You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/frontdoor/rules-engine-scenarios.md
+17-9Lines changed: 17 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,25 +5,33 @@ author: halkazwini
5
5
ms.author: halkazwini
6
6
ms.service: azure-frontdoor
7
7
ms.topic: concept-article
8
-
ms.date: 05/29/2025
8
+
ms.date: 06/03/2025
9
9
10
10
---
11
11
12
12
# Azure Front Door rules engine scenarios and configurations
13
13
14
-
The Azure Front Door rules engine allows users to customize processing and routing logic on AFD edge with ease by configuring pairs of match conditions and actions.
14
+
The Azure Front Door rules engine allows users to easily customize processing and routing logic at the Front Door edge by configuring match condition and action pairs.
15
15
16
-
You can configure various rule [actions](front-door-rules-engine-actions.md) based on the combination of the currently supported 19 match conditions from incoming requests, to
17
-
1. manage cache policy dynamically
16
+
You can define various rule [actions](front-door-rules-engine-actions.md) based on combination of 19 supported match conditions from incoming requests. These rules allow you to:
18
17
19
-
1. forward request to different origins or versions
18
+
1. Manage cache policy dynamically
20
19
21
-
1. modify request or response headers to hide sensitive information or passthrough important information through headers, e.g. implementing security headers to prevent browser-based vulnerabilities like HTTP Strict-Transport-Security (HSTS), X-XSS-Protection, Content-Security-Policy, X-Frame-Options, and Access-Control-Allow-Origin headers for Cross-Origin Resource Sharing (CORS) scenarios. Security-based attributes can also be defined with cookies.
20
+
1. Forward requests to different origins or versions
22
21
23
-
1. rewrite to new paths or redirect requests to new destinations
22
+
1. Modify request or response headers to hide sensitive information or passthrough important information through headers. For example, implementing security headers to prevent browser-based vulnerabilities like:
23
+
- HTTP strict-transport-security (HSTS)
24
+
- X-XSS-protection
25
+
- Content-security-policy
26
+
- X-frame-options
27
+
- Access-Control-Allow-Origin headers for cross-origin resource sharing (CORS) scenarios.
28
+
Security-based attributes can also be defined with cookies.
24
29
25
-
1. enable complex scenarios with few rules by using regex and server variables which capture dynamic values from incoming requests or responses and further enhances the functionality and appeal of the rules engine. Customers can combine values from different server variables and static strings to support more complex scenarios with fewer rules. We are continuously adding new features to accommodate a broader range of scenarios with greater flexibility.
26
-
This blog intends to discuss the new capabilities Azure Front Door supported recently, supported common use cases, and the configuration of the rules engine to achieve these use cases. We will also provide ARM templates to leverage these capabilities.
30
+
1. Rewrite URL paths or redirect requests to new destinations
31
+
32
+
1. Enable complex scenarios using regex and server variables: capture dynamic values from incoming requests or responses, and combine them with static strings or other variables.
33
+
34
+
This article covers common use cases supported by the rules engine, and how to configure these rules to meet your needs. It also includes Azure Resource Manager (ARM) template examples to help automate deployment of these capabilities.
0 commit comments