Skip to content

Commit 0124f77

Browse files
committed
more edits/questions
1 parent dbe60ad commit 0124f77

File tree

2 files changed

+11
-12
lines changed

2 files changed

+11
-12
lines changed

articles/azure-signalr/howto-use-managed-identity.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ In Azure SignalR Service, you can use a managed identity from Azure Active Direc
1515
- Obtain access tokens
1616
- Access secrets in Azure Key Vault
1717

18-
The service supports only one managed identity, so you can create either a system-assigned or user-assigned identity. A system-assigned identity is dedicated to your SignalR instance and is deleted when you delete the instance. A user-assigned identity is managed independently of your SignalR resource.
18+
The service supports only one managed identity; you can create either a system-assigned or user-assigned identity. A system-assigned identity is dedicated to your SignalR instance and is deleted when you delete the instance. A user-assigned identity is managed independently of your SignalR resource.
1919

2020
This article shows you how to create a managed identity for Azure SignalR Service and how to use it in serverless scenarios.
2121

@@ -44,6 +44,8 @@ To add a system-managed identity to your SignalR instance:
4444

4545
:::image type="content" source="media/signalr-howto-use-managed-identity/system-identity-portal.png" alt-text="Add a system-assigned identity in the portal":::
4646

47+
1. Select **Yes** to confirm the change.
48+
4749
### Add a user-assigned identity
4850

4951
To add a user-assigned identity to your SignalR instance, you need to create the identity then add it to your service.
@@ -60,7 +62,7 @@ To add a user-assigned identity to your SignalR instance, you need to create the
6062

6163
Azure SignalR Service is a fully managed service. It uses a managed identity to obtain an access token. In serverless scenarios, the service adds the access token into the `Authorization` header in an upstream request.
6264
> [!NOTE]
63-
> Is this a specific type of upstream request? If so, we should say so.
65+
> QUESTION: Is this a specific type of upstream request? If so, we should say so.
6466
6567
### Enable managed identity authentication in upstream settings
6668

@@ -71,7 +73,7 @@ Once you've added a [system-assigned identity](#add-a-system-assigned-identity)
7173
1. Select the **Serverless** service mode.
7274
1. Enter the upstream URL pattern in the **Add an upstream URL pattern** text box.
7375
> [!NOTE]
74-
> Where do I get the upstream URL pattern?
76+
> QUESTION: Where do I get the upstream URL pattern?
7577
1. Select Add one Upstream Setting and select any asterisk to get into a detailed page as shown below.
7678
:::image type="content" source="media/signalr-howto-use-managed-identity/pre-msi-settings.png" alt-text="pre-msi-setting":::
7779

@@ -86,7 +88,7 @@ Once you've added a [system-assigned identity](#add-a-system-assigned-identity)
8688
- Resource ID of an Azure service (For a list of Azure services that support managed identities, see [Azure services that support managed identities](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication).)
8789

8890
> [!NOTE]
89-
> If you validate an access token by yourself in your service, you can choose any one of the resource formats. Just make sure that the **Resource** value in **Auth** settings and the validation are consistent. If you use Azure role-based access control (Azure RBAC) for a data plane, you must use the resource that the service provider requests.
91+
> If you manually validate an access token your service, you can choose any one of the resource formats. Make sure that the **Resource** value in **Auth** settings and the validation are consistent. When you use Azure role-based access control (Azure RBAC) for a data plane, you must use the resource format that the service provider requests.
9092
9193
### Validate access tokens
9294

@@ -111,11 +113,11 @@ You can easily set access validation for a Function App without code changes usi
111113
1. go to **Upstream settings** in SignalR Service and choose **Use Managed Identity** and **Select from existing Applications**. Select the application you created previously.
112114

113115
> [!NOTE]
114-
> What application was created previously? The Function App?
116+
> QUESTION: What application was created previously? The Function App?
115117
116118
After configuring these settings, the Function App will reject requests without an access token in the header.
117119

118-
> [!Important]
120+
> [!IMPORTANT]
119121
> To pass the authentication, the *Issuer Url* must match the *iss* claim in token. Currently, we only support v1 endpoint (see [v1.0 and v2.0](../active-directory/develop/access-tokens.md)).
120122
121123
To verify the *Issuer Url* format in your Function app:
@@ -127,7 +129,6 @@ To verify the *Issuer Url* format in your Function app:
127129
1. Select **Issuer Url**.
128130
1. Verify that the *Issuer Url* has the format `https://sts.windows.net/<tenant-id>/`.
129131

130-
131132
## Use a managed identity for Key Vault reference
132133

133134
SignalR Service can access Key Vault to get secrets using the managed identity.
@@ -137,7 +138,6 @@ SignalR Service can access Key Vault to get secrets using the managed identity.
137138

138139
Currently, this feature can be used to [Reference secret in Upstream URL Pattern](./concept-upstream.md#key-vault-secret-reference-in-url-template-settings)
139140

140-
141141
## Next steps
142142

143143
- [Azure Functions development and configuration with Azure SignalR Service](signalr-concept-serverless-development-config.md)

articles/azure-signalr/signalr-overview.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -57,17 +57,16 @@ SignalR Service works with a broad range of clients, such as:
5757
* web and mobile browsers
5858
* desktop apps
5959
* mobile apps
60-
* server process
6160
* IoT devices
6261
* game consoles
6362

6463
**Multiple Language Support:**
6564

6665
SignalR Service offers SDKs in different languages:
6766

68-
* native ASP.NET Core or ASP.NET C# SDKs
69-
* JavaScript client SDK to enable web clients, and many other JavaScript frameworks for Java applications including Android native apps
70-
* REST API
67+
* Client side: [Any client libraries supporting SignalR protocol](https://learn.microsoft.com/en-us/aspnet/core/signalr/client-features?view=aspnetcore-7.0) are compatible with SignalR service.
68+
* Server side: ASP.NET Core or ASP.NET web applications
69+
* Serverless support through REST APIs, Azure Functions triggers and bindings, and Event Grid integrations.
7170

7271
**Handle large-scale client connections:**
7372

0 commit comments

Comments
 (0)