Skip to content

Commit 9703081

Browse files
Merge pull request #274137 from craigshoemaker/swa/fresh/configure
[Static Web Apps] Update: Configuration (freshness)
2 parents 2cbb5f8 + 6e0218b commit 9703081

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/static-web-apps/configuration.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.custom: engagement-fy23
66
author: craigshoemaker
77
ms.service: static-web-apps
88
ms.topic: conceptual
9-
ms.date: 01/10/2023
9+
ms.date: 05/02/2024
1010
ms.author: cshoe
1111
---
1212

@@ -69,7 +69,7 @@ Each property has a specific purpose in the request/response pipeline.
6969
| Purpose | Properties |
7070
|--|--|
7171
| Match routes | `route`, `methods` |
72-
| Process after a rule is matched and authorized | `rewrite` (modifies request) <br><br>`redirect`, `headers`, `statusCode` (modifies response) |
72+
| Process after a rule is matched and authorized | `rewrite` (modifies request)<br><br>`redirect`, `headers`, `statusCode` (modifies response) |
7373
| Authorize after a route is matched | `allowedRoles` |
7474

7575
### Specify route patterns
@@ -173,7 +173,7 @@ You can create new roles as needed in the `allowedRoles` array. To restrict a ro
173173
174174
#### Restrict access to entire application
175175

176-
You'll often want to require authentication for every route in your application. To lock down your routes, add a rule that matches all routes and include the built-in `authenticated` role in the `allowedRoles` array.
176+
You often want to require authentication for every route in your application. To lock down your routes, add a rule that matches all routes and include the built-in `authenticated` role in the `allowedRoles` array.
177177

178178
The following example configuration blocks anonymous access and redirects all unauthenticated users to the Microsoft Entra sign-in page.
179179

@@ -222,7 +222,7 @@ You can control which requests return the fallback file by defining a filter. In
222222
}
223223
```
224224

225-
For example, with the following directory structure, the above navigation fallback rule would result in the outcomes detailed in the followingtable.
225+
For example, with the following directory structure, the above navigation fallback rule would result in the outcomes detailed in the following table.
226226

227227
```files
228228
├── images
@@ -362,7 +362,7 @@ For details on how to restrict routes to authenticated users, see [Securing rout
362362

363363
### Disable cache for authenticated paths
364364

365-
If you set up [manual integration with Azure Front Door](front-door-manual.md), you may want to disable caching for your secured routes. With [enterprise-grade edge](enterprise-edge.md) enabled, caching is already disabled for your secured routes.
365+
If you set up [manual integration with Azure Front Door](front-door-manual.md), you might want to disable caching for your secured routes. With [enterprise-grade edge](enterprise-edge.md) enabled, caching is already disabled for your secured routes.
366366

367367
To disable Azure Front Door caching for secured routes, add `"Cache-Control": "no-store"` to the route header definition.
368368

@@ -592,7 +592,7 @@ Based on the above configuration, review the following scenarios.
592592
| _/api/admin_ | `GET` requests from authenticated users in the _registeredusers_ role are sent to the API. Authenticated users not in the _registeredusers_ role and unauthenticated users are served a `401` error.<br/><br/>`POST`, `PUT`, `PATCH`, and `DELETE` requests from authenticated users in the _administrator_ role are sent to the API. Authenticated users not in the _administrator_ role and unauthenticated users are served a `401` error. |
593593
| _/customers/contoso_ | Authenticated users who belong to either the _administrator_ or _customers_contoso_ roles are served the _/customers/contoso/index.html_ file. Authenticated users not in the _administrator_ or _customers_contoso_ roles are served a `403` error<sup>1</sup>. Unauthenticated users are redirected to _/login_. |
594594
| _/login_ | Unauthenticated users are challenged to authenticate with GitHub. |
595-
| _/.auth/login/twitter_ | Since authorization with Twitter is disabled by the route rule, `404` error is returned, which falls back to serving _/index.html_ with a `200` status code. |
595+
| _/.auth/login/twitter_ | Since the route rule disables Twitter authorization , a `404` error is returned. This error then falls back to serving _/index.html_ with a `200` status code. |
596596
| _/logout_ | Users are logged out of any authentication provider. |
597597
| _/calendar/2021/01_ | The browser is served the _/calendar.html_ file. |
598598
| _/specials_ | The browser is permanently redirected to _/deals_. |

0 commit comments

Comments
 (0)