Skip to content

Commit d60b450

Browse files
authored
update
1 parent 60a8dc2 commit d60b450

File tree

2 files changed

+6
-2
lines changed

2 files changed

+6
-2
lines changed

articles/azure-functions/functions-bindings-signalr-service-input.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,9 @@ public SignalRConnectionInfo negotiate(
135135
:::zone-end
136136

137137
> [!Warning]
138-
> For the simplicity, we have omitted the authentication and authorization parts in this example. As a result, this endpoint is publicly accessible without any restrictions. To ensure the security of your negotiation endpoint, you should implement appropriate authentication and authorization mechanisms based on your specific requirements. For guidance on protecting your HTTP endpoints, see [Secure HTTP endpoints](./security-concepts.md#secure-http-endpoints).
138+
> For the simplicity, we omit the authentication and authorization parts in this sample. As a result, this endpoint is publicly accessible without any restrictions. To ensure the security of your negotiation endpoint, you should implement appropriate authentication and authorization mechanisms based on your specific requirements. For guidance on protecting your HTTP endpoints, see the following articles:
139+
> * [Secure HTTP endpoints](../azure-functions/security-concepts.md#secure-http-endpoints).
140+
> * [Authentication and authorization in Azure App Service and Azure Functions](../app-service/overview-authentication-authorization.md)
139141
140142
## Usage
141143

articles/azure-signalr/signalr-concept-client-negotiation.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,9 @@ When you use an Azure function app, you can work with the function extension. He
205205
:::code language="csharp" source="~/azure-functions-dotnet-worker/samples/Extensions/SignalR/SignalRNegotiationFunctions.cs" id="snippet_negotiate":::
206206

207207
> [!Warning]
208-
> For the simplicity, we omit the authentication and authorization parts in this sample. As a result, this endpoint is publicly accessible without any restrictions. To ensure the security of your negotiation endpoint, you should implement appropriate authentication and authorization mechanisms based on your specific requirements. For guidance on protecting your HTTP endpoints, see [Secure HTTP endpoints](../azure-functions/security-concepts.md#secure-http-endpoints).
208+
> For the simplicity, we omit the authentication and authorization parts in this sample. As a result, this endpoint is publicly accessible without any restrictions. To ensure the security of your negotiation endpoint, you should implement appropriate authentication and authorization mechanisms based on your specific requirements. For guidance on protecting your HTTP endpoints, see the following articles:
209+
> * [Secure HTTP endpoints](../azure-functions/security-concepts.md#secure-http-endpoints).
210+
> * [Authentication and authorization in Azure App Service and Azure Functions](../app-service/overview-authentication-authorization.md)
209211
210212
Then your clients can request the function endpoint `https://<Your Function App Name>.azurewebsites.net/api/negotiate` to get the service URL and access token. You can find a full sample on [GitHub](https://github.com/aspnet/AzureSignalR-samples/tree/main/samples/BidirectionChat).
211213

0 commit comments

Comments
 (0)