-
Notifications
You must be signed in to change notification settings - Fork 25.1k
Closed
Closed
Copy link
Labels
Source - Docs.msDocs Customer feedback via GitHub IssueDocs Customer feedback via GitHub Issuedoc-enhancementseQUESTeredIdentifies that an issue has been imported into Quest.Identifies that an issue has been imported into Quest.
Description
Initially I used the "Synchronizer Token Pattern (STP)" pattern described in the docs under "Antiforgery in ASP.NET Core". This led to issues for any users that use my website from multiple tabs, due to STP enforcing page load order (only POST made by the most recently loaded page would work properly).
I think the documentation could be improved by explaining more about this behavior, and recommending that in cases where you don't want to enforce page load ordering, the cookie to header pattern, (also documented but not named) or another CSRF protection pattern, may be suitable. I am happy to make this change myself.
Document Details
⚠ Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.
- ID: 47b14f57-82ac-a2e2-cbc7-22a81a60f4ac
- Version Independent ID: bffca13c-223f-c61f-9cb2-9da8811eecfa
- Content: Prevent Cross-Site Request Forgery (XSRF/CSRF) attacks in ASP.NET Core
- Content Source: aspnetcore/security/anti-request-forgery.md
- Product: aspnet-core
- Technology: aspnetcore-security
- GitHub Login: @Rick-Anderson
- Microsoft Alias: riande
Metadata
Metadata
Assignees
Labels
Source - Docs.msDocs Customer feedback via GitHub IssueDocs Customer feedback via GitHub Issuedoc-enhancementseQUESTeredIdentifies that an issue has been imported into Quest.Identifies that an issue has been imported into Quest.