Commit Graph

35 Commits (0304bd1607a7a7030900eced15d46876e35752a8)

Author SHA1 Message Date
Wade Pickett 11428ec020
SignalR Security: Updating code sample v6-8 (#30517)
* SignalR Security: Updating code samples v6-8

* Removed .min ref for jquery
2023-09-29 14:00:33 -07:00
Wade Pickett 9836c129ea
Version by include prep for SignalR Security (#30513)
* Version by include prep for SignalR Security
2023-09-27 22:08:13 -07:00
Luke Latham af85a9389e
File downloads article updates 8.0 (#30138) 2023-08-24 08:51:06 -04:00
Luke Latham 1ec256dd36
Add missing word (#27701) 2022-11-21 05:09:05 -06:00
Luke Latham e175588086
Institute global no-loc (#26036)
* Institute global no-loc

* Updates

* Updates

* Updates

* Updates

* Updates
2022-06-03 11:35:55 -10:00
Luke Latham 546a06a2d5
Blazor no-loc adds (#25429) 2022-03-25 18:19:18 -05:00
Luke Latham 5f1743e629
Add Blazor Hybrid to no-loc metadata (#25064) 2022-02-18 07:17:09 -06:00
Kirk Larkin e3c99c2fe5
Prefer :::moniker over ::: moniker (#24805) 2022-01-31 13:12:01 -10:00
Luke Latham 723b86eaca
Update author in metadata (#23714) 2021-11-02 10:48:25 -05:00
Luke Latham 3b8e7fe9e8
Broken link fixups (#23249)
* Broken link fixups

* Updates
2021-09-09 10:01:33 -07:00
Rick Anderson ad321c2700
Add Home and Privacy to no-loc (#22237)
* Add Home and Privacy to no-loc

* Add Home and Privacy to no-loc
2021-05-08 10:12:34 -10:00
Rick Anderson 2f00739f4e
Kestrel to no-loc (#22182) 2021-05-01 13:03:18 -10:00
Rick Anderson 311cef0e25
appsettings.json noloc (#20320) 2020-10-27 11:27:47 -10:00
Rick Anderson 23bd8d2057
Add ASP.NET Identity to no loc (#19578)
* Add ASP.NET Identity to no loc

* Add ASP.NET Identity to no loc

* Add ASP.NET Identity to no loc

* Add ASP.NET Identity to no loc
2020-08-19 11:07:40 -10:00
Rick Anderson 3a5c8b81d4
add Cookie to no loc (#19446) 2020-08-07 14:55:26 -10:00
Luke Latham 80446f1dd8
Add Blazor WebAssembly/Server to no-loc (#18962) 2020-06-25 19:11:04 -05:00
Luke Latham 63d40f5602
SignalR naming consistency (#18759) 2020-06-12 15:55:07 -05:00
Luke Latham f2834015b6
Drop existing no-loc entries (#18111) 2020-05-04 12:00:16 -05:00
Brennan f0bbf06bc6
Update SignalR CORS for 5.0 (#18000)
* Update SignalR CORS for 5.0

* Update aspnetcore/signalr/configuration.md

Co-Authored-By: Scott Addie <10702007+scottaddie@users.noreply.github.com>

Co-authored-by: Scott Addie <10702007+scottaddie@users.noreply.github.com>
2020-04-28 16:49:04 -05:00
Scott Addie 9174ead0d3
Update aspnet org. links to reference the dotnet org. (#17077)
* Update aspnet org. links to reference the dotnet org.

* Update API ref links
2020-02-20 19:37:35 -06:00
Wade Pickett 8ae34e4bad New include ConnectId security warning & applied to hubs.md for SignalR (#16573)
* New include connectID security warning & applied to hubs.md for SignalR

* patch: Corrected grammar on include warning.

* patch: adding ConnectID section to security.md for Signalr.

* Update aspnetcore/includes/connectionid-signalr.md

Co-Authored-By: Stephen Halter <halter73@gmail.com>

* Update security.md

Changed "ConnectionID" to "ConnectionId"

Co-authored-by: Stephen Halter <halter73@gmail.com>
2020-01-17 17:47:52 -08:00
Scott Addie 0a6c1f78c5
Update aspnet/AspNetCore & aspnet/Home references to dotnet/As… (#16483)
* React to AspNetCore repo move to dotnet org

* Change aspnet/Home reference to dotnet/aspnetcore

* More replacements of aspnet/Home
2020-01-09 13:30:28 -06:00
Rick Anderson 28490987fa
Update security.md (#16153)
* Update security.md

* Update security.md

* Update security.md

* Update security.md

* Update security.md
2020-01-07 16:47:12 -08:00
Luke Latham 2e9bf90656
Drop styled link text (#16042) 2019-12-05 17:12:26 -06:00
Luke Latham 483b8f01ac Apply no-loc metadata for "SignalR" (#15675) 2019-11-12 13:40:34 -06:00
Stephen Halter 1e93eb75f8
Update SignalR 3.0 docs to use Endpoint Routing (#14126) 2019-09-05 14:43:46 -07:00
Tom Dykstra 72e1a9fc67
Fundamentals restructuring (#10929) 2019-02-22 12:44:53 -08:00
Tom Dykstra 05a3cd396c Assign SignalR docs to Brady (#10575) 2019-01-23 10:36:13 -10:00
Tom Dykstra eb67d3a497
http --> https in sample URLs in SignalR security.md (#9500) 2018-11-07 09:27:17 -08:00
Andrew Stanton-Nurse f8acc64223 Expand upon SignalR access token logging section (#9440)
From #9424 discussions

Expanded a bit on how access token logging affects your app and what it means. Also, how to disable URL logging entirely in ASP.NET Core (this is a bit of a severe option, since it disables logging of ALL request URLs).

cc @Tratcher

[Internal Review Link](https://review.docs.microsoft.com/en-us/aspnet/core/signalr/security?view=aspnetcore-2.1&branch=pr-en-us-9440)
2018-11-07 09:23:41 -06:00
BrennanConroy d396dffe19 WebSocket Origin Restriction (#9447)
Fixes https://github.com/aspnet/Docs/issues/9363

[Internal Review Link](https://review.docs.microsoft.com/en-us/aspnet/core/signalr/security?view=aspnetcore-2.2&branch=pr-en-us-9447)
There are some moniker ranges, so switch the versions to verify they're working
2018-11-06 15:55:48 -06:00
Rick Anderson 36e2502ce8
UE edit of Security considerations in ASP.NET Core SignalR (#9088)
[Internal review URL](https://review.docs.microsoft.com/en-us/aspnet/core/signalr/security?view=aspnetcore-2.1&branch=pr-en-us-9088)

- Kill long sentences. Long sentences are difficult for native speakers and impossible for MT (machine translation)
- Format code to prevent horizontal scroll bar on tablets 85 characters wide. You can simulate tablets by viewing in a browser of the maximum width that doesn't have left or right panes (TOC's).
- Prune dead wood. Avoid unnecessary words that don't add meaning to the text.
- Avoid "you" except when it make the statement more clear. 

  - For example, the following CORS policy allows a SignalR browser client hosted on `http://example.com` to access **your** SignalR app:
  -For example, the following CORS policy allows a SignalR browser client hosted on `http://example.com` to access the SignalR app hosted on `http://signalr.example.com`:
- Avoid Wikipedia links
- Code snippets

Explicit sign-off required on my security rewording below:
- [ ]  Allow cross-origin requests only from domains you trust or control. 

The following are slightly too long but I couldn't find an elegant way to shorten them (not that my other trimming was elegant):

- Applications should be configured to validate these headers to ensure that only WebSockets coming from the expected origins are allowed.
2018-10-19 09:10:45 -10:00
Andrew Stanton-Nurse 04e2b7a6bd Documentation on WebSocket Origin validation (#9080)
Added some notes on WebSocket Origin validation to ASP.NET Core SignalR documentation.

[Internal Review Link](https://review.docs.microsoft.com/en-us/aspnet/core/signalr/security?view=aspnetcore-2.1&branch=pr-en-us-9080)
2018-10-17 11:01:37 -10:00
Scott Addie cb24febfda
Update author metadata fields to Tom (#7652)
Updates the `ms.author` and `author` metadata fields to Tom's user ID.
2018-07-16 15:09:39 -05:00
Andrew Stanton-Nurse 3ee6b79ce4 SignalR AuthN/AuthZ and Security Concepts (#7312)
* initial prose, samples still todo

* add sample and docs on Windows Auth

* add sample download link

* fix some code samples

* fix xref

* clarify sample comment when it's embedded in the document

* pr feedback

* add section on buffer management

* feedback

* some feedback

* update index/toc

* Update authn-and-authz.md
2018-07-11 16:21:53 -06:00