Skip to content

Commit 553d746

Browse files
committed
Merge branch 'main' into release-aio-m3
2 parents a39560f + 3cffc00 commit 553d746

File tree

95 files changed

+1948
-1423
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+1948
-1423
lines changed
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
title: Setting HTTPOnly or Secure flag for Session Affinity cookie
3+
titleSuffix: Azure Application Gateway
4+
description: Learn how to set HTTPOnly or Secure flag for Session Affinity cookie
5+
services: application-gateway
6+
author: jaesoni
7+
ms.service: azure-application-gateway
8+
ms.topic: how-to
9+
ms.date: 10/22/2024
10+
ms.author: jaysoni
11+
---
12+
13+
# Setting HTTPOnly or Secure flag for Session Affinity cookie
14+
In this guide you learn to create a Rewrite set for your Application Gateway and configure Secure and HttpOnly [ApplicationGatewayAffinity cookie](configuration-http-settings.md#cookie-based-affinity).
15+
16+
17+
## Prerequisites
18+
* You must have an Azure subscription. You can create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
19+
* An existing Application Gateway resource configured with at least one Listener, Rule, Backend Setting and Backend Pool configuration. If you don't have one, you can create one by following the [QuickStart guide](quick-create-portal.md).
20+
21+
## Creating a Rewrite set
22+
23+
1. Sign in to the Azure portal.
24+
1. Navigate to the required Application Gateway resource.
25+
1. Select Rewrites in the left pane.
26+
1. Select Rewrite set.
27+
1. Under the Name and Association tab
28+
1. Specify a name for this new rewrite set.
29+
1. Select the routing rules for which you wish to rewrite the ApplicationGatewayAffinity cookie's flag.
30+
1. Select Next.
31+
1. Select "Add rewrite rule"
32+
1. Enter a name for the rewrite rule.
33+
1. Enter a numeric value for Rule Sequence field.
34+
1. Select "Add condition"
35+
1. Now open the "If" condition box and use the following details.
36+
1. Type of variable to check - HTTP header
37+
1. Header type - Response header
38+
1. Header name - Common header
39+
1. Common header - Set-Cookie
40+
1. Case-sensitive - No
41+
1. Operator - equal (=)
42+
1. Pattern to match - (.*)
43+
1. To save these details, select **OK**.
44+
1. Go to the **Then** box to specify action details.
45+
1. Rewrite type - Response header
46+
1. Action type - Set
47+
1. Header name - Common header
48+
1. Common header - Set-Cookie
49+
1. Header value - {http_resp_Set-Cookie_1}; HttpOnly; Secure
50+
1. Select **OK**
51+
1. Select Update to save the rewrite set configurations.
52+
53+
54+
## Next steps
55+
[Visit other configurations of a Backend Setting](configuration-http-settings.md)

articles/application-gateway/rewrite-http-headers-url.md

Lines changed: 68 additions & 83 deletions
Large diffs are not rendered by default.

articles/application-gateway/rewrite-url-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: azure-application-gateway
77
ms.topic: how-to
8-
ms.date: 4/05/2021
8+
ms.date: 10/22/2024
99
ms.author: greglin
1010
---
1111

@@ -72,7 +72,7 @@ In the below example whenever the request URL contains */article*, the URL path
7272

7373
f. Enter a regular expression pattern. In this example, we'll use the pattern `.*article/(.*)/(.*)`
7474

75-
( ) is used to capture the substring for later use in composing the expression for rewriting the URL path. For more information, see [here](rewrite-http-headers-url.md#capturing).
75+
( ) is used to capture the substring for later use in composing the expression for rewriting the URL path. For more information, see [Pattern matching and capturing](rewrite-http-headers-url.md#pattern-matching-and-capturing).
7676

7777
g. Select **OK**.
7878

articles/application-gateway/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -267,6 +267,8 @@
267267
href: add-http-header-rewrite-rule-powershell.md
268268
- name: Create and rewrite HTTP headers
269269
href: tutorial-http-header-rewrite-powershell.md
270+
- name: Add secure flag for cookies
271+
href: application-gateway-secure-flag-session-affinity.md
270272
- name: URL rewrite
271273
items:
272274
- name: Azure portal

articles/azure-app-configuration/use-key-vault-references-spring-boot.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -94,10 +94,10 @@ To add a secret to the vault, you need to take just a few additional steps. In t
9494
9595
```json
9696
{
97-
"clientId": "00000000-0000-0000-0000-000000000000",
98-
"clientSecret": "00000000-0000-0000-0000-000000000000",
99-
"subscriptionId": "00000000-0000-0000-0000-000000000000",
100-
"tenantId": "00000000-0000-0000-0000-000000000000",
97+
"clientId": "00001111-aaaa-2222-bbbb-3333cccc4444",
98+
"clientSecret": "aaaaaaaa-0b0b-1c1c-2d2d-333333333333",
99+
"subscriptionId": "aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e",
100+
"tenantId": "aaaabbbb-0000-cccc-1111-dddd2222eeee",
101101
"activeDirectoryEndpointUrl": "https://login.microsoftonline.com",
102102
"resourceManagerEndpointUrl": "https://management.azure.com/",
103103
"sqlManagementEndpointUrl": "https://management.core.windows.net:8443/",

articles/azure-functions/flex-consumption-plan.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -147,6 +147,7 @@ Keep these other considerations in mind when using Flex Consumption plan during
147147
+ **Diagnostic settings**: Diagnostic settings are not currently supported.
148148
+ **Certificates**: Loading certificates with the WEBSITE_LOAD_CERTIFICATES app setting is currently not supported.
149149
+ **Key Vault References**: Key Vault references in app settings do not work when Key Vault is network access restricted, even if the function app has Virtual Network integration. The current workaround is to directly reference the Key Vault in code and read the required secrets.
150+
+ **Azure Files file share mount**: [Mounting an Azure Files file share](./scripts/functions-cli-mount-files-storage-linux.md) does not work when the function app has Virtual Network integration.
150151

151152
## Related articles
152153

articles/azure-government/azure-secure-isolation-guidance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ You can also use the [Azure Key Vault solution in Azure Monitor](/azure/key-vaul
159159
#### Vault
160160
**[Vaults](/azure/key-vault/general/overview)** provide a multi-tenant, low-cost, easy to deploy, zone-resilient (where available), and highly available key management solution suitable for most common cloud application scenarios. Vaults can store and safeguard [secrets, keys, and certificates](/azure/key-vault/general/about-keys-secrets-certificates). They can be either software-protected (standard tier) or HSM-protected (premium tier). For a comparison between the standard and premium tiers, see the [Azure Key Vault pricing page](https://azure.microsoft.com/pricing/details/key-vault/). Software-protected secrets, keys, and certificates are safeguarded by Azure, using industry-standard algorithms and key lengths. If you require extra assurances, you can choose to safeguard your secrets, keys, and certificates in vaults protected by multi-tenant HSMs. The corresponding HSMs are validated according to the [FIPS 140 standard](/azure/compliance/offerings/offering-fips-140-2), and have an overall Security Level 2 rating, which includes requirements for physical tamper evidence and role-based authentication.
161161

162-
Vaults enable support for [customer-managed keys](../security/fundamentals/encryption-models.md) (CMK) where you can control your own keys in HSMs, and use them to encrypt data at rest for [many Azure services](../security/fundamentals/encryption-models.md#supporting-services). As mentioned previously, you can [import or generate encryption keys](/azure/key-vault/keys/hsm-protected-keys) in HSMs ensuring that keys never leave the HSM boundary to support *bring your own key (BYOK)* scenarios.
162+
Vaults enable support for [customer-managed keys](../security/fundamentals/encryption-models.md) (CMK) where you can control your own keys in HSMs, and use them to encrypt data at rest for [many Azure services](../security/fundamentals/encryption-models.md#services-supporting-customer-managed-keys-cmks). As mentioned previously, you can [import or generate encryption keys](/azure/key-vault/keys/hsm-protected-keys) in HSMs ensuring that keys never leave the HSM boundary to support *bring your own key (BYOK)* scenarios.
163163

164164
Key Vault can handle requesting and renewing certificates in vaults, including Transport Layer Security (TLS) certificates, enabling you to enroll and automatically renew certificates from supported public Certificate Authorities. Key Vault certificates support provides for the management of your X.509 certificates, which are built on top of keys and provide an automated renewal feature. Certificate owner can [create a certificate](/azure/key-vault/certificates/create-certificate) through Azure Key Vault or by importing an existing certificate. Both self-signed and Certificate Authority generated certificates are supported. Moreover, the Key Vault certificate owner can implement secure storage and management of X.509 certificates without interaction with private keys.
165165

@@ -179,7 +179,7 @@ When a managed HSM is created, the requestor also provides a list of data plane
179179
> [!IMPORTANT]
180180
> Unlike with key vaults, granting your users management plane access to a managed HSM doesn't grant them any access to data plane to access keys or data plane role assignments managed HSM local RBAC. This isolation is implemented by design to prevent inadvertent expansion of privileges affecting access to keys stored in managed HSMs.
181181
182-
As mentioned previously, managed HSM supports [importing keys generated](/azure/key-vault/managed-hsm/hsm-protected-keys-byok) in your on-premises HSMs, ensuring the keys never leave the HSM protection boundary, also known as *bring your own key (BYOK)* scenario. Managed HSM supports integration with Azure services such as [Azure Storage](../storage/common/customer-managed-keys-overview.md), [Azure SQL Database](/azure/azure-sql/database/transparent-data-encryption-byok-overview), [Azure Information Protection](/azure/information-protection/byok-price-restrictions), and others. For a more complete list of Azure services that work with Managed HSM, see [Data encryption models](../security/fundamentals/encryption-models.md#supporting-services).
182+
As mentioned previously, managed HSM supports [importing keys generated](/azure/key-vault/managed-hsm/hsm-protected-keys-byok) in your on-premises HSMs, ensuring the keys never leave the HSM protection boundary, also known as *bring your own key (BYOK)* scenario. Managed HSM supports integration with Azure services such as [Azure Storage](../storage/common/customer-managed-keys-overview.md), [Azure SQL Database](/azure/azure-sql/database/transparent-data-encryption-byok-overview), [Azure Information Protection](/azure/information-protection/byok-price-restrictions), and others. For a more complete list of Azure services that work with Managed HSM, see [Data encryption models](../security/fundamentals/encryption-models.md#services-supporting-customer-managed-keys-cmks).
183183

184184
Managed HSM enables you to use the established Azure Key Vault API and management interfaces. You can use the same application development and deployment patterns for all your applications irrespective of the key management solution: multi-tenant vault or single-tenant managed HSM.
185185

articles/azure-signalr/howto-enable-geo-replication.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -192,3 +192,13 @@ Specifically, if your application typically broadcasts to larger groups (size >1
192192
To ensure effective failover management, it is recommended to set each replica's unit size to handle all traffic. Alternatively, you could enable [autoscaling](signalr-howto-scale-autoscale.md) to manage this.
193193

194194
For more performance evaluation, refer to [Performance](signalr-concept-performance.md).
195+
196+
## Non-Inherited and Inherited Configurations
197+
Replicas inherit most configurations from the primary resource; however, some settings must be configured directly on the replicas. Below is the list of those configurations:
198+
199+
1. **SKU**: Each replica has its own SKU name and unit size. The autoscaling rules for replicas must be configured separately based on their individual metrics.
200+
2. **Shared private endpoints**: While shared private endpoints are automatically replicated to replicas, separate approvals are required on target private link resources. To add or remove shared private endpoints, manage them on the primary resource. **Do not** enable the replica until its shared private endpoint has been approved.
201+
3. **Log Destination Settings**. If not configured on the replicas, only logs from the primary resource will be transferred.
202+
4. **Alerts**.
203+
204+
All other configurations are inherited from the primary resource. For example, access keys, identity, application firewall, custom domains, private endpoints, and access control.

articles/azure-web-pubsub/howto-enable-geo-replication.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -200,4 +200,14 @@ To ensure effective failover management, it is recommended to set each replica's
200200

201201
For more performance evaluation, refer to [Performance](concept-performance.md).
202202

203+
## Non-Inherited and Inherited Configurations
204+
Replicas inherit most configurations from the primary resource; however, some settings must be configured directly on the replicas. Below is the list of those configurations:
205+
206+
1. **SKU**: Each replica has its own SKU name and unit size. The autoscaling rules for replicas must be configured separately based on their individual metrics.
207+
2. **Shared private endpoints**: While shared private endpoints are automatically replicated to replicas, separate approvals are required on target private link resources. To add or remove shared private endpoints, manage them on the primary resource. **Do not** enable the replica until its shared private endpoint has been approved.
208+
3. **Log Destination Settings**. If not configured on the replicas, only logs from the primary resource will be transferred.
209+
4. **Alerts**.
210+
211+
All other configurations are inherited from the primary resource. For example, access keys, identity, application firewall, custom domains, private endpoints, and access control.
212+
203213

articles/communication-services/concepts/rooms/room-concept.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ Rooms are created and managed via rooms APIs or SDKs. Use the rooms API/SDKs in
146146
| Virtual Rooms SDKs | 2023-06-14 | Generally Available - Fully supported |
147147
| Virtual Rooms SDKs | 2023-10-30 | Public Preview - Fully supported |
148148
| Virtual Rooms SDKs | 2023-03-31 | Public Preview - retired |
149-
| Virtual Rooms SDKs | 2022-02-01 | Will be retired on April 30, 2024 |
149+
| Virtual Rooms SDKs | 2022-02-01 | Public Preview - retired |
150150
| Virtual Rooms SDKs | 2021-04-07 | Public Preview - retired |
151151

152152
## Predefined participant roles and permissions in Virtual Rooms calls

0 commit comments

Comments
 (0)