Skip to content

Commit 7b10b48

Browse files
committed
endpoint validation with Cloud Events
1 parent 87e7b41 commit 7b10b48

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/event-grid/security-authentication.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -203,6 +203,9 @@ static string BuildSharedAccessSignature(string resource, DateTime expirationUtc
203203

204204
All events or data written to disk by the Event Grid service is encrypted by a Microsoft-managed key ensuring that it's encrypted at rest. Additionally, the maximum period of time that events or data retained is 24 hours in adherence with the [Event Grid retry policy](delivery-and-retry.md). Event Grid will automatically delete all events or data after 24 hours, or the event time-to-live, whichever is less.
205205

206+
## Endpoint Validation with CloudEvents v1.0
207+
If you are already familiar with Event Grid, you may be aware of Event Grid's endpoint validation handshake for preventing abuse. CloudEvents v1.0 implements its own [abuse protection semantics](security-authentication.md#webhook-event-delivery) using the HTTP OPTIONS method. You can read more about it [here](https://github.com/cloudevents/spec/blob/v1.0/http-webhook.md#4-abuse-protection). When using the CloudEvents schema for output, Event Grid uses with the CloudEvents v1.0 abuse protection in place of the Event Grid validation event mechanism.
208+
206209
## Next steps
207210

208211
- For an introduction to Event Grid, see [About Event Grid](overview.md)

0 commit comments

Comments
 (0)