Skip to content

Commit d30a36f

Browse files
committed
validation
1 parent ac5d4cf commit d30a36f

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

articles/app-service/tutorial-ai-integrate-azure-ai-agent-dotnet.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ At a minimum, open the [sample application](https://github.com/Azure-Samples/msd
198198
When exposing APIs via OpenAPI in Azure App Service, follow these security best practices:
199199
200200
- **Authentication and Authorization**: Protect your OpenAPI endpoints in App Service behind [Azure API Management with Microsoft Entra ID](/azure/api-management/api-management-howto-protect-backend-with-aad) and ensure only authorized users or agents can access the tools.
201-
- **Validate input data:** The sample code checks `ModelState.IsValid` in the `CreateTodo` method, which ensures that the incoming data matches the model's validation attributes. For more information, see [Model validation in ASP.NET Core](https://learn.microsoft.com/aspnet/core/mvc/models/validation).
201+
- **Validate input data:** The sample code checks `ModelState.IsValid` in the `CreateTodo` method, which ensures that the incoming data matches the model's validation attributes. For more information, see [Model validation in ASP.NET Core](/aspnet/core/mvc/models/validation).
202202
- **Use HTTPS:** The sample relies on Azure App Service, which enforces HTTPS by default and provides free TLS/SSL certificates to encrypt data in transit.
203203
- **Limit CORS:** Restrict Cross-Origin Resource Sharing (CORS) to trusted domains only. For more information, see [Enable CORS](app-service-web-tutorial-rest-api.md#enable-cors).
204204
- **Apply rate limiting:** Use [API Management](/azure/api-management/api-management-sample-flexible-throttling) or custom middleware to prevent abuse and denial-of-service attacks.
@@ -208,7 +208,7 @@ When exposing APIs via OpenAPI in Azure App Service, follow these security best
208208
- **Monitor and log activity:** Enable logging and monitor access to detect suspicious activity.
209209
- **Use managed identities:** When calling other Azure services, use managed identities instead of hardcoded credentials.
210210
211-
For more guidance, see [Secure your App Service app](https://learn.microsoft.com/azure/app-service/security-overview) and [Best practices for REST API security](https://learn.microsoft.com/azure/architecture/best-practices/api-design#security).
211+
For more guidance, see [Secure your App Service app](security-overview.md) and [Best practices for REST API security](/azure/architecture/best-practices/api-design#security).
212212
213213
## Next step
214214

articles/app-service/tutorial-ai-integrate-azure-ai-agent-java.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ When exposing APIs via OpenAPI in Azure App Service, follow these security best
160160
- **Monitor and log activity:** Enable logging and monitor access to detect suspicious activity.
161161
- **Use managed identities:** When calling other Azure services, use managed identities instead of hardcoded credentials.
162162
163-
For more guidance, see [Secure your App Service app](https://learn.microsoft.com/azure/app-service/security-overview) and [Best practices for REST API security](https://learn.microsoft.com/azure/architecture/best-practices/api-design#security).
163+
For more guidance, see [Secure your App Service app](security-overview.md) and [Best practices for REST API security](/azure/architecture/best-practices/api-design#security).
164164
165165
## Next step
166166

articles/app-service/tutorial-ai-model-context-protocol-server-dotnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -221,7 +221,7 @@ At a minimum, open the [sample application](https://github.com/Azure-Samples/msd
221221
When your MCP server is called by an agent powered by large language models (LLM), be aware of [prompt injection](https://genai.owasp.org/llmrisk/llm01-prompt-injection/) attacks. Consider the following security best practices:
222222
223223
- **Authentication and Authorization**: Protect your MCP endpoints in App Service behind [Azure API Management with Microsoft Entra ID](/azure/api-management/api-management-howto-protect-backend-with-aad) and ensure only authorized users or agents can access the tools.
224-
- **Input Validation and Sanitization**: The example code in this tutorial omits input validation and sanitization for simplicity and clarity. In production scenarios, always implement proper validation and sanitization to protect your application. For ASP.NET Core, see [Model validation in ASP.NET Core](https://learn.microsoft.com/aspnet/core/mvc/models/validation).
224+
- **Input Validation and Sanitization**: The example code in this tutorial omits input validation and sanitization for simplicity and clarity. In production scenarios, always implement proper validation and sanitization to protect your application. For ASP.NET Core, see [Model validation in ASP.NET Core](/aspnet/core/mvc/models/validation).
225225
- **HTTPS:** The sample relies on Azure App Service, which enforces HTTPS by default and provides free TLS/SSL certificates to encrypt data in transit.
226226
- **Least Privilege Principle**: Expose only the necessary tools and data required for your use case. Avoid exposing sensitive operations unless absolutely necessary.
227227
- **Rate Limiting and Throttling**: Use [API Management](/azure/api-management/api-management-sample-flexible-throttling) or custom middleware to prevent abuse and denial-of-service attacks.

0 commit comments

Comments
 (0)