Skip to content

Commit 83553e2

Browse files
Fixing blockers
1 parent bc43401 commit 83553e2

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/authentication/overview-authentication.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ By default, Azure AD blocks weak passwords such as *Password1*. A global banned
7575

7676
To increase security, you can define custom password protection policies. These policies can use filters to block any variation of a password containing a name such as *Contoso* or a location like *London*, for example.
7777

78-
For hybrid security, you can integrate Azure AD password protection with an on-premises Active Directory environment. A component installed in the on-prem environment receives the global banned password list and custom password protection policies from Azure AD, and domain controllers use them to process password change events. This hybrid approach makes sure that no matter how or where a user changes their credentials, you enforce the use of strong passwords.
78+
For hybrid security, you can integrate Azure AD password protection with an on-premises Active Directory environment. A component installed in the on-premises environment receives the global banned password list and custom password protection policies from Azure AD, and domain controllers use them to process password change events. This hybrid approach makes sure that no matter how or where a user changes their credentials, you enforce the use of strong passwords.
7979

8080
## Passwordless authentication
8181

@@ -114,7 +114,7 @@ Persistent session tokens are stored as persistent cookies on the web browser's
114114
| clrc | Common | Client-side cookie (set by JavaScript) to control local cached sessions on the client. |
115115
| CkTst | Common | Client-side cookie (set by JavaScript). No longer in active use. |
116116
| wlidperf | Common | Client-side cookie (set by JavaScript) that tracks local time for performance purposes. |
117-
| x-ms-gateway-slice | Common | Azure AD Gateway cookie used for trackind and load balance purposes. |
117+
| x-ms-gateway-slice | Common | Azure AD Gateway cookie used for tracking and load balance purposes. |
118118
| stsservicecookie | Common | Azure AD Gateway cookie also used for tracking purposes. |
119119
| x-ms-refreshtokencredential | Specific | Available when [Primary Refresh Token (PRT)](/azure/active-directory/devices/concept-primary-refresh-token) is in use. |
120120
| estsStateTransient | Specific | Applicable to new session information model only. Transient. |
@@ -130,10 +130,10 @@ Persistent session tokens are stored as persistent cookies on the web browser's
130130
| debug | Specific | Cookie used to track if user's browser session is enabled for DebugMode. |
131131
| MSFPC | Specific | This cookie is not specific to any ESTS flow, but is sometimes present. It applies to all Microsoft Sites (when accepted by users). Identifies unique web browsers visiting Microsoft sites. It's used for advertising, site analytics, and other operational purposes. |
132132

133-
Notes:
134-
Cookies identified as client-side cookies are set locally on the client device by JavaScript, hence, will be marked with HttpOnly=false.
135-
136-
Cookie definitions and respective names are subject to change at any moment in time according to Azure AD service requirements.
133+
> [!NOTE]
134+
> Cookies identified as client-side cookies are set locally on the client device by JavaScript, hence, will be marked with HttpOnly=false.
135+
>
136+
> Cookie definitions and respective names are subject to change at any moment in time according to Azure AD service requirements.
137137
138138
## Next steps
139139

0 commit comments

Comments
 (0)