Skip to content

Commit 104f266

Browse files
authored
remove some typos
1 parent a52bc31 commit 104f266

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/azure-functions/durable/durable-functions-best-practice-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,10 +77,10 @@ As with anything performance related, the ideal concurrency settings and archite
7777

7878
### Avoid sensitive data in inputs, outputs, and exceptions
7979

80-
Inputs and outputs (including exceptions) to and from Durable Functions APIs are [durably persisted](./durable-functions-serialization-and-persistence.md) in your [storage provider of choice](./durable-functions-storage-providers.md). If those inpusts, outputs, or exceptions contain sensitive data (such as secrets, connection strings, personally identifiable information, etc.) then anyone with read access to those resources would be able to obtain them. To safely deal with sensitive data, we recommend that users fetch them directly from Azure Key Vault or environment variables _inside of activity functions_ and to never communicate that data to orchestrators or entities. That should help prevent this data from leaking into your storage resources.
80+
Inputs and outputs (including exceptions) to and from Durable Functions APIs are [durably persisted](./durable-functions-serialization-and-persistence.md) in your [storage provider of choice](./durable-functions-storage-providers.md). If those inpusts, outputs, or exceptions contain sensitive data (such as secrets, connection strings, personally identifiable information, etc.) then anyone with read access your storage provider's resources would be able to obtain them. To safely deal with sensitive data, we recommend users that data _from within activity functions_ from either Azure Key Vault or environment variables, and to never communicate that data to orchestrators or entities. That should help prevent this data from leaking into your storage resources.
8181

8282
> [!NOTE]
83-
> This guidance also applies to the `CallHttp` orchestrator API, which persists its request and response payloads. If your target HTTP endpoints require authentication, then we recommend users to implement the HTTP Call themselves inside of an activity, or to use the built-in managed identity support offered by `CallHTTP`, which does not persist any credentials to storage.
83+
> This guidance also applies to the `CallHttp` orchestrator API, which persists its request and response payloads in storage. If your target HTTP endpoints require authentication, which may be sensitive, we recommend users to implement the HTTP Call themselves inside of an activity, or to use the built-in managed identity support offered by `CallHTTP`, which does not persist any credentials to storage.
8484
8585
> [!TIP]
8686
> We also recommend against logging data containing secrets as anyone with read access to your logs (for example in Application Insights), would be able to obtain those secrets.

0 commit comments

Comments
 (0)