You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-signalr/howto-network-access-control.md
+11-14Lines changed: 11 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,44 +6,41 @@ services: signalr
6
6
author: vicancy
7
7
ms.service: signalr
8
8
ms.topic: conceptual
9
-
ms.date: 05/06/2020
9
+
ms.date: 35/29/2023
10
10
ms.author: lianwei
11
11
---
12
12
13
13
# Configure network access control
14
14
15
-
Azure SignalR Service enables you to secure and control the level of access to your service endpoint, based on the request type and subset of networks used. When network rules are configured, only applications requesting data over the specified set of networks can access your Azure SignalR Service.
15
+
Azure SignalR Service enables you to secure and control the level of access to your service endpoint based on the request type and subset of networks. When network rules are configured, only applications requesting data over the specified set of networks can access your SignalR Service.
16
16
17
-
Azure SignalR Service has a public endpoint that is accessible through the internet. You can also create [Private Endpoints for your Azure SignalR Service](howto-private-endpoints.md). Private Endpoint assigns a private IP address from your VNet to the Azure SignalR Service, and secures all traffic between your VNet and the Azure SignalR Service over a private link. The Azure SignalR Service network access control provides access control for both public endpoint and private endpoints.
17
+
SignalR Service has a public endpoint that is accessible through the internet. You can also create [private endpoints for your Azure SignalR Service](howto-private-endpoints.md). A private endpoint assigns a private IP address from your VNet to the SignalR Service, and secures all traffic between your VNet and the SignalR Service over a private link. The SignalR Service network access control provides access control for both public and private endpoints.
18
18
19
-
Optionally, you can choose to allow or deny certain types of requests for public endpoint and each private endpoint. For example, you can block all [Server Connections](signalr-concept-internals.md#application-server-connections) from public endpoint and make sure they only originate from a specific VNet.
19
+
Optionally, you can choose to allow or deny certain types of requests for the public endpoint and each private endpoint. For example, you can block all [Server Connections](signalr-concept-internals.md#application-server-connections) from public endpoint and make sure they only originate from a specific VNet.
20
20
21
-
An application that accesses an Azure SignalR Service when network access control rules are in effect still requires proper authorization for the request.
21
+
An application that accesses a SignalR Service when network access control rules are in effect still requires proper authorization for the request.
22
22
23
23
## Scenario A - No public traffic
24
24
25
-
To completely deny all public traffic, you should first configure the public network rule to allow no request type. Then, you should configure rules that grant access to traffic from specific VNets. This configuration enables you to build a secure network boundary for your applications.
25
+
To completely deny all public traffic, first configure the public network rule to allow no request type. Then, you can configure rules that grant access to traffic from specific VNets. This configuration enables you to build a secure network boundary for your applications.
26
26
27
27
## Scenario B - Only client connections from public network
28
28
29
-
In this scenario, you can configure the public network rule to only allow [Client Connections](signalr-concept-internals.md#client-connections) from public network. You can then configure private network rules to allow other types of requests originating from a specific VNet. This configuration hides your app servers from public network and establishes secure connections between your app servers and Azure SignalR Service.
29
+
In this scenario, you can configure the public network rule to only allow [Client Connections](signalr-concept-internals.md#client-connections) from the public network. You can then configure private network rules to allow other types of requests originating from a specific VNet. This configuration hides your app servers from the public network and establishes secure connections between your app servers and SignalR Service.
30
30
31
31
## Managing network access control
32
32
33
-
You can manage network access control for Azure SignalR Service through the Azure portal.
33
+
You can manage network access control for SignalR Service through the Azure portal.
34
34
35
-
### Azure portal
36
-
37
-
1. Go to the Azure SignalR Service you want to secure.
38
-
39
-
1. Select on the settings menu called **Network access control**.
35
+
1. Go to the SignalR Service instance you want to secure.
36
+
1. Select **Network access control** from the left side menu.
40
37
41
38

42
39
43
40
1. To edit default action, toggle the **Allow/Deny** button.
44
41
45
42
> [!TIP]
46
-
> The default action is the action the service takes when there is no ACL rule matches. For example, if the default action is **Deny**, then the request types that are not explicitly approved will be denied.
43
+
> The default action is the action the service takes when no access control rule matches a request. For example, if the default action is **Deny**, then the request types that are not explicitly approved will be denied.
47
44
48
45
1. To edit public network rule, select allowed types of requests under **Public network**.
Copy file name to clipboardExpand all lines: articles/azure-signalr/signalr-concept-internals.md
+7-11Lines changed: 7 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,14 +6,14 @@ ms.service: signalr
6
6
ms.topic: conceptual
7
7
ms.devlang: csharp
8
8
ms.custom: devx-track-csharp
9
-
ms.date: 01/05/2023
10
-
ms.author: lianwei
9
+
ms.date: 03/29/2023
10
+
ms.author: lanwei
11
11
---
12
12
# Azure SignalR Service internals
13
13
14
14
Azure SignalR Service is built on top of ASP.NET Core SignalR framework. It also supports ASP.NET SignalR by reimplementing ASP.NET SignalR's data protocol on top of the ASP.NET Core framework.
15
15
16
-
You can easily migrate a local ASP.NET Core SignalR or an ASP.NET SignalR application to work with SignalR Service, with a few lines of code change.
16
+
You can easily migrate a local ASP.NET Core SignalR or an ASP.NET SignalR application to work with SignalR Service, with by changing few lines of code.
17
17
18
18
The diagram describes the typical architecture when you use the SignalR Service with your application server.
19
19
@@ -28,7 +28,7 @@ A self-hosted ASP.NET Core SignalR application server listens to and connects cl
28
28
With SignalR Service, the application server no longer accepts persistent client connections, instead:
29
29
30
30
1. A `negotiate` endpoint is exposed by Azure SignalR Service SDK for each hub.
31
-
1. The endpoint responds to client's negotiation requests and redirect clients to SignalR Service.
31
+
1. The endpoint responds to client negotiation requests and redirect clients to SignalR Service.
32
32
1. The clients connect to SignalR Service.
33
33
34
34
For more information, see [Client connections](#client-connections).
@@ -41,15 +41,11 @@ Once the application server is started:
41
41
42
42
The initial number of connections defaults to 5 and is configurable using the `InitialHubServerConnectionCount` option in the SignalR Service SDK. For more information, see [configuration](https://github.com/Azure/azure-signalr/blob/dev/docs/run-asp-net-core.md#maxhubserverconnectioncount).
43
43
44
-
While the application server is connected to the SignalR service, the Azure SignalR service may send load-balancing messages to the server. Then, the SDK starts new server connections to the service for better performance.
45
-
46
-
<!-- Question: What does this mean? Are the connections client <-> service? -->
47
-
Messages to and from clients are multiplexed into these connections.
48
-
44
+
While the application server is connected to the SignalR service, the Azure SignalR service may send load-balancing messages to the server. Then, the SDK starts new server connections to the service for better performance. Messages to and from clients are multiplexed into these connections.
49
45
50
46
Server connections are persistently connected to the SignalR Service. If a server connection is disconnected due to a network issue:
51
47
52
-
- All clients served by this server connection disconnect (for more information, see [Data transmission between client and server](#data-transmission-between-client-and-server)).
48
+
- All clients served by this server connection disconnect. For more information, see [Data transmission between client and server](#data-transmission-between-client-and-server).
53
49
- The server automatically reconnects the clients.
54
50
55
51
## Client connections
@@ -91,7 +87,7 @@ At this point, the application server receives an event with information from th
91
87
92
88
SignalR Service transmits data from the client to the pairing application server. Data from the application server is sent to the mapped clients.
93
89
94
-
SignalR Service doesn't save or store customer data, all customer data received is transmitted to target server or clients in real-time.
90
+
SignalR Service doesn't save or store customer data, all customer data received is transmitted to the target server or clients in real-time.
95
91
96
92
The Azure SignalR Service acts as a logical transport layer between application server and clients. All persistent connections are offloaded to SignalR Service. As a result, the application server only needs to handle the business logic in the hub class, without worrying about client connections.
Copy file name to clipboardExpand all lines: articles/azure-signalr/signalr-howto-authorize-managed-identity.md
+13-14Lines changed: 13 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Authorize managed identity requests to a SignalR resource
3
3
description: This article provides information about authorizing request to SignalR resources with Azure AD from managed identities
4
4
author: vicancy
5
5
ms.author: lianwei
6
-
ms.date: 07/18/2022
6
+
ms.date: 03/28/2023
7
7
ms.service: signalr
8
8
ms.topic: how-to
9
9
ms.devlang: csharp
@@ -12,7 +12,7 @@ ms.custom: subject-rbac-steps
12
12
13
13
# Authorize managed identity requests to a SignalR resource
14
14
15
-
Azure SignalR Service supports Azure Active Directory (Azure AD) authorizing requests from Azure resources using [Managed identities for Azure resources
15
+
Azure SignalR Service supports Azure Active Directory (Azure AD) authorizing requests from Azure resources using [managed identities for Azure resources
This article shows how to configure your SignalR resource and code to authorize a managed identity request to a SignalR resource.
@@ -30,8 +30,7 @@ This example shows you how to configure `System-assigned managed identity` on a
30
30
1. Select the **Save** button to confirm the change.
31
31
32
32
33
-
To learn how to create user-assigned managed identities, see this article:
34
-
-[Create a user-assigned managed identity](../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md#create-a-user-assigned-managed-identity)
33
+
To learn how to create user-assigned managed identities, see [Create a user-assigned managed identity](../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md#create-a-user-assigned-managed-identity)
35
34
36
35
To learn more about configuring managed identities, see one of these articles:
37
36
@@ -66,7 +65,7 @@ The following steps describe how to assign a `SignalR App Server` role to a syst
66
65
67
66
1. Select your Azure subscription.
68
67
69
-
1. Select **System-assigned managed identity**, search for a virtual machine to which would you'd like to assign the role, and then select it.
68
+
1. Select **System-assigned managed identity**, search for a virtual machine to which you'd like to assign the role, and then select it.
70
69
71
70
1. On the **Review + assign** tab, select **Review + assign** to assign the role.
72
71
@@ -86,11 +85,9 @@ To learn more about how to assign and manage Azure role assignments, see these a
86
85
87
86
#### Using system-assigned identity
88
87
89
-
You can use either [DefaultAzureCredential](/dotnet/api/overview/azure/identity-readme#defaultazurecredential) or [ManagedIdentityCredential](/dotnet/api/azure.identity.managedidentitycredential) to configure your SignalR endpoints.
88
+
You can use either [DefaultAzureCredential](/dotnet/api/overview/azure/identity-readme#defaultazurecredential) or [ManagedIdentityCredential](/dotnet/api/azure.identity.managedidentitycredential) to configure your SignalR endpoints. However, the best practice is to use `ManagedIdentityCredential` directly.
90
89
91
-
However, the best practice is to use `ManagedIdentityCredential` directly.
92
-
93
-
The system-assigned managed identity will be used by default, but **make sure that you don't configure any environment variables** that the [EnvironmentCredential](/dotnet/api/azure.identity.environmentcredential) preserved if you were using `DefaultAzureCredential`. Otherwise it will fall back to use `EnvironmentCredential` to make the request and it will result to a `Unauthorized` response in most cases.
90
+
The system-assigned managed identity is used by default, but **make sure that you don't configure any environment variables** that the [EnvironmentCredential](/dotnet/api/azure.identity.environmentcredential) preserved if you were using `DefaultAzureCredential`. Otherwise it falls back to use `EnvironmentCredential` to make the request and it results to a `Unauthorized` response in most cases.
94
91
95
92
```C#
96
93
services.AddSignalR().AddAzureSignalR(option=>
@@ -127,14 +124,14 @@ You might need a group of key-value pairs to configure an identity. The keys of
127
124
128
125
#### Using system-assigned identity
129
126
130
-
IfyouonlyconfiguretheserviceURI, thenthe `DefaultAzureCredential` isused. Thisclassisuseful when you want to share the same configuration on Azure and local dev environment. To learn how `DefaultAzureCredential` works, see [DefaultAzureCredential](/dotnet/api/overview/azure/identity-readme#defaultazurecredential).
127
+
IfyouonlyconfiguretheserviceURI, thenthe `DefaultAzureCredential` isused. Thisclassisuseful when you want to share the same configuration on Azure and local development environments. To learn how `DefaultAzureCredential` works, see [DefaultAzureCredential](/dotnet/api/overview/azure/identity-readme#defaultazurecredential).
131
128
132
-
OnAzureportal, usethefollowingexampletoconfigurea `DefaultAzureCredential`. Ifdon't configure any [environment variables listed here](/dotnet/api/overview/azure/identity-readme#environment-variables), then the system-assigned identity will be used to authenticate.
129
+
IntheAzureportal, usethefollowingexampletoconfigurea `DefaultAzureCredential`. Ifyoudon't configure any [environment variables listed here](/dotnet/api/overview/azure/identity-readme#environment-variables), then the system-assigned identity is used to authenticate.
Here's a config sample of `DefaultAzureCredential` in the `local.settings.json` file. At the local scope there'snomanagedidentity, andtheauthenticationviaVisualStudio, AzureCLI, andAzurePowerShellaccountswillbeattemptedinorder.
134
+
Here's a config sample of `DefaultAzureCredential` in the `local.settings.json` file. At the local scope there'snomanagedidentity, andtheauthenticationviaVisualStudio, AzureCLI, andAzurePowerShellaccountsareattemptedinorder.
138
135
```json
139
136
{
140
137
"Values": {
@@ -143,7 +140,7 @@ Here's a config sample of `DefaultAzureCredential` in the `local.settings.json`
Copy file name to clipboardExpand all lines: articles/azure-signalr/signalr-howto-key-rotation.md
+6-12Lines changed: 6 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,38 +4,32 @@ description: An overview on why the customer needs to routinely rotate the acces
4
4
author: vicancy
5
5
ms.service: signalr
6
6
ms.topic: how-to
7
-
ms.date: 07/18/2022
7
+
ms.date: 03/29/2023
8
8
ms.author: lianwei
9
9
---
10
10
# Rotate access keys for Azure SignalR Service
11
11
12
-
For security reasons and compliance requirements, it is important to routinely rotate your access keys. This article describes how to rotate access keys for Azure SignalR Service.
12
+
For security reasons and compliance requirements, it's important to routinely rotate your access keys. This article describes how to rotate access keys for Azure SignalR Service.
13
13
14
14
Each Azure SignalR Service instance has a primary and a secondary key. They're used to authenticate SignalR clients when requests are made to the service. The keys are associated with the instance endpoint URL. Keep your keys secure, and rotate them regularly. You're provided with two access keys so that you can maintain connections by using one key while regenerating the other.
15
15
16
16
17
17
## Regenerate access keys
18
18
19
-
1. Go to the [Azure portal](https://portal.azure.com/), and sign in with your credentials.
20
-
21
-
1. Find the **Keys** section in the Azure SignalR Service instance with the keys that you want to regenerate.
22
-
23
-
1. Select **Keys** on the navigation menu.
24
-
19
+
1. Go to your SignalR instance in the [Azure portal](https://portal.azure.com/).
20
+
1. Select **Keys** on the left side menu.
25
21
1. Select **Regenerate Primary Key** or **Regenerate Secondary Key**.
26
22
27
-
A new key and corresponding connection string are created and displayed.
23
+
A new key and corresponding connection string are created and displayed.
0 commit comments