Skip to content

Commit aa7bf11

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nw-vnetflow
2 parents d69dacc + 3e1eb8a commit aa7bf11

File tree

115 files changed

+2672
-1577
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

115 files changed

+2672
-1577
lines changed
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
title: Setting HTTPOnly or Secure flag for Session Affinity cookie
3+
titleSuffix: Azure Application Gateway
4+
description: Learn how to set HTTPOnly or Secure flag for Session Affinity cookie
5+
services: application-gateway
6+
author: jaesoni
7+
ms.service: azure-application-gateway
8+
ms.topic: how-to
9+
ms.date: 10/22/2024
10+
ms.author: jaysoni
11+
---
12+
13+
# Setting HTTPOnly or Secure flag for Session Affinity cookie
14+
In this guide you learn to create a Rewrite set for your Application Gateway and configure Secure and HttpOnly [ApplicationGatewayAffinity cookie](configuration-http-settings.md#cookie-based-affinity).
15+
16+
17+
## Prerequisites
18+
* You must have an Azure subscription. You can create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
19+
* An existing Application Gateway resource configured with at least one Listener, Rule, Backend Setting and Backend Pool configuration. If you don't have one, you can create one by following the [QuickStart guide](quick-create-portal.md).
20+
21+
## Creating a Rewrite set
22+
23+
1. Sign in to the Azure portal.
24+
1. Navigate to the required Application Gateway resource.
25+
1. Select Rewrites in the left pane.
26+
1. Select Rewrite set.
27+
1. Under the Name and Association tab
28+
1. Specify a name for this new rewrite set.
29+
1. Select the routing rules for which you wish to rewrite the ApplicationGatewayAffinity cookie's flag.
30+
1. Select Next.
31+
1. Select "Add rewrite rule"
32+
1. Enter a name for the rewrite rule.
33+
1. Enter a numeric value for Rule Sequence field.
34+
1. Select "Add condition"
35+
1. Now open the "If" condition box and use the following details.
36+
1. Type of variable to check - HTTP header
37+
1. Header type - Response header
38+
1. Header name - Common header
39+
1. Common header - Set-Cookie
40+
1. Case-sensitive - No
41+
1. Operator - equal (=)
42+
1. Pattern to match - (.*)
43+
1. To save these details, select **OK**.
44+
1. Go to the **Then** box to specify action details.
45+
1. Rewrite type - Response header
46+
1. Action type - Set
47+
1. Header name - Common header
48+
1. Common header - Set-Cookie
49+
1. Header value - {http_resp_Set-Cookie_1}; HttpOnly; Secure
50+
1. Select **OK**
51+
1. Select Update to save the rewrite set configurations.
52+
53+
54+
## Next steps
55+
[Visit other configurations of a Backend Setting](configuration-http-settings.md)
2.41 KB
Loading

articles/application-gateway/rewrite-http-headers-url.md

Lines changed: 68 additions & 83 deletions
Large diffs are not rendered by default.

articles/application-gateway/rewrite-url-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: azure-application-gateway
77
ms.topic: how-to
8-
ms.date: 4/05/2021
8+
ms.date: 10/22/2024
99
ms.author: greglin
1010
---
1111

@@ -72,7 +72,7 @@ In the below example whenever the request URL contains */article*, the URL path
7272

7373
f. Enter a regular expression pattern. In this example, we'll use the pattern `.*article/(.*)/(.*)`
7474

75-
( ) is used to capture the substring for later use in composing the expression for rewriting the URL path. For more information, see [here](rewrite-http-headers-url.md#capturing).
75+
( ) is used to capture the substring for later use in composing the expression for rewriting the URL path. For more information, see [Pattern matching and capturing](rewrite-http-headers-url.md#pattern-matching-and-capturing).
7676

7777
g. Select **OK**.
7878

articles/application-gateway/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -267,6 +267,8 @@
267267
href: add-http-header-rewrite-rule-powershell.md
268268
- name: Create and rewrite HTTP headers
269269
href: tutorial-http-header-rewrite-powershell.md
270+
- name: Add secure flag for cookies
271+
href: application-gateway-secure-flag-session-affinity.md
270272
- name: URL rewrite
271273
items:
272274
- name: Azure portal

articles/azure-government/azure-secure-isolation-guidance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ You can also use the [Azure Key Vault solution in Azure Monitor](/azure/key-vaul
159159
#### Vault
160160
**[Vaults](/azure/key-vault/general/overview)** provide a multi-tenant, low-cost, easy to deploy, zone-resilient (where available), and highly available key management solution suitable for most common cloud application scenarios. Vaults can store and safeguard [secrets, keys, and certificates](/azure/key-vault/general/about-keys-secrets-certificates). They can be either software-protected (standard tier) or HSM-protected (premium tier). For a comparison between the standard and premium tiers, see the [Azure Key Vault pricing page](https://azure.microsoft.com/pricing/details/key-vault/). Software-protected secrets, keys, and certificates are safeguarded by Azure, using industry-standard algorithms and key lengths. If you require extra assurances, you can choose to safeguard your secrets, keys, and certificates in vaults protected by multi-tenant HSMs. The corresponding HSMs are validated according to the [FIPS 140 standard](/azure/compliance/offerings/offering-fips-140-2), and have an overall Security Level 2 rating, which includes requirements for physical tamper evidence and role-based authentication.
161161

162-
Vaults enable support for [customer-managed keys](../security/fundamentals/encryption-models.md) (CMK) where you can control your own keys in HSMs, and use them to encrypt data at rest for [many Azure services](../security/fundamentals/encryption-models.md#supporting-services). As mentioned previously, you can [import or generate encryption keys](/azure/key-vault/keys/hsm-protected-keys) in HSMs ensuring that keys never leave the HSM boundary to support *bring your own key (BYOK)* scenarios.
162+
Vaults enable support for [customer-managed keys](../security/fundamentals/encryption-models.md) (CMK) where you can control your own keys in HSMs, and use them to encrypt data at rest for [many Azure services](../security/fundamentals/encryption-models.md#services-supporting-customer-managed-keys-cmks). As mentioned previously, you can [import or generate encryption keys](/azure/key-vault/keys/hsm-protected-keys) in HSMs ensuring that keys never leave the HSM boundary to support *bring your own key (BYOK)* scenarios.
163163

164164
Key Vault can handle requesting and renewing certificates in vaults, including Transport Layer Security (TLS) certificates, enabling you to enroll and automatically renew certificates from supported public Certificate Authorities. Key Vault certificates support provides for the management of your X.509 certificates, which are built on top of keys and provide an automated renewal feature. Certificate owner can [create a certificate](/azure/key-vault/certificates/create-certificate) through Azure Key Vault or by importing an existing certificate. Both self-signed and Certificate Authority generated certificates are supported. Moreover, the Key Vault certificate owner can implement secure storage and management of X.509 certificates without interaction with private keys.
165165

@@ -179,7 +179,7 @@ When a managed HSM is created, the requestor also provides a list of data plane
179179
> [!IMPORTANT]
180180
> Unlike with key vaults, granting your users management plane access to a managed HSM doesn't grant them any access to data plane to access keys or data plane role assignments managed HSM local RBAC. This isolation is implemented by design to prevent inadvertent expansion of privileges affecting access to keys stored in managed HSMs.
181181
182-
As mentioned previously, managed HSM supports [importing keys generated](/azure/key-vault/managed-hsm/hsm-protected-keys-byok) in your on-premises HSMs, ensuring the keys never leave the HSM protection boundary, also known as *bring your own key (BYOK)* scenario. Managed HSM supports integration with Azure services such as [Azure Storage](../storage/common/customer-managed-keys-overview.md), [Azure SQL Database](/azure/azure-sql/database/transparent-data-encryption-byok-overview), [Azure Information Protection](/azure/information-protection/byok-price-restrictions), and others. For a more complete list of Azure services that work with Managed HSM, see [Data encryption models](../security/fundamentals/encryption-models.md#supporting-services).
182+
As mentioned previously, managed HSM supports [importing keys generated](/azure/key-vault/managed-hsm/hsm-protected-keys-byok) in your on-premises HSMs, ensuring the keys never leave the HSM protection boundary, also known as *bring your own key (BYOK)* scenario. Managed HSM supports integration with Azure services such as [Azure Storage](../storage/common/customer-managed-keys-overview.md), [Azure SQL Database](/azure/azure-sql/database/transparent-data-encryption-byok-overview), [Azure Information Protection](/azure/information-protection/byok-price-restrictions), and others. For a more complete list of Azure services that work with Managed HSM, see [Data encryption models](../security/fundamentals/encryption-models.md#services-supporting-customer-managed-keys-cmks).
183183

184184
Managed HSM enables you to use the established Azure Key Vault API and management interfaces. You can use the same application development and deployment patterns for all your applications irrespective of the key management solution: multi-tenant vault or single-tenant managed HSM.
185185

0 commit comments

Comments
 (0)