Commit Graph

9 Commits (dd05953e857a1579c2dacf723baa7a7450e30ac1)

Author SHA1 Message Date
Tom Dykstra 72e1a9fc67
Fundamentals restructuring (#10929) 2019-02-22 12:44:53 -08:00
Tom Dykstra 05a3cd396c Assign SignalR docs to Brady (#10575) 2019-01-23 10:36:13 -10:00
Tom Dykstra eb67d3a497
http --> https in sample URLs in SignalR security.md (#9500) 2018-11-07 09:27:17 -08:00
Andrew Stanton-Nurse f8acc64223 Expand upon SignalR access token logging section (#9440)
From #9424 discussions

Expanded a bit on how access token logging affects your app and what it means. Also, how to disable URL logging entirely in ASP.NET Core (this is a bit of a severe option, since it disables logging of ALL request URLs).

cc @Tratcher

[Internal Review Link](https://review.docs.microsoft.com/en-us/aspnet/core/signalr/security?view=aspnetcore-2.1&branch=pr-en-us-9440)
2018-11-07 09:23:41 -06:00
BrennanConroy d396dffe19 WebSocket Origin Restriction (#9447)
Fixes https://github.com/aspnet/Docs/issues/9363

[Internal Review Link](https://review.docs.microsoft.com/en-us/aspnet/core/signalr/security?view=aspnetcore-2.2&branch=pr-en-us-9447)
There are some moniker ranges, so switch the versions to verify they're working
2018-11-06 15:55:48 -06:00
Rick Anderson 36e2502ce8
UE edit of Security considerations in ASP.NET Core SignalR (#9088)
[Internal review URL](https://review.docs.microsoft.com/en-us/aspnet/core/signalr/security?view=aspnetcore-2.1&branch=pr-en-us-9088)

- Kill long sentences. Long sentences are difficult for native speakers and impossible for MT (machine translation)
- Format code to prevent horizontal scroll bar on tablets 85 characters wide. You can simulate tablets by viewing in a browser of the maximum width that doesn't have left or right panes (TOC's).
- Prune dead wood. Avoid unnecessary words that don't add meaning to the text.
- Avoid "you" except when it make the statement more clear. 

  - For example, the following CORS policy allows a SignalR browser client hosted on `http://example.com` to access **your** SignalR app:
  -For example, the following CORS policy allows a SignalR browser client hosted on `http://example.com` to access the SignalR app hosted on `http://signalr.example.com`:
- Avoid Wikipedia links
- Code snippets

Explicit sign-off required on my security rewording below:
- [ ]  Allow cross-origin requests only from domains you trust or control. 

The following are slightly too long but I couldn't find an elegant way to shorten them (not that my other trimming was elegant):

- Applications should be configured to validate these headers to ensure that only WebSockets coming from the expected origins are allowed.
2018-10-19 09:10:45 -10:00
Andrew Stanton-Nurse 04e2b7a6bd Documentation on WebSocket Origin validation (#9080)
Added some notes on WebSocket Origin validation to ASP.NET Core SignalR documentation.

[Internal Review Link](https://review.docs.microsoft.com/en-us/aspnet/core/signalr/security?view=aspnetcore-2.1&branch=pr-en-us-9080)
2018-10-17 11:01:37 -10:00
Scott Addie cb24febfda
Update author metadata fields to Tom (#7652)
Updates the `ms.author` and `author` metadata fields to Tom's user ID.
2018-07-16 15:09:39 -05:00
Andrew Stanton-Nurse 3ee6b79ce4 SignalR AuthN/AuthZ and Security Concepts (#7312)
* initial prose, samples still todo

* add sample and docs on Windows Auth

* add sample download link

* fix some code samples

* fix xref

* clarify sample comment when it's embedded in the document

* pr feedback

* add section on buffer management

* feedback

* some feedback

* update index/toc

* Update authn-and-authz.md
2018-07-11 16:21:53 -06:00