jxbma
asked on
Are there any known issues with using the ASP.net SessionId embedded in the HubCallerContext RequestCookies in SignalR 2.x?
Hi All!
I've got a question regarding use of data found within the HubCallerContext.
I notice there's a collection of RequestCookies that hang off of the context.
They contain the following:
[0]: {[culture, Microsoft.AspNet.SignalR.C ookie]}
[1]: {[__RequestVerificationTok en_L0VDSQ2 , Microsoft.AspNet.SignalR.C ookie]}
[2]: {[ASP.NET_SessionId, Microsoft.AspNet.SignalR.C ookie]}
[3]: {[XxxAuth, Microsoft.AspNet.SignalR.C ookie]}
In our previous implementation of SignalR, we leveraged the SessionId which hung
off of the HttpContext Session. Since use of the Session is no longer supported
in SignalR 2.x, we were forced to look for an alternative.
In doing so, we noticed "ASP.NET_SessionId" in the RequestCookies.
Does anyone know of any issues or restrictions with using it?
Is this a safe option to utilize?
Thoughts?
Thanks,
JohnB
I've got a question regarding use of data found within the HubCallerContext.
I notice there's a collection of RequestCookies that hang off of the context.
They contain the following:
[0]: {[culture, Microsoft.AspNet.SignalR.C
[1]: {[__RequestVerificationTok
[2]: {[ASP.NET_SessionId, Microsoft.AspNet.SignalR.C
[3]: {[XxxAuth, Microsoft.AspNet.SignalR.C
In our previous implementation of SignalR, we leveraged the SessionId which hung
off of the HttpContext Session. Since use of the Session is no longer supported
in SignalR 2.x, we were forced to look for an alternative.
In doing so, we noticed "ASP.NET_SessionId" in the RequestCookies.
Does anyone know of any issues or restrictions with using it?
Is this a safe option to utilize?
Thoughts?
Thanks,
JohnB
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.