Skip to content

Commit 29ecfb3

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into misc
2 parents 8b04860 + 84409bc commit 29ecfb3

File tree

157 files changed

+4434
-1755
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

157 files changed

+4434
-1755
lines changed

articles/active-directory-b2c/cookie-definitions.md

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 08/12/2021
12+
ms.date: 03/20/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -42,8 +42,18 @@ The following table lists the cookies used in Azure AD B2C.
4242
| `x-ms-cpim-trans` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Used for tracking the transactions (number of authentication requests to Azure AD B2C) and the current transaction. |
4343
| `x-ms-cpim-sso:{Id}` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Used for maintaining the SSO session. This cookie is set as `persistent`, when [Keep Me Signed In](session-behavior.md#enable-keep-me-signed-in-kmsi) is enabled.|
4444
| `x-ms-cpim-cache:{id}_n` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md), successful authentication | Used for maintaining the request state. |
45-
| `x-ms-cpim-csrf` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Cross-Site Request Forgery token used for CRSF protection. |
45+
| `x-ms-cpim-csrf` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Cross-Site Request Forgery token used for CRSF protection. For more information, read the [Cross-Site request forgery token](#cross-site-request-forgery-token) section. |
4646
| `x-ms-cpim-dc` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Used for Azure AD B2C network routing. |
4747
| `x-ms-cpim-ctx` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Context |
4848
| `x-ms-cpim-rp` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Used for storing membership data for the resource provider tenant. |
4949
| `x-ms-cpim-rc` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Used for storing the relay cookie. |
50+
51+
## Cross-Site request forgery token
52+
53+
To prevent Cross Site Request Forgery (CSRF) attacks, Azure AD B2C applies the Synchronizer Token strategy mechanism. For more details on this pattern, check out the [Cross-Site Request Forgery Prevention](https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#synchronizer-token-pattern) article.
54+
55+
Azure AD B2C generates a synchronizer token, and adds it in two places; in a cookie labeled `x-ms-cpim-csrf`, and a query string parameter named `csrf_token` in the URL of the page sent to the Azure AD B2C. As Azure AD B2C service processes the incoming requests from the browser, it confirms that both the query string and cookie versions of the token exist, and that they exactly match. Also it verifies the elements of the contents of the token to confirm against expected values for the in-progress authentication.
56+
57+
For example, in the sign-up or sign-in page, when a user selects the "Forgot password", or "Sign-up now" links, the browser sends a GET request to Azure AD B2C in order to load the contents of the next page. The request to load content Azure AD B2C additionally chooses to send and validate the Synchronizer Token as an extra layer of protection to ensure that the request to load the page was the result of an in-progress authentication.
58+
59+
The Synchronizer Token is a credential that doesn't identify a user, but rather is tied to an active unique authentication session.

articles/active-directory-b2c/partner-f5.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Tutorial to enable Secure Hybrid Access to applications with Azure AD B2C and F5 BIG-IP
33
titleSuffix: Azure AD B2C
44
description: Learn how to integrate Azure AD B2C authentication with F5 BIG-IP for secure hybrid access
5-
author: KarenH444
6-
ms.author: celested
5+
author: gargi-sinha
6+
ms.author: gasinh
77
manager: CelesteDG
88
ms.reviewer: kengaderdus
99
ms.service: active-directory

articles/active-directory/authentication/howto-sspr-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: conceptual
99
ms.date: 02/02/2022
1010

1111
ms.author: justinha
12-
author: NishthaBabith-V
12+
author: gargi-sinha
1313
manager: martinco
1414
ms.reviewer: tilarso
1515

articles/active-directory/manage-apps/f5-aad-integration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Secure hybrid access with F5
33
titleSuffix: Azure AD
44
description: F5 BIG-IP Access Policy Manager and Azure Active Directory integration for Secure Hybrid Access
5-
author: CelesteDG
5+
author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: how-to
1010
ms.workload: identity
1111
ms.date: 11/12/2020
12-
ms.author: celested
12+
ms.author: gasinh
1313
ms.collection: M365-identity-device-management
1414
---
1515

articles/active-directory/manage-apps/f5-aad-password-less-vpn.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: Configure F5 BIG-IP SSL-VPN solution in Azure AD
33
titleSuffix: Azure AD
44
description: Tutorial to configure F5’s BIG-IP based Secure socket layer Virtual private network (SSL-VPN) solution with Azure Active Directory (AD) for Secure Hybrid Access (SHA)
55
services: active-directory
6-
author: CelesteDG
6+
author: gargi-sinha
77
manager: martinco
88
ms.service: active-directory
99
ms.subservice: app-mgmt
1010
ms.topic: how-to
1111
ms.workload: identity
1212
ms.date: 10/12/2020
13-
ms.author: celested
13+
ms.author: gasinh
1414
ms.collection: M365-identity-device-management
1515
ms.reviewer: v-nisba
1616
---
@@ -309,4 +309,4 @@ The F5 VPN application should also be visible as a target resource in Azure AD C
309309

310310
- [Five steps to full application integration with Azure AD](../fundamentals/five-steps-to-full-application-integration-with-azure-ad.md)
311311

312-
- [Microsoft Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
312+
- [Microsoft Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)

articles/active-directory/manage-apps/f5-big-ip-forms-advanced.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
title: Configure F5 BIG-IP’s Access Policy Manager for form-based SSO
33
description: Learn how to configure F5's BIG-IP Access Policy Manager and Azure Active Directory for secure hybrid access to form-based applications.
4-
author: CelesteDG
4+
author: gargi-sinha
55
ms.service: active-directory
66
ms.subservice: app-mgmt
77
ms.topic: how-to
88
ms.workload: identity
99
ms.date: 10/20/2021
10-
ms.author: celested
10+
ms.author: gasinh
1111
ms.collection: M365-identity-device-management
1212
---
1313

@@ -439,4 +439,4 @@ For more information, see the F5 BIG-IP [Session Variables reference](https://te
439439

440440
* [What is Conditional Access?](../conditional-access/overview.md)
441441

442-
* [Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
442+
* [Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)

articles/active-directory/manage-apps/f5-big-ip-header-advanced.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Configure F5 BIG-IP Access Policy Manager for header-based SSO
33
description: Learn how to configure F5's BIG-IP Access Policy Manager (APM) and Azure Active Directory SSO for header-based authentication
44
services: active-directory
5-
author: CelesteDG
5+
author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: how-to
1010
ms.workload: identity
1111
ms.date: 11/10/2021
12-
ms.author: celested
12+
ms.author: gasinh
1313
ms.collection: M365-identity-device-management
1414
---
1515

@@ -431,4 +431,4 @@ For more information refer to these articles:
431431
- [What is Conditional Access?](../conditional-access/overview.md)
432432

433433
- [Microsoft Zero Trust framework to enable remote
434-
work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
434+
work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)

articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Configure F5 BIG-IP’s Easy Button for Header-based SSO
33
description: learn to implement Secure Hybrid Access (SHA) with single sign-on (SSO) to header-based applications using F5’s BIG-IP Easy Button Guided Configuration.
44
services: active-directory
5-
author: CelesteDG
5+
author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: how-to
1010
ms.workload: identity
1111
ms.date: 01/07/2022
12-
ms.author: celested
12+
ms.author: gasinh
1313
ms.collection: M365-identity-device-management
1414
---
1515

@@ -363,4 +363,4 @@ If you don’t see a BIG-IP error page, then the issue is probably more related
363363

364364
2. The **View Variables** link in this location may also help root cause SSO issues, particularly if the BIG-IP APM fails to obtain the right attributes from Azure AD or another source
365365

366-
For more information, visit this F5 knowledge article [Configuring LDAP remote authentication for Active Directory](https://support.f5.com/csp/article/K11072). There’s also a great BIG-IP reference table to help diagnose LDAP-related issues in this F5 knowledge article on [LDAP Query](https://techdocs.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-single-sign-on-11-5-0/5.html).
366+
For more information, visit this F5 knowledge article [Configuring LDAP remote authentication for Active Directory](https://support.f5.com/csp/article/K11072). There’s also a great BIG-IP reference table to help diagnose LDAP-related issues in this F5 knowledge article on [LDAP Query](https://techdocs.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-single-sign-on-11-5-0/5.html).

articles/active-directory/manage-apps/f5-big-ip-kerberos-advanced.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Configure F5 BIG-IP Access Policy Manager for Kerberos authentication
33
description: Learn how to implement Secure Hybrid Access (SHA) with single sign-on (SSO) to Kerberos applications by using F5's BIG-IP advanced configuration.
44
services: active-directory
5-
author: CelesteDG
5+
author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: how-to
1010
ms.workload: identity
1111
ms.date: 12/13/2021
12-
ms.author: celested
12+
ms.author: gasinh
1313
ms.collection: M365-identity-device-management
1414
---
1515

@@ -505,4 +505,4 @@ For help with diagnosing KCD-related problems, see the F5 BIG-IP deployment guid
505505

506506
* [What is Conditional Access?](../conditional-access/overview.md)
507507

508-
* [Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
508+
* [Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)

articles/active-directory/manage-apps/f5-big-ip-kerberos-easy-button.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Configure F5 BIG-IP Easy Button for Kerberos SSO
33
description: Learn to implement Secure Hybrid Access (SHA) with Single Sign-on to Kerberos applications using F5’s BIG-IP Easy Button guided configuration..
44
services: active-directory
5-
author: CelesteDG
5+
author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: how-to
1010
ms.workload: identity
1111
ms.date: 12/20/2021
12-
ms.author: celested
12+
ms.author: gasinh
1313
ms.collection: M365-identity-device-management
1414
---
1515

@@ -456,4 +456,4 @@ If you don’t see a BIG-IP error page, then the issue is probably more related
456456

457457
2. Select the link for your active session. The **View Variables** link in this location may also help determine root cause KCD issues, particularly if the BIG-IP APM fails to obtain the right user and domain identifiers from session variables.
458458

459-
See [BIG-IP APM variable assign examples]( https://devcentral.f5.com/s/articles/apm-variable-assign-examples-1107) and [F5 BIG-IP session variables reference]( https://techdocs.f5.com/en-us/bigip-15-0-0/big-ip-access-policy-manager-visual-policy-editor/session-variables.html) for more info.
459+
See [BIG-IP APM variable assign examples]( https://devcentral.f5.com/s/articles/apm-variable-assign-examples-1107) and [F5 BIG-IP session variables reference]( https://techdocs.f5.com/en-us/bigip-15-0-0/big-ip-access-policy-manager-visual-policy-editor/session-variables.html) for more info.

0 commit comments

Comments
 (0)