Skip to content

Commit 692cc9e

Browse files
committed
edit pass: comm-services-samples-tutorials
1 parent 36299e0 commit 692cc9e

19 files changed

+136
-117
lines changed

articles/communication-services/how-tos/call-automation/actions-for-call-control.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -436,7 +436,7 @@ call_invite = CallInvite(
436436
-----
437437
No events are published for redirect. If the target is an Azure Communication Services user or a phone number that your resource owns, it generates a new `IncomingCall` event with the `to` field set to the target that you specify.
438438

439-
## Transfer a participant in call
439+
## Transfer a participant in a call
440440

441441
When your application answers a call or places an outbound call to an endpoint, your app can transfer the endpoint to another destination endpoint. Transferring a 1:1 call removes your application from the call and removes its ability to control the call by using Call Automation. The call invite to the target shows the caller ID of the endpoint being transferred. Providing a custom caller ID isn't supported.
442442

articles/communication-services/how-tos/call-automation/control-mid-call-media-actions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Call Automation supports other actions to manage calls and recordings that aren'
2525

2626
- Read the Call Automation [concepts article](../../concepts/call-automation/call-automation.md#call-actions) that describes the action-event programming model and event callbacks.
2727
- Learn about the [user identifiers](../../concepts/identifiers.md#the-communicationidentifier-type) like `CommunicationUserIdentifier` and `PhoneNumberIdentifier` that are used in this article.
28-
- Learn more about [how to control and steer calls with Call Automation](./actions-for-call-control.md), which teaches you about dealing with the basics of dealing with a call.
28+
- Learn more about how to [control and steer calls with Call Automation](./actions-for-call-control.md), which teaches you about the basics of dealing with a call.
2929

3030
For all the code samples, `client` is the `CallAutomationClient` object that you can create, as shown, and `callConnection` is the `CallConnection` object that you obtain from the `Answer` or `CreateCall` response. You can also obtain it from callback events that your application receives.
3131

articles/communication-services/how-tos/call-automation/handle-events-with-event-processor.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -71,8 +71,7 @@ CallConnected returnedEvent = eventResult.SuccessResult;
7171

7272
With the event processor, you can easily wait for the `CallConnected` event until the call is established. If the call was never established (that is, the caller never picked up the phone), it throws a timeout exception. If the creation of the call otherwise fails, you receive `CallDisconnected` and `CreateCallFailed` events with error codes for further troubleshooting. For more information on Call Automation error codes, see [Troubleshooting call end response codes](./../../resources/troubleshooting/voice-video-calling/troubleshooting-codes.md).
7373

74-
> [!NOTE]
75-
> If a specific timeout wasn't given when you waited on the event processor, it waits until its default timeout happens. The default timeout is four minutes.
74+
If a specific timeout wasn't given when you waited on the event processor, it waits until its default timeout happens. The default timeout is four minutes.
7675

7776
## Use the play request's response to wait for Play events
7877

@@ -119,8 +118,7 @@ eventProcessor.AttachOngoingEventProcessor<ParticipantsUpdated>(callConnectionId
119118

120119
With this specific ongoing event processor, you can now print the number of participants or the participants on the call whenever people join or leave the call.
121120

122-
> [!TIP]
123-
> You can attach an ongoing handler to any event type. This capability opens the possibility to build your application with a callback design pattern.
121+
You can attach an ongoing handler to any event type. This capability opens the possibility to build your application with a callback design pattern.
124122

125123
## Advanced: Use a predicate to wait for a specific event
126124

articles/communication-services/how-tos/call-automation/includes/secure-webhook-endpoint-csharp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: include file
2+
title: Include file
33
description: C# webhook callback security
44
services: azure-communication-services
55
author: Richard Cho
@@ -20,7 +20,7 @@ Each mid-call webhook callback sent by Call Automation uses a signed JSON Web To
2020
1. Configure your application to validate the JWT by using the NuGet package and the configuration of your Azure Communication Services resource. You need the `audience` value as it appears in the JWT payload.
2121
1. Validate the issuer, the audience, and the JWT:
2222
- The audience is your Azure Communication Services resource ID that you used to set up your Call Automation client. For information about how to get it, see [Get your Azure resource ID](../../../quickstarts/voice-video-calling/get-resource-id.md).
23-
- The JSON Web Key Set (JWKS) endpoint in the OpenId configuration contains the keys that are used to validate the JWT. When the signature is valid and the token hasn't expired (within five minutes of generation), the client can use the token for authorization.
23+
- The JSON Web Key Set endpoint in the OpenId configuration contains the keys that are used to validate the JWT. When the signature is valid and the token hasn't expired (within five minutes of generation), the client can use the token for authorization.
2424

2525
This sample code demonstrates how to use `Microsoft.IdentityModel.Protocols.OpenIdConnect` to validate the webhook payload:
2626

articles/communication-services/how-tos/call-automation/includes/secure-webhook-endpoint-java.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: include file
2+
title: Include file
33
description: Java webhook callback security
44
services: azure-communication-services
55
author: Richard Cho
@@ -37,7 +37,7 @@ Each mid-call webhook callback sent by Call Automation uses a signed JSON Web To
3737
1. Configure your application to validate the JWT and the configuration of your Azure Communication Services resource. You need the `audience` value as it appears in the JWT payload.
3838
1. Validate the issuer, the audience, and the JWT:
3939
- The audience is your Azure Communication Services resource ID that you used to set up your Call Automation client. For information about how to get it, see [Get your Azure resource ID](../../../quickstarts/voice-video-calling/get-resource-id.md).
40-
- The JSON Web Key Set (JWKS) endpoint in the OpenId configuration contains the keys that are used to validate the JWT. When the signature is valid and the token hasn't expired (within five minutes of generation), the client can use the token for authorization.
40+
- The JSON Web Key Set endpoint in the OpenID configuration contains the keys that are used to validate the JWT. When the signature is valid and the token hasn't expired (within five minutes of generation), the client can use the token for authorization.
4141

4242
This sample code demonstrates how to configure the OIDC client to validate a webhook payload by using JWT:
4343

articles/communication-services/how-tos/call-automation/includes/secure-webhook-endpoint-javascript.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: include file
2+
title: Include file
33
description: JavaScript webhook callback security
44
services: azure-communication-services
55
author: Richard Cho
@@ -28,7 +28,7 @@ npm install express jwks-rsa jsonwebtoken
2828
1. Configure your application to validate the JWT and the configuration of your Azure Communication Services resource. You need the `audience` value as it appears in the JWT payload.
2929
1. Validate the issuer, the audience, and the JWT:
3030
- The audience is your Azure Communication Services resource ID that you used to set up your Call Automation client. For information about how to get it, see [Get your Azure resource ID](../../../quickstarts/voice-video-calling/get-resource-id.md).
31-
- The JSON Web Key Set (JWKS) endpoint in the OpenId configuration contains the keys that are used to validate the JWT. When the signature is valid and the token hasn't expired (within five minutes of generation), the client can use the token for authorization.
31+
- The JSON Web Key Set endpoint in the OpenID configuration contains the keys that are used to validate the JWT. When the signature is valid and the token hasn't expired (within five minutes of generation), the client can use the token for authorization.
3232

3333
This sample code demonstrates how to configure the OIDC client to validate a webhook payload by using JWT:
3434

articles/communication-services/how-tos/call-automation/includes/secure-webhook-endpoint-python.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: include file
2+
title: Include file
33
description: Python webhook callback security
44
services: azure-communication-services
55
author: Richard Cho
@@ -27,7 +27,7 @@ pip install flask pyjwt
2727
1. Configure your application to validate the JWT and the configuration of your Azure Communication Services resource. You need the `audience` value as it appears in the JWT payload.
2828
1. Validate the issuer, the audience, and the JWT:
2929
- The audience is your Azure Communication Services resource ID that you used to set up your Call Automation client. For information about how to get it, see [Get your Azure resource ID](../../../quickstarts/voice-video-calling/get-resource-id.md).
30-
- The JSON Web Key Set (JWKS) endpoint in the OpenId configuration contains the keys that are used to validate the JWT. When the signature is valid and the token hasn't expired (within five minutes of generation), the client can use the token for authorization.
30+
- The JSON Web Key Set endpoint in the OpenId configuration contains the keys that are used to validate the JWT. When the signature is valid and the token hasn't expired (within five minutes of generation), the client can use the token for authorization.
3131

3232
This sample code demonstrates how to configure the OIDC client to validate a webhook payload by using JWT:
3333

articles/communication-services/how-tos/call-automation/includes/secure-websocket-js.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: include file
3-
description: JavaScript websocket callback security
2+
title: Include file
3+
description: JavaScript WebSocket callback security
44
services: azure-communication-services
55
author: Kunaal Punjabi
66
ms.service: azure-communication-services

articles/communication-services/how-tos/call-automation/includes/secure-websocket-python.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: include file
3-
description: Python websocket callback security
2+
title: Include file
3+
description: Python WebSocket callback security
44
services: azure-communication-services
55
author: Kunaal Punjabi
66
ms.service: azure-communication-services

articles/communication-services/how-tos/call-automation/secure-webhook-endpoint.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ zone_pivot_groups: acs-js-csharp-java-python
1919

2020
Securing the delivery of messages from end to end is crucial for ensuring the confidentiality, integrity, and trustworthiness of sensitive information transmitted between systems. Your ability and willingness to trust information received from a remote system relies on the sender providing their identity. Call Automation has two ways of communicating events that can be secured: the shared `IncomingCall` event sent by Azure Event Grid and all other mid-call events sent by the Call Automation platform via webhook.
2121

22-
## Incoming Call Event
22+
## Incoming call event
2323

2424
Azure Communication Services relies on Azure Event Grid subscriptions to deliver the [IncomingCall event](../../concepts/call-automation/incoming-call-notification.md). For more information, see [Deliver events to Microsoft Entra protected endpoints](../../../event-grid/secure-webhook-delivery.md).
2525

0 commit comments

Comments
 (0)