Skip to content

Commit a10103a

Browse files
authored
FIX NOTE
1 parent 1326401 commit a10103a

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

articles/azure-signalr/signalr-howto-configure-application-firewall.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,20 +34,23 @@ Client Connection Count Rules restrict concurrent client connections. When a cli
3434
#### ThrottleByUserIdRule
3535
This rule limits the concurrent connections of a user. For example, if a user opens multiple browser tabs or logs in using different devices, you can use this rule to restrict the number of concurrent connections for that user.
3636

37-
**Note:** The UserId must exist in the access token for this rule to work. Refer to [Configure access token](#configure-access-token).
37+
> [!NOTE]
38+
> * The **UserId** must exist in the access token for this rule to work. Refer to [Configure access token](#configure-access-token).
3839
3940

4041
#### ThrottleByJwtSignatureRule
4142
This rule limits the concurrent connections of the same token to prevent malicious users from reusing tokens to establish infinite connections, which can exhaust connection quota.
4243

43-
**Note:** It's not guaranteed by default that tokens generated by the SDK are different each time. Though each token contains a timestamp, this timestamp might be the same if vast tokens are generated within seconds. To avoid identical tokens, insert a random claim into the token claims. Refer to [Configure access token](#configure-access-token).
44+
> [!NOTE]
45+
> * It's not guaranteed by default that tokens generated by the SDK are different each time. Though each token contains a timestamp, this timestamp might be the same if vast tokens are generated within seconds. To avoid identical tokens, insert a random claim into the token claims. Refer to [Configure access token](#configure-access-token).
4446
4547

4648
#### ThrottleByJwtCustomClaimRule
4749

4850
More advanced, connections could be grouped into different groups according to custom claim. Connections with the same claim are aggregated to do the check. For example, you could add a *ThrottleByJwtCustomClaimRule* to allow 5 concurrent connections with custom claim key "freeUser".
4951

50-
**Key point**: The rule applies to all claims with a certain claim name. The connection count aggregation is on the same claim (including claim name and claim value). The *ThrottleByUserIdRule* is a special case of this rule, applying to all connections with the userIdentity claim.
52+
> [!NOTE]
53+
> * The rule applies to all claims with a certain claim name. The connection count aggregation is on the same claim (including claim name and claim value). The *ThrottleByUserIdRule* is a special case of this rule, applying to all connections with the userIdentity claim.
5154
5255

5356
> [!WARNING]

0 commit comments

Comments
 (0)