You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/api-management-access-restriction-policies.md
+10Lines changed: 10 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -158,6 +158,8 @@ This policy can be used in the following policy [sections](./api-management-howt
158
158
159
159
The `rate-limit-by-key` policy prevents API usage spikes on a per key basis by limiting the call rate to a specified number per a specified time period. The key can have an arbitrary string value and is typically provided using a policy expression. Optional increment condition can be added to specify which requests should be counted towards the limit. When this call rate is exceeded, the caller receives a `429 Too Many Requests` response status code.
For more information and examples of this policy, see [Advanced request throttling with Azure API Management](./api-management-sample-flexible-throttling.md).
162
164
163
165
> [!CAUTION]
@@ -231,6 +233,8 @@ This policy can be used in the following policy [sections](./api-management-howt
231
233
232
234
The `ip-filter` policy filters (allows/denies) calls from specific IP addresses and/or address ranges.
@@ -345,6 +349,9 @@ For more information and examples of this policy, see [Advanced request throttli
345
349
> [!NOTE]
346
350
> To understand the difference between rate limits and quotas, [see Rate limits and quotas.](./api-management-sample-flexible-throttling.md#rate-limits-and-quotas)
@@ -410,6 +417,9 @@ The `validate-jwt` policy enforces existence and validity of a JSON web token (J
410
417
> The `validate-jwt` policy supports HS256 and RS256 signing algorithms. For HS256 the key must be provided inline within the policy in the base64 encoded form. For RS256 the key may be provided either via an Open ID configuration endpoint, or by providing the ID of an uploaded certificate that contains the public key or modulus-exponent pair of the public key.
411
418
> The `validate-jwt` policy supports tokens encrypted with symmetric keys using the following encryption algorithms: A128CBC-HS256, A192CBC-HS384, A256CBC-HS512.
Copy file name to clipboardExpand all lines: articles/api-management/validation-policies.md
+10-1Lines changed: 10 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -64,6 +64,8 @@ We recommend performing load tests with your expected production workloads to as
64
64
65
65
The `validate-content` policy validates the size or content of a request or response body against one or more [supported schemas](#schemas-for-content-validation).
The following table shows the schema formats and request or response content types that the policy supports. Content type values are case insensitive.
68
70
69
71
| Format | Content types |
@@ -180,6 +182,8 @@ The `validate-parameters` policy validates the header, query, or path parameters
180
182
> [!IMPORTANT]
181
183
> If you imported an API using a management API version prior to `2021-01-01-preview`, the `validate-parameters` policy might not work. You may need to [reimport your API](/rest/api/apimanagement/current-ga/apis/create-or-update) using management API version `2021-01-01-preview` or later.
@@ -247,6 +251,9 @@ The `validate-headers` policy validates the response headers against the API sch
247
251
> [!IMPORTANT]
248
252
> If you imported an API using a management API version prior to `2021-01-01-preview`, the `validate-headers` policy might not work. You may need to reimport your API using management API version `2021-01-01-preview` or later.
@@ -287,7 +294,9 @@ This policy can be used in the following policy [sections](./api-management-howt
287
294
288
295
## Validate status code
289
296
290
-
The `validate-status-code` policy validates the HTTP status codes in responses against the API schema. This policy may be used to prevent leakage of backend errors, which can contain stack traces.
297
+
The `validate-status-code` policy validates the HTTP status codes in responses against the API schema. This policy may be used to prevent leakage of backend errors, which can contain stack traces.
Copy file name to clipboardExpand all lines: includes/api-management-policy-form-alert.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -6,4 +6,4 @@ ms.date: 03/14/2022
6
6
ms.author: danlep
7
7
---
8
8
> [!TIP]
9
-
> To help configure this policy, the portal provides a guided, form-based editor. Learn more about [policy configuration options](../articles/api-management/set-edit-policies.md#configure-policy-in-the-portal).
9
+
> To help you configure this policy, the portal provides a guided, form-based editor. Learn more about [policy configuration options](../articles/api-management/set-edit-policies.md#configure-policy-in-the-portal).
0 commit comments