Hi @AzurePro
1. No Concurrent Session Control :
Azure Application Gateway supports session affinity feature to keep the user session on the same server, but it can't handle itself to enforce a "single device login" policy or session management directly. To achieve this, you need to implement session management and token-based authentication within your application backend to effectively manage user sessions across devices.
2. Unrestricted Upload of File with Dangerous Type -
In Application Gateway with Web Application Firewall feature, you can set up the WAF rules to block certain file extensions. You can Create a custom rule that inspects file uploads and blocks the certain file extensions like .exe, .bat, etc.
Steps to configure the custom rule in WAF:
- Navigate to your Application Gateway WAF policy in the Azure portal.
- Under Custom Rules, create a rule to block dangerous file extensions:
- Rule Name: BlockExecutableUploads
- Priority: 100
- Condition: Check RequestUri for file extensions (e.g., .*.(exe|bat|dll|ps1)$).
- Action: Deny Traffic
- Condition: Check RequestUri for file extensions (e.g., .*.(exe|bat|dll|ps1)$).
- Priority: 100
- Rule Name: BlockExecutableUploads
Example:-
3. Use of Web Browser Cache Containing Sensitive Information
In Azure Application Gateway, there's an option to rewrite headers to add the Cache-Control: no-store to http responses. Below are the steps to configure on the Application Gateway Rewrite rule.
- Navigate to your Application Gateway in the Azure portal.
- Under Rewrite Rules, create a rule to add the Cache-Control header:
- Rule Name: AddCacheControlHeader
- Action: Set response header
- Header Name: Cache-Control
- Header Value: no-store
4. Improper Restriction of Rendered UI Layers or Frames
Similar to the cache issue, this requires setting an additional response header. Again, using Application Gateway's rewrite rules to add X-Frame-Options: DENY. Steps to add X-Frame Options to set Deny. Create a rewrite rule to add X-Frame-Options: DENY:
- Rule Name: AddXFrameOptionsHeader
- Action: Set response header
- Header Name: X-Frame-Options
- Header Value: DENY
I hope this has been helpful!
Your feedback is important so please take a moment to accept answers. If you still have questions, pleaslet us know what is needed in the comments so the question can be answered. Thank you for helping to improve Microsoft Q&A!
Please accept an answer if correct. Original posters help the community find answers faster by identifying the correct answer. Here is how.