Merge pull request #2340 from GuardRex/guardrex/data-protection-slot-keyring-update
Add slot details to behavioral defaults for Azure Appspull/2341/head
commit
591cbf16e3
|
@ -20,7 +20,7 @@ uid: security/data-protection/configuration/default-settings
|
||||||
|
|
||||||
The system tries to detect its operational environment and provide good zero-configuration behavioral defaults. The heuristic used is as follows.
|
The system tries to detect its operational environment and provide good zero-configuration behavioral defaults. The heuristic used is as follows.
|
||||||
|
|
||||||
1. If the system is being hosted in Azure Web Sites, keys are persisted to the "%HOME%\ASP.NET\DataProtection-Keys" folder. This folder is backed by network storage and is synchronized across all machines hosting the application. Keys are not protected at rest.
|
1. If the system is being hosted in Azure Web Sites, keys are persisted to the "%HOME%\ASP.NET\DataProtection-Keys" folder. This folder is backed by network storage and is synchronized across all machines hosting the application. Keys are not protected at rest. This folder supplies the key ring to all instances of an application in a single deployment slot. Separate deployment slots, such as Staging and Production, will not share a key ring. When you swap between deployment slots, for example swapping Staging to Production or using A/B testing, any system using data protection will not be able to decrypt stored data using the key ring inside the previous slot. This will lead to users being logged out of an ASP.NET application that uses the standard ASP.NET cookie middleware, as it uses data protection to protect its cookies. If you desire slot-independent key rings, use an external key ring provider, such as Azure Blob Storage, Azure Key Vault, a SQL store, or Redis cache.
|
||||||
|
|
||||||
2. If the user profile is available, keys are persisted to the "%LOCALAPPDATA%\ASP.NET\DataProtection-Keys" folder. Additionally, if the operating system is Windows, they'll be encrypted at rest using DPAPI.
|
2. If the user profile is available, keys are persisted to the "%LOCALAPPDATA%\ASP.NET\DataProtection-Keys" folder. Additionally, if the operating system is Windows, they'll be encrypted at rest using DPAPI.
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue