Skip to content

Commit 5fe6c9b

Browse files
authored
Increase clarity
1 parent 43fa3cd commit 5fe6c9b

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

articles/azure-signalr/signalr-howto-config-application-firewall.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Client Connection Count Rules restrict concurrent client connections. When a cli
4747

4848
#### ThrottleByJwtCustomClaimRule
4949

50-
More advanced, connections could be grouped into different groups according to custom claim. Connections with the same claim will be aggregated to do the check. For example, you could add a *ThrottleByJwtCustomClaimRule* to allow 5 concurrent connections for those with custom claim key "freeUser".
50+
More advanced, connections could be grouped into different groups according to custom claim. Connections with the same claim are aggregated to do the check. For example, you could add a *ThrottleByJwtCustomClaimRule* to allow 5 concurrent connections for those with custom claim key "freeUser".
5151

5252
**Key point**: The rule applies to all claims with a certain claim name. The connection count aggregation is on the same claim (including claim name and claim value). The *ThrottleByUserIdRule* is a special case of this rule, applying to all connections with the userIdentity claim.
5353

@@ -119,7 +119,7 @@ Deploy the Bicep file using Azure CLI
119119

120120

121121
## Configure access token
122-
The application firewall rules only take effect when the access token contains the corresponding claim. A rule will be **skipped** if the connection does not have the corresponding claim.
122+
The application firewall rules only take effect when the access token contains the corresponding claim. A rule is **skipped** if the connection does not have the corresponding claim.
123123

124124
Below is an example to add userId or custom claim in the access token in **Default Mode**:
125125

articles/azure-web-pubsub/howto-config-application-firewall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Deploy the Bicep file using Azure CLI
9999

100100
## Configure access token
101101

102-
The application firewall rules only take effect when the access token contains the corresponding claim. A rule will be **skipped** if the connection does not have the corresponding claim. *userId" and *roles* are currently supported claims in the SDK.
102+
The application firewall rules only take effect when the access token contains the corresponding claim. A rule is **skipped** if the connection does not have the corresponding claim. *userId" and *roles* are currently supported claims in the SDK.
103103

104104
Below is an example to add userId and insert a unique placeholder in the access token:
105105

0 commit comments

Comments
 (0)