Skip to content

Commit 71fed23

Browse files
authored
Merge pull request #125013 from ArieHein/Spelling-Wave-11
Spelling Fixes - Wave 11
2 parents 3453686 + 3478cc2 commit 71fed23

14 files changed

+14
-14
lines changed

articles/azure-signalr/howto-enable-geo-replication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ However, managing multiple Azure SignalR Services brings some challenges:
3535
2. The development team would need to manage two separate Azure SignalR Services, each with distinct domain and connection string.
3636
3. If a regional outage happens, the traffic needs to be switched to another region.
3737

38-
![Diagram of using two Azure SignalR instances to handle traffic from two countries. ](./media/howto-enable-geo-replication/signalr-multiple.png "Mutiple SignalR Example")
38+
![Diagram of using two Azure SignalR instances to handle traffic from two countries. ](./media/howto-enable-geo-replication/signalr-multiple.png "Multiple SignalR Example")
3939

4040
## Harnessing geo-replication
4141
With the new geo-replication feature, Contoso can now establish a replica in Canada Central, effectively overcoming the above-mentioned hurdles.

articles/azure-signalr/howto-use-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ After you add a [system-assigned identity](#add-a-system-assigned-identity) or [
8383
- Application ID URI of the service principal.
8484

8585
> [!IMPORTANT]
86-
> Using empty resource actully acquire a token targets to Microsoft Graph. As today, Microsoft Graph enables token encryption so it's not available for application to authenticate the token other than Microsoft Graph. In common practice, you should always create a service principal to represent your upstream target. And set the **Application ID** or **Application ID URI** of the service principal you've created.
86+
> Using empty resource actually acquire a token targets to Microsoft Graph. As today, Microsoft Graph enables token encryption so it's not available for application to authenticate the token other than Microsoft Graph. In common practice, you should always create a service principal to represent your upstream target. And set the **Application ID** or **Application ID URI** of the service principal you've created.
8787
8888
#### Authentication in a function app
8989

articles/azure-signalr/scripts/signalr-cli-create-with-app-service-github-oauth.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ This sample script creates a new Azure SignalR Service resource, which is used t
2828

2929
### Enable GitHub authentication and Git deployment for web app
3030

31-
1. Update the values in the following script for the desired deployment username and its passwor
31+
1. Update the values in the following script for the desired deployment username and its password
3232

3333
```azurecli
3434
deploymentUser=<Replace with your desired username>

articles/azure-signalr/signalr-concept-authenticate-oauth.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ Let's reuse the chat app created in tutorial [Create a chat room with SignalR Se
149149
}
150150
```
151151

152-
Inside the code, `AddAuthentication` and `UseAuthentication` are used to add authentication support with the GitHub OAuth app, and `GetUserCompanyInfoAsync` helper method is sample code showing how to load the company info from GitHub OAuth and save into user identity. You might also notice that `UseHttpsRedirection()` is used since GitHub OAuth set `secure` cookie that only passes through to secured `https` scheme. Also don't forget to update the local `Properties/lauchSettings.json` to add https endpoint:
152+
Inside the code, `AddAuthentication` and `UseAuthentication` are used to add authentication support with the GitHub OAuth app, and `GetUserCompanyInfoAsync` helper method is sample code showing how to load the company info from GitHub OAuth and save into user identity. You might also notice that `UseHttpsRedirection()` is used since GitHub OAuth set `secure` cookie that only passes through to secured `https` scheme. Also don't forget to update the local `Properties/launchSettings.json` to add https endpoint:
153153

154154
```json
155155
{

articles/azure-signalr/signalr-concept-disaster-recovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ Once you have SignalR service and app servers/Azure Functions created in each re
5454

5555
### Through config
5656

57-
You should already know how to set SignalR service connection string through environment variables/app settings/web.cofig, in a config entry named `Azure:SignalR:ConnectionString`.
57+
You should already know how to set SignalR service connection string through environment variables/app settings/web.config, in a config entry named `Azure:SignalR:ConnectionString`.
5858
If you have multiple endpoints, you can set them in multiple config entries, each in the following format:
5959

6060
```

articles/azure-signalr/signalr-howto-configure-application-firewall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ services.AddSignalR().AddAzureSignalR(options =>
134134
// The token name is not important. You could change it as you like.
135135
new Claim("uniqueToken", Guid.NewGuid().ToString()),
136136

137-
// Cutom claim: Used in ThrottleByJwtCustomClaimRule
137+
// Custom claim: Used in ThrottleByJwtCustomClaimRule
138138
new Claim("<Custom Claim Name>", "<Custom Claim Value>"),
139139
// Custom claim example
140140
new Claim("freeUser", context.Request.Query["username"]),

articles/azure-signalr/signalr-howto-diagnostic-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ Class Chat : Hub
174174
public void JoinAndSendGroup(string name, string groupName)
175175
{
176176
Groups.AddToGroupAsync(Context.ConnectionId, groupName); // join group
177-
Clients.Group(groupName).SendAsync("ReveiceGroupMessage", name, "I'm in group"); // send group message
177+
Clients.Group(groupName).SendAsync("ReceiveGroupMessage", name, "I'm in group"); // send group message
178178
}
179179
}
180180
```

articles/azure-signalr/signalr-howto-event-grid-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ cd samples/Management
146146

147147
# Start the negotiation server
148148
# Negotiation server is responsible for generating access token for clients
149-
cd NegotitationServer
149+
cd NegotiationServer
150150
dotnet user-secrets set Azure:SignalR:ConnectionString "<Connection String>"
151151
dotnet run
152152

articles/azure-signalr/signalr-howto-troubleshoot-method.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ With the client-side network trace in hand, check which request fails with what
7474

7575
SignalR *Server* maintains the *Server Connection* between *Server* and *Service*. When the app server starts, it starts the **WebSocket** connection to Azure SignalR service. All the client traffics are routed through Azure SignalR service to these *Server Connection*s and then dispatched to the `Hub`. When a *Server Connection* drops, the clients routed to this *Server Connection* will be impacted. Our Azure SignalR SDK has a logic "Always Retry" to reconnect the *Server Connection* with at most 1-minute delay to minimize the effects.
7676

77-
*Server Connection*s can drop because of network instability or regular maintenance of Azure SignalR Service, or your hosted app server updates/maintainance. As long as client-side has the disconnect/reconnect mechanism, the effect is minimal like any client-side caused disconnect-reconnect.
77+
*Server Connection*s can drop because of network instability or regular maintenance of Azure SignalR Service, or your hosted app server updates/maintenance. As long as client-side has the disconnect/reconnect mechanism, the effect is minimal like any client-side caused disconnect-reconnect.
7878

7979
View the server-side network trace to find the status code and error detail why *Server Connection* drops or is rejected by the *Service*. Look for the root cause inside [Troubleshooting Guide](./signalr-howto-troubleshoot-guide.md).
8080

articles/azure-signalr/signalr-howto-work-with-apim.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ Now, the traffic can reach SignalR Service through API Management. Let’s use [
123123
```bash
124124
cd samples/Chatroom
125125
dotnet restore
126-
dotnet user-secrets set Azure:SignalR:ConnectionString "<copied-onnection-string-with-client-endpoint>"
126+
dotnet user-secrets set Azure:SignalR:ConnectionString "<copied-connection-string-with-client-endpoint>"
127127
dotnet run
128128
```
129129

0 commit comments

Comments
 (0)