Skip to content

Commit d59a477

Browse files
Merge pull request #278527 from anthonychu/patch-25
[Container Apps] Add warning for session identifiers
2 parents e2fe851 + 1f08a99 commit d59a477

File tree

1 file changed

+14
-0
lines changed

1 file changed

+14
-0
lines changed

articles/container-apps/sessions.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,20 @@ You pass the session identifier in a query parameter named `identifier` in the U
7575

7676
For code interpreter sessions, you can also use an integration with an [LLM framework](./sessions-code-interpreter.md#llm-framework-integrations). The framework handles the token generation and management for you. Ensure that the application is configured with a managed identity that has the necessary role assignments on the session pool.
7777

78+
##### Protecting session identifiers
79+
80+
The session identifier is sensitive information which requires a secure process as you create and manage its value. To protect this value, your application must ensure each user or tenant only has access to their own sessions.
81+
82+
The specific strategies that prevent misuse of session identifiers differ depending on the design and architecture of your app. However, your app must always have complete control over the creation and use of session identifiers so that a malicious user can't access another user's session.
83+
84+
Example strategies include:
85+
86+
* **One session per user**: If your app uses one session per user, each user must be securely authenticated, and your app must use a unique session identifier for each logged in user.
87+
* **One session per agent conversation**: If your app uses one session per AI agent conversation, ensure your app uses a unique session identifier for each conversation that can't be modified by the end user.
88+
89+
> [!IMPORTANT]
90+
> Failure to secure access to sessions may result in misuse or unauthorized access to data stored in your users' sessions.
91+
7892
### Authentication
7993

8094
Authentication is handled using Microsoft Entra (formerly Azure Active Directory) tokens. Valid Microsoft Entra tokens are generated by an identity belonging to the *Azure ContainerApps Session Executor* and *Contributor* roles on the session pool.

0 commit comments

Comments
 (0)