Skip to content

Commit 840db79

Browse files
Update secure-webhook-endpoint.md
1 parent 801ea05 commit 840db79

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

articles/communication-services/how-tos/call-automation/secure-webhook-endpoint.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,6 @@ Azure Communication Services relies on Azure Event Grid subscriptions to deliver
2727

2828
[Call Automation events](../../concepts/call-automation/call-automation.md#call-automation-webhook-events) are sent to the webhook callback URI specified when you answer a call or place a new outbound call. Your callback URI must be a public endpoint with a valid HTTPS certificate, Domain Name System name, and IP address with the correct firewall ports open to enable Call Automation to reach it. This anonymous public web server could create a security risk if you don't take the necessary steps to secure it from unauthorized access.
2929

30-
A common way that you can improve this security is by implementing an API key mechanism. Your web server can generate the key at runtime and provide it in the callback URI as a query parameter when you answer or create a call. Your web server can verify the key in the webhook callback from Call Automation before it allows access. Some customers require more security measures. In these cases, a perimeter network device might verify the inbound webhook, separate from the web server or application itself. The API key mechanism alone might not be sufficient.
31-
3230
::: zone pivot="programming-language-csharp"
3331
[!INCLUDE [Secure webhook endpoint with .NET](./includes/secure-webhook-endpoint-csharp.md)]
3432
::: zone-end
@@ -45,6 +43,9 @@ A common way that you can improve this security is by implementing an API key me
4543
[!INCLUDE [Secure webhook endpoint with Python](./includes/secure-webhook-endpoint-python.md)]
4644
::: zone-end
4745

46+
> [!IMPORTANT]
47+
> Our service uses the default token standard described above. We do not support custom tokens or modified token formats.
48+
4849
## Call Automation WebSocket events
4950

5051
### Authentication token in a WebSocket header

0 commit comments

Comments
 (0)