You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/static-web-apps/configuration.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.custom: engagement-fy23
6
6
author: craigshoemaker
7
7
ms.service: static-web-apps
8
8
ms.topic: conceptual
9
-
ms.date: 01/10/2023
9
+
ms.date: 05/02/2024
10
10
ms.author: cshoe
11
11
---
12
12
@@ -69,7 +69,7 @@ Each property has a specific purpose in the request/response pipeline.
69
69
| Purpose | Properties |
70
70
|--|--|
71
71
| Match routes |`route`, `methods`|
72
-
| Process after a rule is matched and authorized |`rewrite` (modifies request)<br><br>`redirect`, `headers`, `statusCode` (modifies response) |
72
+
| Process after a rule is matched and authorized |`rewrite` (modifies request)<br><br>`redirect`, `headers`, `statusCode` (modifies response) |
73
73
| Authorize after a route is matched |`allowedRoles`|
74
74
75
75
### Specify route patterns
@@ -173,7 +173,7 @@ You can create new roles as needed in the `allowedRoles` array. To restrict a ro
173
173
174
174
#### Restrict access to entire application
175
175
176
-
You'll often want to require authentication for every route in your application. To lock down your routes, add a rule that matches all routes and include the built-in `authenticated` role in the `allowedRoles` array.
176
+
You often want to require authentication for every route in your application. To lock down your routes, add a rule that matches all routes and include the built-in `authenticated` role in the `allowedRoles` array.
177
177
178
178
The following example configuration blocks anonymous access and redirects all unauthenticated users to the Microsoft Entra sign-in page.
179
179
@@ -222,7 +222,7 @@ You can control which requests return the fallback file by defining a filter. In
222
222
}
223
223
```
224
224
225
-
For example, with the following directory structure, the above navigation fallback rule would result in the outcomes detailed in the followingtable.
225
+
For example, with the following directory structure, the above navigation fallback rule would result in the outcomes detailed in the following table.
226
226
227
227
```files
228
228
├── images
@@ -362,7 +362,7 @@ For details on how to restrict routes to authenticated users, see [Securing rout
362
362
363
363
### Disable cache for authenticated paths
364
364
365
-
If you set up [manual integration with Azure Front Door](front-door-manual.md), you may want to disable caching for your secured routes. With [enterprise-grade edge](enterprise-edge.md) enabled, caching is already disabled for your secured routes.
365
+
If you set up [manual integration with Azure Front Door](front-door-manual.md), you might want to disable caching for your secured routes. With [enterprise-grade edge](enterprise-edge.md) enabled, caching is already disabled for your secured routes.
366
366
367
367
To disable Azure Front Door caching for secured routes, add `"Cache-Control": "no-store"` to the route header definition.
368
368
@@ -592,7 +592,7 @@ Based on the above configuration, review the following scenarios.
592
592
|_/api/admin_|`GET` requests from authenticated users in the _registeredusers_ role are sent to the API. Authenticated users not in the _registeredusers_ role and unauthenticated users are served a `401` error.<br/><br/>`POST`, `PUT`, `PATCH`, and `DELETE` requests from authenticated users in the _administrator_ role are sent to the API. Authenticated users not in the _administrator_ role and unauthenticated users are served a `401` error. |
593
593
|_/customers/contoso_| Authenticated users who belong to either the _administrator_ or _customers_contoso_ roles are served the _/customers/contoso/index.html_ file. Authenticated users not in the _administrator_ or _customers_contoso_ roles are served a `403` error<sup>1</sup>. Unauthenticated users are redirected to _/login_. |
594
594
|_/login_| Unauthenticated users are challenged to authenticate with GitHub. |
595
-
|_/.auth/login/twitter_| Since authorization with Twitter is disabled by the route rule, `404` error is returned, which falls back to serving _/index.html_ with a `200` status code. |
595
+
|_/.auth/login/twitter_| Since the route rule disables Twitter authorization , a `404` error is returned. This error then falls back to serving _/index.html_ with a `200` status code. |
596
596
|_/logout_| Users are logged out of any authentication provider. |
597
597
|_/calendar/2021/01_| The browser is served the _/calendar.html_ file. |
598
598
|_/specials_| The browser is permanently redirected to _/deals_. |
0 commit comments