.date: 10/10/2025
9+
ms.date: 01/06/2026
1010
ms.author: danlep
1111
---
1212

@@ -41,7 +41,7 @@ API Management supports TLS versions up to TLS 1.3 for client and backend connec
4141

4242
## How to manage TLS protocols and cipher suites
4343

44-
1. In the sidebar of your API Management instance, under **Security**, select **Protocols + ciphers**.
44+
1. In the sidebar menu of your API Management instance, under **Security**, select **Protocols + ciphers**.
4545
1. Enable or disable desired protocols or ciphers.
4646
1. Select **Save**.
4747

@@ -58,7 +58,7 @@ TLS 1.3 is a major revision of the TLS protocol that provides improved security
5858

5959
TLS 1.3 doesn't support certificate renegotiation. Certificate renegotiation in TLS allows client and server to renegotiate connection parameters mid-session for authentication without terminating the connection.
6060

61-
Services that API Management identifies as reliant on client certificate renegotiation do not have TLS 1.3 enabled by default. You can choose to enable TLS 1.3 manually.
61+
API Management instances that are detected as reliant on client certificate renegotiation do not have TLS 1.3 enabled by default. In these instances, you can choose to enable TLS 1.3 manually.
6262

6363
> [!WARNING]
6464
> If your APIs are accessed by TLS-compliant clients that rely on certificate renegotiation, enabling TLS 1.3 for client-side connections will cause those clients to fail to connect. Review APIs that recently used certificate renegotiation before enabling client-side TLS 1.3 in any service that doesn't have it enabled by default.

articles/api-management/breaking-changes/trusted-service-connectivity-retirement-march-2026.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,16 @@ The gateway in API Management services created on or after 1 December 2025 no lo
2121

2222
## Is my service affected by this change?
2323

24+
Trusted service connectivity retirement affects scenarios where the API Management gateway needs to communicate with Azure Storage, Key Vault, Key Vault Managed HSM, Service Bus, Event Hubs, or Container Registry services when they're configured as backends or accessed through policies such as `send-request`.
25+
26+
> [!IMPORTANT]
27+
> Trusted service connectivity remains supported for API Management control plane operations. The following scenarios continue to work without changes when using trusted service connectivity:
28+
> - Accessing Azure Storage for backup and restore
29+
> - Accessing Azure Key Vault for managing named values, backend credentials, or custom hostname certificates
30+
2431
First, check for an Azure Advisor recommendation:
2532

26-
1. In the Azure portal, go to [Advisor](https://ms.portal.azure.com/#view/Microsoft_Azure_Expert/AdvisorMenuBlade/~/overview)
33+
1. In the Azure portal, go to [Advisor](https://ms.portal.azure.com/#view/Microsoft_Azure_Expert/AdvisorMenuBlade/~/overview).
2734
1. Select the **Recommendations > Operational excellence** category.
2835
1. Search for "**Disable trusted service connectivity in API Management**".
2936

articles/azure-netapp-files/create-short-term-clone.md

Lines changed: 1 addition & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
55
author: b-ahibbard
66
ms.service: azure-netapp-files
77
ms.topic: how-to
8-
ms.date: 10/09/2025
8+
ms.date: 01/08/2026
99
ms.author: anfdocs
1010
---
1111
# Create a short-term clone volume in Azure NetApp Files
@@ -36,26 +36,6 @@ By default, short-term clones convert to regular volumes after 32 days.
3636
* During the clone operation, the parent volume is accessible; you can capture new snapshots of the parent volume.
3737
* You can create five short-term clones per regular volume.
3838

39-
## Register the feature
40-
41-
To take advantage of the feature, you must first register it.
42-
43-
1. Register the feature:
44-
45-
```azurepowershell-interactive
46-
Register-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFShortTermClone
47-
```
48-
49-
1. Registration for short-term clones isn't automatic and may take up to a week. Check the registration status with the command:
50-
51-
```azurepowershell-interactive
52-
Get-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFShortTermClone
53-
```
54-
55-
When the `RegistrationState` field output displays "Registered", you can create a short-term clone.
56-
57-
You can also use [Azure CLI commands](/cli/azure/feature) `az feature register` and `az feature show` to register the feature and display the registration status.
58-
5939
## Create a short-term clone
6040

6141
>[!NOTE]

articles/azure-netapp-files/migrate-volumes.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
55
author: b-ahibbard
66
ms.service: azure-netapp-files
77
ms.topic: how-to
8-
ms.date: 11/05/2025
8+
ms.date: 01/08/2026
99
ms.author: anfdocs
1010
---
1111
# Migrate volumes to Azure NetApp Files
@@ -22,7 +22,8 @@ With Azure NetApp Files' migration assistant, you can peer and migrate volumes f
2222
* The delegated subnet address space should be sized appropriately to accommodate more Azure NetApp Files network interfaces. Review [Guidelines for Azure NetApp Files network planning](azure-netapp-files-network-topologies.md) to ensure you meet the requirements for delegated subnet sizing.
2323
* With the migration assistant, Azure NetApp Files volumes must be using Standard networking features. For more information about setting network features, see [Configure network features](configure-network-features.md).
2424
* After issuing the peering request, the request must be accepted within 60 minutes. Peer requests expire if not accepted within 60 minutes.
25-
* You should complete migrations from a single source cluster using one Azure subscription before migrating volumes destined for another subscription. Cluster peering fails when using a second Azure subscription and the same external source clusters.
25+
* You should complete migrations from a single source cluster using one Azure subscription before migrating volumes destined for another subscription. Cluster peering fails when using a second Azure subscription and the same external source clusters.
26+
* You should ensure that the earlier cluster peering request are deleted and are not displaying on the source cluster before initiating a new cluster peering request.
2627
* If you use Azure RBAC to separate the role of Azure NetApp Files storage management with the intention of separating volume management tasks where volumes reside on the same network sibling set, be aware that externally connected ONTAP systems peered to that sibling set don't adhere to these Azure-defined roles. The external storage administrator might have limited visibility to all volumes in the sibling set showing storage level metadata details.
2728
* When creating each migration volume, the Azure NetApp Files volume placement algorithm attempts to reuse the same Azure NetApp Files storage system as any previously created volumes in the subscription to reduce the number of network interface cards (NICs) or IPs consumed in the delegated subnet. If this isn't possible, an additional seven NICs are consumed.
2829
* You should ensure that there are no external FlexGroup volumes as they can't be migrated to Azure NetApp Files large volumes.

articles/communication-services/how-tos/calling-sdk/active-call-transfer.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,6 @@ ms.custom: template-how-to
1919

2020
During an active call, you may want to transfer the call to device that you are signed in on. Let's learn how.
2121

22-
23-
2422
## Prerequisites
2523

2624
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).

articles/communication-services/how-tos/calling-sdk/includes/active-call-transfer/active-call-transfer.md

Lines changed: 37 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -9,29 +9,47 @@ ms.author: dmceachern
99
[!INCLUDE [Install SDK](../install-sdk/install-sdk-web.md)]
1010

1111
## Active Call Management
12-
Active Call Transfer is a feature of the core `CallAgent` API. This guide talks about how you can manage and track any ongoing calls for your users and how to transfer their client to that active call.
12+
Active Call Transfer is a feature of the `CallAgent` on its `feature` API. This guide talks about how you can manage and track any ongoing calls for your users and how to transfer their client to that active call.
1313

14-
**Note:** This feature is also enabled for the `TeamsCallAgent` as this feature is supported for Teams users as well.
14+
> [!NOTE]
15+
> This feature is also enabled for the `TeamsCallAgent` as this feature is supported for Teams users as well. This feature is not supported for [Teams Phone Extensibility](../../../../quickstarts/tpe/teams-phone-extensibility-quickstart.md) users.
1516
1617
This guide assumes you went through the QuickStart or that you implemented an application that is able to make and receive calls. If you didn't complete the getting starting guide, refer to our [Quickstart](../../../../quickstarts/voice-video-calling/getting-started-with-calling.md).
1718

18-
### Fetch your Active Call
19+
### Create CallAgentFeature for Active Call Transfer
1920

20-
When your user signs to the `CallAgent` there is a new method that you can use to fetch the ongoing calls `getActiveCallDetails` the response will return to you the active call, or active meeting that your users are in.
21+
The first thing you need to do when setting up Active Call Transfer is you need to create the `CallAgentFeature` for it. Creating this feature does the setup needed to start using the underlying APIs for the functionality of Active Call Transfer. It also holds all the functions and events for Active Call Transfer.
2122

2223
```js
23-
const activeCallDetails = await callAgent.getActiveCallDetails();
24+
const activeCallTransferFeature = callAgent.feature(ActiveCallTransfer);
2425
```
2526

26-
The function `getActiveCallDetails` a way that you can manually query for this data. Once you have the active call details, you can use it to switch the client to the call that was found. This function returns `undefined` if there is no active call ongoing for your user. You can use `getActiveCallDetails` to fetch any ongoing calls when you first sign into the `CallAgent` to pick up on any calls that are already ongoing.
27+
### Fetch your Active Calls
28+
29+
After you create the feature API, there is a method that you can use to fetch the ongoing calls `getActiveCallDetails`. The response returns the active calls, or active meetings that your users are in.
30+
31+
```js
32+
const activeCallTransferFeature = callAgent.feature(ActiveCallTransfer);
33+
const activeCallDetails = await activeCallTransferFeature.getActiveCallDetails();
34+
```
35+
36+
The function `getActiveCallDetails` is a way that you can manually query for this data. Once you have the active call details, you can use it to switch the client to any of the calls that were found. If there are ongoing calls this returns an array of `ActiveCallDetails` and `ActiveMeetingDetails`. To be considered in an active call the user can also be in a call that is on hold. This function returns `undefined` if there is no active call ongoing for your user. Best practice is to use `getActiveCallDetails` to fetch any ongoing calls when you first sign into the `CallAgent` to pick up on any calls that are already ongoing.
2737

2838
### Switch your Active Call
2939

30-
Once you have your active call data, you can switch the client over to the new call. This call switching behavior can be done with the `activeCallTransfer` function.
40+
Once you have your active call data, you can switch the client over to the new call. This call switching behavior can be done with the `activeCallTransfer` function. Here you can also pass in your `joinCallOptions` to choose the [device configuration](../../../../how-tos/calling-sdk/manage-video.md) of the joining client.
41+
42+
> [!NOTE]
43+
> When transferring a client that is already in a call to a different call it is important to make sure you put the ongoing call for the client on hold before initiating the transfer.
3144
3245
```js
33-
const activeCallDetails = await callAgent.getActiveCallDetails();
34-
const call = await callAgent.activeCallTransfer(activeCallDetails, {isTransfer: true});
46+
const joinCallOptions = {
47+
audioOptions: { isMuted: false },
48+
videoOptions: { localVideoStreams: [yourLocalVideoStream]}
49+
}
50+
const activeCallTransferFeature = callAgent.feature(ActiveCallTransfer);
51+
const activeCallDetails = await activeCallTransferFeature.getActiveCallDetails();
52+
const call = await activeCallTransferFeature.activeCallTransfer(activeCallDetails[0], {isTransfer: true, joinCallOptions});
3553
```
3654

3755
This function returns the call object for your applications state.
@@ -41,24 +59,27 @@ This function returns the call object for your applications state.
4159
When transferring the active call to your client, you can just bring the client into the call without hanging up on the device that initiated the call the user is in.
4260

4361
```js
44-
const activeCallDetails = await callAgent.getActiveCallDetails();
45-
const call = await callAgent.activeCallTransfer(activeCallDetails, {isTransfer: false}); // <-- isTransfer: false - does not remove the original client.
62+
const activeCallTransferFeature = callAgent.feature(ActiveCallTransfer);
63+
const activeCallDetails = await activeCallTransferFeature.getActiveCallDetails();
64+
const call = await activeCallTransferFeature.activeCallTransfer(activeCallDetails[0], { isTransfer: false }); // <-- isTransfer: false - does not remove the original client.
4665
```
4766

4867
### Subscribe to Active Call Notification events
4968

50-
There are two new events that you can subscribe to so you can receive events notifying you of your user joining a call on another client. The first event notifies the application that the user is in a call on another device. This event is also emitted when the user logs into the `CallAgent` if they are on a call already elsewhere.
69+
There are two new events that you can subscribe to so you can receive events notifying you of your user joining a call on another client. The first event `"activeCallsUpdated"` notifies the application that the user is in a call on another device. Since the feature needs to be initialized to get these events best practice is to manually fetch the active calls after creating the `CallAgent` with `getActiveCallDetails`. The third case where this event fires is when a call ends for the user but they are still in another call. In all of the cases the event fires it returns an array of `ActiveCallDetails` and `ActiveMeetingDetails` representing the calls that the user is in.
5170

5271
```js
53-
callAgent.on("activeCallsUpdated", (args) => {
72+
const activeCallTransferFeature = callAgent.feature(ActiveCallTransfer);
73+
activeCallTransferFeature.on("activeCallsUpdated", (args) => {
5474
// show UI indicating that the user is in another call on another device
55-
await callAgent.activeCallTransfer(args.activeCallDetails, {isTransfer: true});
75+
await activeCallTransferFeature.activeCallTransfer(args.activeCallDetails[0], { isTransfer: true });
5676
});
5777
```
58-
The second event notifies the application that the user is no longer in an active call anywhere else. This event is to be used to hide any UI indicating that they are in a call elsewhere, and any controls to manually transfer the call over.
78+
The second event `"NoActiveCalls"` notifies the application that the user is no longer in an active call anywhere else. This event is to be used to hide any UI indicating that they are in a call elsewhere, and any controls to manually transfer the call over.
5979

6080
```js
61-
callAgent.on("NoActiveCalls", () => {
81+
const activeCallTransferFeature = callAgent.feature(ActiveCallTransfer);
82+
activeCallTransferFeature.on("NoActiveCalls", () => {
6283
// hide UI indicating that the user is in a call elsewhere
6384
});
6485
```

articles/frontdoor/end-to-end-tls.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,6 @@ For the Azure Front Door Standard/Premium managed certificate option, the certif
101101

102102
> [!IMPORTANT]
103103
> - For Azure Front Door Classic and Azure CDN Classic, managed certificates will no longer be supported starting August 15, 2025. To avoid service disruption, either switch to **Bring Your Own Certificate (BYOC)** or migrate to Azure Front Door Standard/Premium before this date. Existing managed certificates will continue to autorenew until August 15, 2025, and remain valid until April 14, 2026. However, it's highly recommended to switch to **BYOC** or migrate to Front Door Standard/Premium before August 15, 2025, to avoid unexpected certificate revocation.
104-
> - Auto-rotation for managed certificates fails if your domains don't have direct CNAME mapping to Azure Front Door Classic or Azure CDN Classic endpoints. See [Azure CDN Classic HTTPS for custom domains](/azure/cdn/cdn-custom-ssl?tabs=option-1-default-enable-https-with-a-cdn-managed-certificate#tlsssl-certificates) and [Azure Front Door Classic HTTPS for custom domains](/azure/frontdoor/front-door-custom-domain-https?tabs=powershell#option-1-default-use-a-certificate-managed-by-front-door).
105104
> - Azure Front Door (AFD) Standard and Premium use DigiCert‑issued managed TLS certificates, and DigiCert is retiring the G1 root certificate that expires on April 14, 2026, replacing it with the G2 root certificate. Azure Front Door will automatically rotate AFD‑managed certificates before expiration for custom domains that directly CNAME to the Azure Front Door endpoint, and no customer action is required. Customers whose domains do not directly CNAME to Azure Front Door must manually rotate their certificates to use the DigiCert G2 root certificate before April 14, 2026 to avoid TLS connectivity issues.
106105
107106
For your own custom TLS/SSL certificate:
@@ -111,7 +110,7 @@ For your own custom TLS/SSL certificate:
111110
1. If a specific version is selected, autorotation isn’t supported. You'll have to reselect the new version manually to rotate certificate. It takes up to 24 hours for the new version of the certificate/secret to be deployed.
112111

113112
> [!NOTE]
114-
> Azure Front Door (Standard and Premium) managed certificates are automatically rotated if the domain CNAME record points directly to a Front Door endpoint or points indirectly to a Traffic Manager endpoint. Otherwise, you need to re-validate the domain ownership to rotate the certificates.
113+
> Azure Front Door (AFD) Standard and Premium automatically rotate managed certificates only when the custom domain CNAME points directly to the AFD endpoint; for indirect CNAME configurations, we strongly recommend using a bring‑your‑own certificate, as AFD will attempt domain validation via file‑based token validation when traffic reaches AFD but successful validation is not guaranteed.
115114
116115
The service principal for Front Door must have access to the key vault. The updated certificate rollout operation by Azure Front Door won't cause any production downtime, as long as the subject name or subject alternate name (SAN) for the certificate hasn't changed.
117116

0 commit comments

Comments
 (0)