You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-apps/sessions.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,11 +95,11 @@ Example strategies include:
95
95
> [!IMPORTANT]
96
96
> Failure to secure access to sessions may result in misuse or unauthorized access to data stored in your users' sessions.
97
97
98
-
### Authentication
98
+
### <aname="authentication"></a>Authentication and authorization
99
99
100
-
When you send HTTP requests to a session, authentication is handled using Microsoft Entra (formerly Azure Active Directory) tokens. Valid Microsoft Entra tokens are generated by an identity belonging to the *Azure ContainerApps Session Executor* role on the session pool.
100
+
When you send HTTP requests to a session, authentication is handled using Microsoft Entra (formerly Azure Active Directory) tokens. Only Microsoft Entra tokens from an identity belonging to the *Azure ContainerApps Session Executor* role on the session pool are authorized to call the pool management API.
101
101
102
-
To assign the roles to an identity, use the following Azure CLI commands:
102
+
To assign the role to an identity, use the following Azure CLI command:
103
103
104
104
```bash
105
105
az role assignment create \
@@ -178,7 +178,7 @@ access_token = token.token
178
178
---
179
179
180
180
> [!IMPORTANT]
181
-
> A valid token can be used to create and access any session in the pool. Keep your tokens secure and don't share them with untrusted parties. End users should access sessions through your application, not directly.
181
+
> A valid token can be used to create and access any session in the pool. Keep your tokens secure and don't share them with untrusted parties. End users should access sessions through your application, not directly. They should never have access to the tokens used to authenticate requests to the session pool.
0 commit comments