You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
My azure blob storage uses a private container and as such requires a SAS token in the URL.
Short lived tokens are generated on our backend and sent to the client. The client then provides the SAS token in the request to azure blob storage URL as query string.
Is there a way i can forward this sas token and still make use of URL signing or will the SAS token provide a similar level of security from a DoS perspective and can i therefore disable URL signing in this instance?
The text was updated successfully, but these errors were encountered:
Since the SAS token is a part of a URL, it can be a part of imgproxy's source URL. However, since SAS tokens are short-lived, they'll dramatically reduce the cache hit rate. So I'd highly recommend imgproxy's ABS integration instead.
imgproxy's URL signatures not only prevent attackers from accessing random images but also prevent them from using your imgproxy for their purposes by changing the processing options of source URLs. Thus it's always recommended to sign imgproxy's URLs.
Generating imgproxy signatures on the frontend doesn't make any sense since doing so requires exposing the key/salt pair.
Hi,
My azure blob storage uses a private container and as such requires a SAS token in the URL.
Short lived tokens are generated on our backend and sent to the client. The client then provides the SAS token in the request to azure blob storage URL as query string.
Is there a way i can forward this sas token and still make use of URL signing or will the SAS token provide a similar level of security from a DoS perspective and can i therefore disable URL signing in this instance?
The text was updated successfully, but these errors were encountered: