Skip to content

Commit e724bf8

Browse files
authored
Update media-services-content-protection-overview.md
1 parent c1535c0 commit e724bf8

File tree

1 file changed

+13
-0
lines changed

1 file changed

+13
-0
lines changed

articles/media-services/previous/media-services-content-protection-overview.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,19 @@ With a token-restricted authorization policy, the content key is sent only to a
7171

7272
When you configure the token restricted policy, you must specify the primary verification key, issuer, and audience parameters. The primary verification key contains the key that the token was signed with. The issuer is the secure token service that issues the token. The audience, sometimes called scope, describes the intent of the token or the resource the token authorizes access to. The Media Services key delivery service validates that these values in the token match the values in the template.
7373

74+
### Token replay prevention
75+
76+
The *Token Replay Prevention* feature allows Media Services customers to set a limit on how many times the same token can be used to request a key or a license. The customer can add a claim of type `urn:microsoft:azure:mediaservices:maxuses` in the token, where the value is the number of times the token can be used to acquire a license or key. All subsequent requests with the same token to Key Delivery will return an unauthorized response. See how to add the claim in the [DRM sample](https://github.com/Azure-Samples/media-services-v3-dotnet-tutorials/blob/master/AMSV3Tutorials/EncryptWithDRM/Program.cs#L601).
77+
78+
#### Considerations
79+
80+
* Customers must have control over token generation. The claim needs to be placed in the token itself.
81+
* When using this feature, requests with tokens whose expiry time is more than one hour away from the time the request is received are rejected with an unauthorized response.
82+
* Tokens are uniquely identified by their signature. Any change to the payload (for example, update to the expiry time or the claim) changes the signature of the token and it will count as a new token that Key Delivery hasn't come across before.
83+
* Playback fails if the token has exceeded the `maxuses` value set by the customer.
84+
* This feature can be used for all existing protected content (only the token issued needs to be changed).
85+
* This feature works with both JWT and SWT.
86+
7487
## Streaming URLs
7588
If your asset was encrypted with more than one DRM, use an encryption tag in the streaming URL: (format='m3u8-aapl', encryption='xxx').
7689

0 commit comments

Comments
 (0)