Skip to content

Commit e7e50bb

Browse files
authored
Merge pull request #201376 from duongau/patch-6
Azure Front Door- Traffic routing methods - update session affinity section
2 parents 8159c74 + 27f1d8f commit e7e50bb

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/frontdoor/routing-methods.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ The weighted method enables some useful scenarios:
8383

8484
By default, without session affinity, Azure Front Door forwards requests originating from the same client to different origins. Certain stateful applications or in certain scenarios when ensuing requests from the same user prefers the same origin to process the initial request. The cookie-based session affinity feature is useful when you want to keep a user session on the same origin. When you use managed cookies with SHA256 of the origin URL as the identifier in the cookie, Azure Front Door can direct ensuing traffic from a user session to the same origin for processing.
8585

86-
Session affinity can be enabled the origin group level in Azure Front Door Standard and Premium tier and front end host level in Azure Front Door (classic) for each of your configured domains (or subdomains). Once enabled, Azure Front Door adds a cookie to the user's session. Cookie-based session affinity allows Front Door to identify different users even if behind the same IP address, which in turn allows a more even distribution of traffic between your different origins.
86+
Session affinity can be enabled the origin group level in Azure Front Door Standard and Premium tier and front end host level in Azure Front Door (classic) for each of your configured domains (or subdomains). Once enabled, Azure Front Door adds a cookie to the user's session. The cookies are called ASLBSA and ASLBSACORS. Cookie-based session affinity allows Front Door to identify different users even if behind the same IP address, which in turn allows a more even distribution of traffic between your different origins.
8787

8888
The lifetime of the cookie is the same as the user's session, as Front Door currently only supports session cookie.
8989

@@ -92,10 +92,10 @@ The lifetime of the cookie is the same as the user's session, as Front Door curr
9292
>
9393
> Public proxies may interfere with session affinity. This is because establishing a session requires Front Door to add a session affinity cookie to the response, which cannot be done if the response is cacheable as it would disrupt the cookies of other clients requesting the same resource. To protect against this, session affinity will **not** be established if the origin sends a cacheable response when this is attempted. If the session has already been established, it does not matter if the response from the origin is cacheable.
9494
>
95-
> Session affinity will be established in the following circumstances, **unless** the response has an HTTP 304 status code:
96-
> - The response has specific values set for the `Cache-Control` header that prevents caching, such as *private* or *no-store*.
97-
> - The response contains an `Authorization` header that has not expired.
98-
> - The response has an HTTP 302 status code.
95+
> Session affinity will be established in the following circumstances:
96+
> - The response must include the `Cache-Control` header of *no-store*.
97+
> - If the response contains an `Authorization` header, it must not be expired.
98+
> - The response is an HTTP 302 status code.
9999
100100
## Next steps
101101

0 commit comments

Comments
 (0)