Skip to content

Commit c1ee9aa

Browse files
committed
numbered list correction
1 parent cc31419 commit c1ee9aa

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/frontdoor/front-door-security-headers.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,27 +24,27 @@ In this tutorial, you learn how to:
2424
2525
## Prerequisites
2626

27-
* Azure Front Door. To complete the steps in this tutorial, you must have a Front Door. For more information, see [Quickstart: Create a Front Door](quickstart-create-front-door.md).
28-
* If this is your first time using the Rules Engine feature, see how to [Set up a Rules Engine](front-door-tutorial-rules-engine.md).
27+
* An Azure subscription.
28+
* Azure Front Door. To complete the steps in this tutorial, you must have a Front Door configured with rules engine. For more information, see [Quickstart: Create a Front Door](quickstart-create-front-door.md) and [Configure your Rules Engine](front-door-tutorial-rules-engine.md).
2929

3030
## Add a Content-Security-Policy header in Azure portal
3131

3232
1. Within your Front door resource, select **Rules engine configuration** under **Settings**, and then select the rules engine that you want to add the security header to.
3333

3434
:::image type="content" source="media/front-door-security-headers/front-door-rules-engine-configuration.png" alt-text="Screenshot showing rules engine configuration page of Azure Front Door.":::
3535

36-
1. Select **Add rule** to add a new rule. Provide the rule a name and then select **Add an Action** > **Response Header**.
36+
2. Select **Add rule** to add a new rule. Provide the rule a name and then select **Add an Action** > **Response Header**.
3737

38-
1. Set the Operator to **Append** to add this header as a response to all of the incoming requests to this route.
38+
3. Set the Operator to **Append** to add this header as a response to all of the incoming requests to this route.
3939

40-
1. Add the header name: *Content-Security-Policy* and define the values this header should accept, then select **Save**. In this scenario, we choose *`script-src 'self' https://apiphany.portal.azure-api.net`*.
40+
4. Add the header name: *Content-Security-Policy* and define the values this header should accept, then select **Save**. In this scenario, we choose *`script-src 'self' https://apiphany.portal.azure-api.net`*.
4141

4242
:::image type="content" source="./media/front-door-security-headers/front-door-security-header.png" alt-text="Screenshot showing the added security header under.":::
4343

4444
> [!NOTE]
4545
> Header values are limited to 640 characters.
4646
47-
4. Once you've added all of the rules you'd like to your configuration, don't forget to go to your preferred route and associate your Rules engine configuration to the Route Rule. This step is required to enable the rule to work.
47+
5. Once you've added all of the rules you'd like to your configuration, don't forget to go to your preferred route and associate your Rules engine configuration to the Route Rule. This step is required to enable the rule to work.
4848

4949
:::image type="content" source="./media/front-door-security-headers/front-door-associate-routing-rule.png" alt-text="Screenshot showing how to associate a routing rule.":::
5050

0 commit comments

Comments
 (0)