Skip to content

Commit 4d93a4f

Browse files
authored
Merge pull request #102258 from hpsin/patch-52
Update reference-breaking-changes.md
2 parents f3b5ed5 + 031c9b3 commit 4d93a4f

File tree

1 file changed

+15
-2
lines changed

1 file changed

+15
-2
lines changed

articles/active-directory/develop/reference-breaking-changes.md

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: conceptual
17-
ms.date: 08/28/2019
17+
ms.date: 1/24/2020
1818
ms.author: ryanwi
1919
ms.reviewer: hirsin
2020
ms.custom: aaddev
@@ -36,7 +36,20 @@ The authentication system alters and adds features on an ongoing basis to improv
3636
3737
## Upcoming changes
3838

39-
September 2019: Additional enforcement of POST semantics according to URL parsing rules - duplicate parameters will trigger an error and [BOM](https://www.w3.org/International/questions/qa-byte-order-mark) ignored.
39+
None scheduled at this time. Please see below for the changes that are in or are coming to production.
40+
41+
## February 2020:
42+
43+
### Empty fragments will be appended to every HTTP redirect from the login endpoint.
44+
45+
**Effective date**: February 8, 2020
46+
47+
**Endpoints impacted**: Both v1.0 and v2.0
48+
49+
**Protocol impacted**: OAuth and OIDC flows that use response_type=query - this covers the [authorization code flow](v2-oauth2-auth-code-flow.md) in some cases, and the [implicit flow](v2-oauth2-implicit-grant-flow.md).
50+
51+
When an authentication response is sent from login.microsoftonline.com to an application via HTTP redirect, the service will append an empty fragment to the reply URL. This prevents a class of redirect attacks by ensuring that the browser wipes out any existing fragment in the authentication request. No apps should have a dependency on this behavior.
52+
4053

4154
## August 2019
4255

0 commit comments

Comments
 (0)