You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Line 41: Added IoT Enterprise here as it is in the same device category as Desktop whereas
Line 44: IoT was too generic and applies only to IoT Core and not IoT Enterprise
Line 211: Fixing MD warning that calls for a blank line proceeding a bulleted list
Line 226: Fixing MD warning that calls for a trailing blank line at the end of an article
Desktop| Enable inside Dev Mode | 50080\* | 50043\* | N/A | [Set up Windows DevicePortal on a Desktop device](device-portal-desktop.md#set-up-windows-device-portal-on-a-desktop-device) |
41
+
Desktop and IoT Enterprise| Enable inside Dev Mode | 50080\* | 50043\* | N/A | [Device Portal for Desktop or IoT Enterprise device](device-portal-desktop.md#set-up-windows-device-portal-on-a-desktop-device) |
42
42
Xbox | Enable inside Dev Mode | Disabled | 11443 | N/A | [Device Portal for Xbox](../xbox-apps/device-portal-xbox.md) |
43
43
HoloLens | Yes, in Dev Mode | 80 (default) | 443 (default) | `http://127.0.0.1:10080` | [Device Portal for HoloLens](/windows/mixed-reality/develop/platform-capabilities-and-apis/using-the-windows-device-portal) |
44
-
IoT| Yes, in Dev Mode | 8080 | Enable via regkey | N/A | [Device Portal for IoT](/windows/iot-core/manage-your-device/DevicePortal) |
44
+
IoT Core| Yes, in Dev Mode | 8080 | Enable via regkey | N/A | [Device Portal for IoT Core](/windows/iot-core/manage-your-device/DevicePortal) |
45
45
Phone | Enable inside Dev Mode | 80| 443 | `http://127.0.0.1:10080` | [Device Portal for Mobile](device-portal-mobile.md) |
46
46
47
47
\* This is not always the case, as Device Portal on desktop claims ports in the ephemeral range (>50,000) to prevent collisions with existing port claims on the device. To learn more, see the [Registry-based configuration](device-portal-desktop.md#registry-based-configuration) section in [Windows Device Portal for Desktop](device-portal-desktop.md).
@@ -211,6 +211,7 @@ In order to protect against [CSRF attacks](https://en.wikipedia.org/wiki/Cross-s
211
211
212
212
> [!IMPORTANT]
213
213
> This protection prevents usages of the REST APIs from a standalone client (such as command-line utilities). This can be solved in 3 ways:
214
+
>
214
215
> - Use an "auto-" username. Clients that prepend "auto-" to their username will bypass CSRF protection. It is important that this username not be used to log in to Device Portal through the browser, as it will open up the service to CSRF attacks. Example: If Device Portal's username is "admin", ```curl -u auto-admin:password <args>``` should be used to bypass CSRF protection.
215
216
> - Implement the cookie-to-header scheme in the client. This requires a GET request to establish the session cookie, and then the inclusion of both the header and the cookie on all subsequent requests.
216
217
> - Disable authentication and use HTTP. CSRF protection only applies to HTTPS endpoints, so connections on HTTP endpoints will not need to do either of the above.
@@ -221,4 +222,4 @@ To protect against [CSWSH attacks](https://www.christian-schneider.net/CrossSite
221
222
222
223
## See also
223
224
224
-
[Device Portal core API reference](device-portal-api-core.md)
225
+
[Device Portal core API reference](device-portal-api-core.md)
0 commit comments