Skip to content

Commit f5e4ea8

Browse files
authored
Fix Note
1 parent a10103a commit f5e4ea8

File tree

2 files changed

+5
-3
lines changed

2 files changed

+5
-3
lines changed

articles/azure-signalr/signalr-howto-configure-application-firewall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Client Connection Count Rules restrict concurrent client connections. When a cli
4747

4848
#### ThrottleByJwtCustomClaimRule
4949

50-
More advanced, connections could be grouped into different groups according to custom claim. Connections with the same claim are aggregated to do the check. For example, you could add a *ThrottleByJwtCustomClaimRule* to allow 5 concurrent connections with custom claim key "freeUser".
50+
More advanced, connections could be grouped into different groups according to custom claim. Connections with the same claim are aggregated to do the check. For example, you could add a **ThrottleByJwtCustomClaimRule** to allow 5 concurrent connections with custom claim name *freeUser*.
5151

5252
> [!NOTE]
5353
> * The rule applies to all claims with a certain claim name. The connection count aggregation is on the same claim (including claim name and claim value). The *ThrottleByUserIdRule* is a special case of this rule, applying to all connections with the userIdentity claim.

articles/azure-web-pubsub/howto-configure-application-firewall.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,13 +33,15 @@ Client Connection Count Rules restrict concurrent client connections. When a cli
3333
#### ThrottleByUserIdRule
3434
This rule limits the concurrent connections of a user. For example, if a user opens multiple browser tabs or logs in using different devices, you can use this rule to restrict the number of concurrent connections for that user.
3535

36-
**Note:** The UserId must exist in the access token for this rule to work. Refer to [Configure access token](#configure-access-token).
36+
> [!NOTE]
37+
> * The UserId must exist in the access token for this rule to work. Refer to [Configure access token](#configure-access-token).
3738
3839

3940
#### ThrottleByJwtSignatureRule
4041
This rule limits the concurrent connections of the same token to prevent malicious users from reusing tokens to establish infinite connections, which can exhaust connection quota.
4142

42-
**Note:** It's not guaranteed by default that tokens generated by the SDK are different each time. Though each token contains a timestamp, this timestamp might be the same if vast tokens are generated within seconds. To avoid identical tokens, insert a random claim into the token claims. Refer to [Configure access token](#configure-access-token).
43+
> [!NOTE]
44+
> * It's not guaranteed by default that tokens generated by the SDK are different each time. Though each token contains a timestamp, this timestamp might be the same if vast tokens are generated within seconds. To avoid identical tokens, insert a random claim into the token claims. Refer to [Configure access token](#configure-access-token).
4345
4446

4547
> [!WARNING]

0 commit comments

Comments
 (0)