Skip to content

Commit 93efa66

Browse files
committed
Address comments
1 parent e253711 commit 93efa66

File tree

3 files changed

+20
-20
lines changed

3 files changed

+20
-20
lines changed

articles/azure-signalr/howto-network-access-control.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ resource signalr 'Microsoft.SignalRService/SignalR@2024-08-01-preview' = {
9191

9292
You can configure rules to allow or deny specified request types for both the public network and each [private endpoint](howto-private-endpoints.md).
9393

94-
For example, [Server Connections](signalr-concept-internals.md#application-server-connections) are typically high-privileged. To enhance security, you may want to restrict their origin. You can configure rules to block all Server Connections from public network, and only allow they originate from a specifiec virtual network.
94+
For example, [Server Connections](signalr-concept-internals.md#application-server-connections) are typically high-privileged. To enhance security, you may want to restrict their origin. You can configure rules to block all Server Connections from public network, and only allow they originate from a specific virtual network.
9595

9696
If no rule matches, the default action is applied.
9797

articles/azure-web-pubsub/howto-secure-network-access-control.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -14,28 +14,28 @@ Azure Web PubSub allows you to secure and manage access to your service endpoint
1414

1515
You can configure Azure Web PubSub to secure and control the level of access to your service endpoint based on the request type and subset of networks used. When network rules are configured, only applications that request data over the specified set of networks can access your Web PubSub resource.
1616

17-
:::image type="content" alt-text="Screenshot showing network access control decision flow chart." source="media\howto-secure-network-access-control\network-acl-decision-flow-chart.png" :::
17+
:::image type="content" alt-text="Screenshot showing network access control decision flow chart." source="media\howto-secure-network-access-control\network-access-control-decision-flow-chart.png" :::
1818

1919

20-
## Public Network Access
20+
## Public network access
2121

2222
We offer a single, unified switch to simplify the configuration of public network access. The switch has following options:
2323

2424
* Disabled: Completely blocks public network access. All other network access control rules are ignored for public networks.
2525
* Enabled: Allows public network access, which is further regulated by additional network access control rules.
2626

27-
### [Configure Public Network Access via Portal](#tab/azure-portal)
27+
### [Configure public network access via portal](#tab/azure-portal)
2828

2929
1. Go to the Azure Web PubSub instance you want to secure.
3030
1. Select **Networking** from the left side menu. Select **Public access** tab:
3131

32-
:::image type="content" alt-text="Screenshot showing how to configure public network access." source="media\howto-secure-network-access-control\portal-public-network-access.png" :::
32+
:::image type="content" alt-text="Screenshot showing how to configure public network access." source="media\howto-secure-network-access-control\portal-public-network-access.png" :::
3333

3434
1. Select **Disabled** or **Enabled**.
3535

3636
1. Select **Save** to apply your changes.
3737

38-
### [Configure Public Network Access via Bicep](#tab/bicep)
38+
### [Configure public network access via bicep](#tab/bicep)
3939

4040
The following template disables public network access:
4141

@@ -52,21 +52,21 @@ resource webpubsub 'Microsoft.SignalRService/WebPubSub@2024-08-01-preview' = {
5252
-----
5353

5454

55-
## Default Action
55+
## Default action
5656

5757
The default action is applied when no other rule matches.
5858

59-
### [Configure Default Action via Portal](#tab/azure-portal)
59+
### [Configure default action via portal](#tab/azure-portal)
6060

6161
1. Go to the Azure Web PubSub instance you want to secure.
6262
1. Select **Network access control** from the left side menu.
6363

64-
![Default action on portal](media/howto-secure-network-access-control/portal-default-action.png)
64+
:::image type="content" alt-text="Screenshot showing default action on portal." source="media/howto-secure-network-access-control/portal-default-action.png" :::
6565

6666
1. To edit the default action, toggle the **Allow/Deny** button.
6767
1. Select **Save** to apply your changes.
6868

69-
### [Configure Default Action via Bicep](#tab/bicep)
69+
### [Configure default action via bicep](#tab/bicep)
7070

7171
The following template sets the default action to `Deny`.
7272

@@ -84,32 +84,32 @@ resource webpubsub 'Microsoft.SignalRService/WebPubSub@2024-08-01-preview' = {
8484
-----
8585

8686

87-
## Request Type Rules
87+
## Request type rules
8888

8989
You can configure rules to allow or deny specified request types for both the public network and each [private endpoint](howto-secure-private-endpoints.md).
9090

91-
For example, [REST API calls](reference-rest-api-data-plane.md) are typically high-privileged. To enhance security, you may want to restrict their origin. You can configure rules to block all REST API calls from public network, and only allow they originate from a specifiec virtual network.
91+
For example, [REST API calls](reference-rest-api-data-plane.md) are typically high-privileged. To enhance security, you may want to restrict their origin. You can configure rules to block all REST API calls from public network, and only allow they originate from a specific virtual network.
9292

9393
If no rule matches, the default action is applied.
9494

95-
### [Configure Request Type Rules via Portal](#tab/azure-portal)
95+
### [Configure request type rules via portal](#tab/azure-portal)
9696

9797
1. Go to the Azure Web PubSub instance you want to secure.
9898
1. Select **Network access control** from the left side menu.
9999

100-
![Request type rules on portal](media/howto-secure-network-access-control/portal-request-type-rules.png)
100+
:::image type="content" alt-text="Screenshot showing request type rules on portal." source="media/howto-secure-network-access-control/portal-request-type-rules.png" :::
101101

102102
1. To edit public network rule, select allowed types of requests under **Public network**.
103103

104-
![Edit public network ACL on portal ](media/howto-secure-network-access-control/portal-public-network.png)
104+
:::image type="content" alt-text="Screenshot of selecting allowed request types for public network on portal." source="media/howto-secure-network-access-control/portal-public-network.png" :::
105105

106106
1. To edit private endpoint network rules, select allowed types of requests in each row under **Private endpoint connections**.
107107

108-
![Edit private endpoint ACL on portal ](media/howto-secure-network-access-control/portal-private-endpoint.png)
108+
:::image type="content" alt-text="Screenshot of selecting allowed request types for private endpoints on portal." source="media/howto-secure-network-access-control/portal-private-endpoint.png" :::
109109

110110
1. Select **Save** to apply your changes.
111111

112-
### [Configure Request Type Rules via Bicep](#tab/bicep)
112+
### [Configure request type rules via bicep](#tab/bicep)
113113

114114
The following template denies all requests from the public network except Client Connections. Additionally, it allows only REST API calls, and Trace calls from a specific private endpoint.
115115

@@ -138,7 +138,7 @@ resource webpubsub 'Microsoft.SignalRService/WebPubSub@2024-08-01-preview' = {
138138
-----
139139

140140

141-
## IP Rules
141+
## IP rules
142142

143143
IP rules allow you to grant or deny access to specific public internet IP address ranges. These rules can be used to permit access for certain internet-based services and on-premises networks or to block general internet traffic.
144144

@@ -149,7 +149,7 @@ The following restrictions apply:
149149
* IP rules are evaluated in the order they are defined. If no rule matches, the default action is applied.
150150
* IP rules apply only to public traffic and cannot block traffic from private endpoints.
151151

152-
### [Configure IP Rules via Portal](#tab/azure-portal)
152+
### [Configure IP rules via portal](#tab/azure-portal)
153153

154154
1. Go to the Azure Web PubSub instance you want to secure.
155155
1. Select **Networking** from the left side menu. Select **Access control rules** tab:
@@ -160,7 +160,7 @@ The following restrictions apply:
160160

161161
1. Select **Save** to apply your changes.
162162

163-
### [Configure IP Rules via Bicep](#tab/bicep)
163+
### [Configure IP rules via bicep](#tab/bicep)
164164

165165
The following template has these effects:
166166

0 commit comments

Comments
 (0)