You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-signalr/signalr-howto-config-application-firewall.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: SignalR Application Firewall (Preview)
3
-
description: An introduction about why and how to setup Application Firewall for Azure SignalR service
3
+
description: An introduction about why and how to set up Application Firewall for Azure SignalR service
4
4
author: biqian
5
5
ms.service: signalr
6
6
ms.custom: devx-track-azurecli
@@ -42,12 +42,12 @@ Client Connection Count Rules restrict concurrent client connections. When a cli
42
42
#### ThrottleByJwtSignatureRule
43
43
This rule limits the concurrent connections of the same token to prevent malicious users from reusing tokens to establish infinite connections, which can exhaust connection quota.
44
44
45
-
**Note:** It's not guaranteed by default that tokens generated by the SDK are different each time. Though each token contaisn a timestamp, this timestamp might be the same if vast tokens are generated within seconds. To avoid identical tokens, insert a random claim into the token claims. Refer to [Configure access token](#configure-access-token).
45
+
**Note:** It's not guaranteed by default that tokens generated by the SDK are different each time. Though each token contains a timestamp, this timestamp might be the same if vast tokens are generated within seconds. To avoid identical tokens, insert a random claim into the token claims. Refer to [Configure access token](#configure-access-token).
46
46
47
47
48
48
#### ThrottleByJwtCustomClaimRule
49
49
50
-
More advancedly, connections could be grouped into different groups according to custom claim. Connections with the same claim will be aggregated to do the check. For example, you could add a *ThrottleByJwtCustomClaimRule* to allow 5 concurrent connections for those with custom claim key "freeUser".
50
+
More advanced, connections could be grouped into different groups according to custom claim. Connections with the same claim will be aggregated to do the check. For example, you could add a *ThrottleByJwtCustomClaimRule* to allow 5 concurrent connections for those with custom claim key "freeUser".
51
51
52
52
**Key point**: The rule applies to all claims with a certain claim name. The connection count aggregation is on the same claim (including claim name and claim value). The *ThrottleByUserIdRule* is a special case of this rule, applying to all connections with the userIdentity claim.
53
53
@@ -56,11 +56,11 @@ Client Connection Count Rules restrict concurrent client connections. When a cli
56
56
### Best Practice
57
57
#### Avoid using too aggressive maxCount
58
58
59
-
Client connections may close without completing the tcp handshake. SignalR service can't detect those "half-closed" connections immediately. The connection is taken as active until the heartbeart failure. Therefore, aggressive throttling strategies might unexpectedly throttle clients. A smoother approach is to **leave some buffer** for the connection count, for example: double the *maxCount*.
59
+
Client connections may close without completing the tcp handshake. SignalR service can't detect those "half-closed" connections immediately. The connection is taken as active until the heartbeat failure. Therefore, aggressive throttling strategies might unexpectedly throttle clients. A smoother approach is to **leave some buffer** for the connection count, for example: double the *maxCount*.
60
60
61
61
62
62
63
-
## Setup Application Firewall
63
+
## Set up Application Firewall
64
64
65
65
# [Portal](#tab/Portal)
66
66
To use Application Firewall, navigate to the SignalR **Application Firewall** blade on the Azure portal and click **Add** to add a rule.
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/howto-config-application-firewall.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Web PubSub Application Firewall (Preview)
3
-
description: An introduction about why and how to setup Application Firewall for Azure Web PubSub service
3
+
description: An introduction about why and how to set up Application Firewall for Azure Web PubSub service
4
4
author: biqian
5
5
ms.service: azure-web-pubsub
6
6
ms.custom: devx-track-azurecli
@@ -41,17 +41,17 @@ Client Connection Count Rules restrict concurrent client connections. When a cli
41
41
#### ThrottleByJwtSignatureRule
42
42
This rule limits the concurrent connections of the same token to prevent malicious users from reusing tokens to establish infinite connections, which can exhaust connection quota.
43
43
44
-
**Note:** It's not guaranteed by default that tokens generated by the SDK are different each time. Though each token contaisn a timestamp, this timestamp might be the same if vast tokens are generated within seconds. To avoid identical tokens, insert a random claim into the token claims. Refer to [Configure access token](#configure-access-token).
44
+
**Note:** It's not guaranteed by default that tokens generated by the SDK are different each time. Though each token contains a timestamp, this timestamp might be the same if vast tokens are generated within seconds. To avoid identical tokens, insert a random claim into the token claims. Refer to [Configure access token](#configure-access-token).
45
45
46
46
47
47
### Best Practice
48
48
#### Avoid using too aggressive maxCount
49
49
50
-
Client connections may close without completing the tcp handshake. Web PubSub service can't detect those "half-closed" connections immediately. The connection is taken as active until the heartbeart failure. Therefore, aggressive throttling strategies might unexpectedly throttle clients. A smoother approach is to **leave some buffer** for the connection count, for example: double the *maxCount*.
50
+
Client connections may close without completing the tcp handshake. Web PubSub service can't detect those "half-closed" connections immediately. The connection is taken as active until the heartbeat failure. Therefore, aggressive throttling strategies might unexpectedly throttle clients. A smoother approach is to **leave some buffer** for the connection count, for example: double the *maxCount*.
51
51
52
52
53
53
54
-
## Setup Application Firewall
54
+
## Set up Application Firewall
55
55
56
56
# [Portal](#tab/Portal)
57
57
To use Application Firewall, navigate to the Web PubSub **Application Firewall** blade on the Azure portal and click **Add** to add a rule.
0 commit comments