You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/overview-authentication.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,7 +75,7 @@ By default, Azure AD blocks weak passwords such as *Password1*. A global banned
75
75
76
76
To increase security, you can define custom password protection policies. These policies can use filters to block any variation of a password containing a name such as *Contoso* or a location like *London*, for example.
77
77
78
-
For hybrid security, you can integrate Azure AD password protection with an on-premises Active Directory environment. A component installed in the on-prem environment receives the global banned password list and custom password protection policies from Azure AD, and domain controllers use them to process password change events. This hybrid approach makes sure that no matter how or where a user changes their credentials, you enforce the use of strong passwords.
78
+
For hybrid security, you can integrate Azure AD password protection with an on-premises Active Directory environment. A component installed in the on-premises environment receives the global banned password list and custom password protection policies from Azure AD, and domain controllers use them to process password change events. This hybrid approach makes sure that no matter how or where a user changes their credentials, you enforce the use of strong passwords.
79
79
80
80
## Passwordless authentication
81
81
@@ -114,7 +114,7 @@ Persistent session tokens are stored as persistent cookies on the web browser's
114
114
| clrc | Common | Client-side cookie (set by JavaScript) to control local cached sessions on the client. |
115
115
| CkTst | Common | Client-side cookie (set by JavaScript). No longer in active use. |
116
116
| wlidperf | Common | Client-side cookie (set by JavaScript) that tracks local time for performance purposes. |
117
-
| x-ms-gateway-slice | Common | Azure AD Gateway cookie used for trackind and load balance purposes. |
117
+
| x-ms-gateway-slice | Common | Azure AD Gateway cookie used for tracking and load balance purposes. |
118
118
| stsservicecookie | Common | Azure AD Gateway cookie also used for tracking purposes. |
119
119
| x-ms-refreshtokencredential | Specific | Available when [Primary Refresh Token (PRT)](/azure/active-directory/devices/concept-primary-refresh-token) is in use. |
120
120
| estsStateTransient | Specific | Applicable to new session information model only. Transient. |
@@ -130,10 +130,10 @@ Persistent session tokens are stored as persistent cookies on the web browser's
130
130
| debug | Specific | Cookie used to track if user's browser session is enabled for DebugMode. |
131
131
| MSFPC | Specific | This cookie is not specific to any ESTS flow, but is sometimes present. It applies to all Microsoft Sites (when accepted by users). Identifies unique web browsers visiting Microsoft sites. It's used for advertising, site analytics, and other operational purposes. |
132
132
133
-
Notes:
134
-
Cookies identified as client-side cookies are set locally on the client device by JavaScript, hence, will be marked with HttpOnly=false.
135
-
136
-
Cookie definitions and respective names are subject to change at any moment in time according to Azure AD service requirements.
133
+
> [!NOTE]
134
+
> Cookies identified as client-side cookies are set locally on the client device by JavaScript, hence, will be marked with HttpOnly=false.
135
+
>
136
+
> Cookie definitions and respective names are subject to change at any moment in time according to Azure AD service requirements.
0 commit comments