Skip to content

Commit 3c00881

Browse files
committed
fix broken links
1 parent a9ce06f commit 3c00881

File tree

4 files changed

+5
-5
lines changed

4 files changed

+5
-5
lines changed

articles/security/develop/threat-modeling-tool-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -224,7 +224,7 @@ ms.custom: devx-track-csharp
224224
| **SDL Phase** | Build |
225225
| **Applicable Technologies** | Generic |
226226
| **Attributes** | N/A |
227-
| **References** | [IdentityServer3 - The Big Picture](https://identityserver.github.io/Documentation/docsv2/overview/bigPicture.html) |
227+
| **References** | N/A |
228228
| **Steps** | <p>Below are the typical interactions supported by Identity Server:</p><ul><li>Browsers communicate with web applications</li><li>Web applications communicate with web APIs (sometimes on their own, sometimes on behalf of a user)</li><li>Browser-based applications communicate with web APIs</li><li>Native applications communicate with web APIs</li><li>Server-based applications communicate with web APIs</li><li>Web APIs communicate with web APIs (sometimes on their own, sometimes on behalf of a user)</li></ul>|
229229

230230
## <a id="override-token"></a>Override the default Identity Server token cache with a scalable alternative
@@ -235,7 +235,7 @@ ms.custom: devx-track-csharp
235235
| **SDL Phase** | Deployment |
236236
| **Applicable Technologies** | Generic |
237237
| **Attributes** | N/A |
238-
| **References** | [Identity Server Deployment - Caching](https://identityserver.github.io/Documentation/docsv2/advanced/deployment.html) |
238+
| **References** | N/A |
239239
| **Steps** | <p>IdentityServer has a simple built-in in-memory cache. While this is good for small scale native apps, it does not scale for mid tier and backend applications for the following reasons:</p><ul><li>These applications are accessed by many users at once. Saving all access tokens in the same store creates isolation issues and presents challenges when operating at scale: many users, each with as many tokens as the resources the app accesses on their behalf, can mean huge numbers and very expensive lookup operations</li><li>These applications are typically deployed on distributed topologies, where multiple nodes must have access to the same cache</li><li>Cached tokens must survive process recycles and deactivations</li><li>For all the above reasons, while implementing web apps, it is recommended to override the default Identity Server's token cache with a scalable alternative such as Azure Cache for Redis</li></ul>|
240240

241241
## <a id="binaries-signed"></a>Ensure that deployed application's binaries are digitally signed

articles/security/develop/threat-modeling-tool-communication-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ ms.custom: devx-track-csharp
7171
| **SDL Phase** | Deployment |
7272
| **Applicable Technologies** | Generic |
7373
| **Attributes** | N/A |
74-
| **References** | [IdentityServer3 - Keys, Signatures and Cryptography](https://identityserver.github.io/Documentation/docsv2/configuration/crypto.html), [IdentityServer3 - Deployment](https://identityserver.github.io/Documentation/docsv2/advanced/deployment.html) |
74+
| **References** | N/A |
7575
| **Steps** | By default, IdentityServer requires all incoming connections to come over HTTPS. It is absolutely mandatory that communication with IdentityServer is done over secured transports only. There are certain deployment scenarios like TLS offloading where this requirement can be relaxed. See the Identity Server deployment page in the references for more information. |
7676

7777
## <a id="x509-ssltls"></a>Verify X.509 certificates used to authenticate SSL, TLS, and DTLS connections

articles/security/develop/threat-modeling-tool-cryptography.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ As can be seen, the device primary key is not present in the code. Instead, it i
218218
| **SDL Phase** | Deployment |
219219
| **Applicable Technologies** | Generic |
220220
| **Attributes** | N/A |
221-
| **References** | [Identity Server - Keys, Signatures and Cryptography](https://identityserver.github.io/Documentation/docsv2/configuration/crypto.html) |
221+
| **References** | N/A |
222222
| **Steps** | Ensure that signing keys are rolled over when using Identity Server. The link in the references section explains how this should be planned without causing outages to applications relying on Identity Server. |
223223

224224
## <a id="client-server"></a>Ensure that cryptographically strong client ID, client secret are used in Identity Server

articles/security/develop/threat-modeling-tool-session-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ services.Configure<OpenIdConnectOptions>(OpenIdConnectDefaults.AuthenticationSch
123123
| **SDL Phase** | Build |
124124
| **Applicable Technologies** | Generic |
125125
| **Attributes** | N/A |
126-
| **References** | [IdentityServer3-Federated sign out](https://identityserver.github.io/Documentation/docsv2/advanced/federated-signout.html) |
126+
| **References** | N/A |
127127
| **Steps** | IdentityServer supports the ability to federate with external identity providers. When a user signs out of an upstream identity provider, depending upon the protocol used, it might be possible to receive a notification when the user signs out. It allows IdentityServer to notify its clients so they can also sign the user out. Check the documentation in the references section for the implementation details.|
128128

129129
## <a id="https-secure-cookies"></a>Applications available over HTTPS must use secure cookies

0 commit comments

Comments
 (0)