Skip to content

Commit 48a0d1f

Browse files
Merge pull request #211999 from jessie-jyy/patch-31
minor update to afd session affinity
2 parents 32b535c + c6682bb commit 48a0d1f

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/frontdoor/routing-methods.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ The lifetime of the cookie is the same as the user's session, as Front Door curr
9292
>
9393
> Public proxies may interfere with session affinity. This is because establishing a session requires Front Door to add a session affinity cookie to the response, which cannot be done if the response is cacheable as it would disrupt the cookies of other clients requesting the same resource. To protect against this, session affinity will **not** be established if the origin sends a cacheable response when this is attempted. If the session has already been established, it does not matter if the response from the origin is cacheable.
9494
>
95-
> Session affinity will be established in the following circumstances:
95+
> Session affinity will be established in the following circumstances beyond the standard non-cacheable scenarios:
9696
> - The response must include the `Cache-Control` header of *no-store*.
9797
> - If the response contains an `Authorization` header, it must not be expired.
9898
> - The response is an HTTP 302 status code.

0 commit comments

Comments
 (0)