Cross Site Request Forgery - Why my connection is blocked?
- naveenvarthaanelan
- Apr 8, 2022
- 1 min read
Updated: Sep 27, 2022
Passwords that you have saved in your online browsers might allow an attacker to submit queries using the remembered password.

Welcome to your blog post. Use this space to connect with your readers and potential customers in a way that’s current and interesting. Think of it as an ongoing conversation where you can share updates about business, trends, news, and more.
X-CSRF-Signature header
“Guard against a specific kind of attack on your Azure SQL Servers”
This header was developed and verified to guard against a specific kind of attack on your Azure SQL Servers. Particularly, certain online browsers allow you to save your passwords, which might allow an attacker to submit queries using the remembered password even if they don't know it. We include this small amount of additional information, known as the "CSRF Signature," in order to guard against this kind of attack, also known as Cross Site Request Forgery (CSRF). This signature demonstrates that the credentials were actually known when the request was made and wasn't only stored in the browser's memory..
“Your clocks should be synchronized.”
This security feature prevents replay attacks using outdated CSRF signatures by requiring that your clocks be synchronized to our servers within five minutes.
If your circumstance (where the clocks appear to be in sync) does not fit this description, you could try setting your client computer's time zone to match the time zone of the area where your deployment is now active.
Comments