Skip to content

Commit 43fa3cd

Browse files
authored
Fix typo
1 parent a16e38d commit 43fa3cd

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

articles/azure-signalr/signalr-howto-config-application-firewall.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: SignalR Application Firewall (Preview)
3-
description: An introduction about why and how to setup Application Firewall for Azure SignalR service
3+
description: An introduction about why and how to set up Application Firewall for Azure SignalR service
44
author: biqian
55
ms.service: signalr
66
ms.custom: devx-track-azurecli
@@ -42,12 +42,12 @@ Client Connection Count Rules restrict concurrent client connections. When a cli
4242
#### ThrottleByJwtSignatureRule
4343
This rule limits the concurrent connections of the same token to prevent malicious users from reusing tokens to establish infinite connections, which can exhaust connection quota.
4444

45-
**Note:** It's not guaranteed by default that tokens generated by the SDK are different each time. Though each token contaisn a timestamp, this timestamp might be the same if vast tokens are generated within seconds. To avoid identical tokens, insert a random claim into the token claims. Refer to [Configure access token](#configure-access-token).
45+
**Note:** It's not guaranteed by default that tokens generated by the SDK are different each time. Though each token contains a timestamp, this timestamp might be the same if vast tokens are generated within seconds. To avoid identical tokens, insert a random claim into the token claims. Refer to [Configure access token](#configure-access-token).
4646

4747

4848
#### ThrottleByJwtCustomClaimRule
4949

50-
More advancedly, connections could be grouped into different groups according to custom claim. Connections with the same claim will be aggregated to do the check. For example, you could add a *ThrottleByJwtCustomClaimRule* to allow 5 concurrent connections for those with custom claim key "freeUser".
50+
More advanced, connections could be grouped into different groups according to custom claim. Connections with the same claim will be aggregated to do the check. For example, you could add a *ThrottleByJwtCustomClaimRule* to allow 5 concurrent connections for those with custom claim key "freeUser".
5151

5252
**Key point**: The rule applies to all claims with a certain claim name. The connection count aggregation is on the same claim (including claim name and claim value). The *ThrottleByUserIdRule* is a special case of this rule, applying to all connections with the userIdentity claim.
5353

@@ -56,11 +56,11 @@ Client Connection Count Rules restrict concurrent client connections. When a cli
5656
### Best Practice
5757
#### Avoid using too aggressive maxCount
5858

59-
Client connections may close without completing the tcp handshake. SignalR service can't detect those "half-closed" connections immediately. The connection is taken as active until the heartbeart failure. Therefore, aggressive throttling strategies might unexpectedly throttle clients. A smoother approach is to **leave some buffer** for the connection count, for example: double the *maxCount*.
59+
Client connections may close without completing the tcp handshake. SignalR service can't detect those "half-closed" connections immediately. The connection is taken as active until the heartbeat failure. Therefore, aggressive throttling strategies might unexpectedly throttle clients. A smoother approach is to **leave some buffer** for the connection count, for example: double the *maxCount*.
6060

6161

6262

63-
## Setup Application Firewall
63+
## Set up Application Firewall
6464

6565
# [Portal](#tab/Portal)
6666
To use Application Firewall, navigate to the SignalR **Application Firewall** blade on the Azure portal and click **Add** to add a rule.

articles/azure-web-pubsub/howto-config-application-firewall.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Web PubSub Application Firewall (Preview)
3-
description: An introduction about why and how to setup Application Firewall for Azure Web PubSub service
3+
description: An introduction about why and how to set up Application Firewall for Azure Web PubSub service
44
author: biqian
55
ms.service: azure-web-pubsub
66
ms.custom: devx-track-azurecli
@@ -41,17 +41,17 @@ Client Connection Count Rules restrict concurrent client connections. When a cli
4141
#### ThrottleByJwtSignatureRule
4242
This rule limits the concurrent connections of the same token to prevent malicious users from reusing tokens to establish infinite connections, which can exhaust connection quota.
4343

44-
**Note:** It's not guaranteed by default that tokens generated by the SDK are different each time. Though each token contaisn a timestamp, this timestamp might be the same if vast tokens are generated within seconds. To avoid identical tokens, insert a random claim into the token claims. Refer to [Configure access token](#configure-access-token).
44+
**Note:** It's not guaranteed by default that tokens generated by the SDK are different each time. Though each token contains a timestamp, this timestamp might be the same if vast tokens are generated within seconds. To avoid identical tokens, insert a random claim into the token claims. Refer to [Configure access token](#configure-access-token).
4545

4646

4747
### Best Practice
4848
#### Avoid using too aggressive maxCount
4949

50-
Client connections may close without completing the tcp handshake. Web PubSub service can't detect those "half-closed" connections immediately. The connection is taken as active until the heartbeart failure. Therefore, aggressive throttling strategies might unexpectedly throttle clients. A smoother approach is to **leave some buffer** for the connection count, for example: double the *maxCount*.
50+
Client connections may close without completing the tcp handshake. Web PubSub service can't detect those "half-closed" connections immediately. The connection is taken as active until the heartbeat failure. Therefore, aggressive throttling strategies might unexpectedly throttle clients. A smoother approach is to **leave some buffer** for the connection count, for example: double the *maxCount*.
5151

5252

5353

54-
## Setup Application Firewall
54+
## Set up Application Firewall
5555

5656
# [Portal](#tab/Portal)
5757
To use Application Firewall, navigate to the Web PubSub **Application Firewall** blade on the Azure portal and click **Add** to add a rule.

0 commit comments

Comments
 (0)