I recently migrated our app to .NET 8 and I'm trying to get our previously working antiforgery tokens to work. Most of it is working fine.
However, whenever opening multiple browser tabs we start getting validation errors saying the anti forgery token is not valid. I found this blurb in the Microsoft documentation stating that the synchronizer pattern is going to invalidate the antiforgery token whenever you open a new tab. It then suggests considering alternative CSRF protection patterns if this poses an issue.
However, it does not demonstrate other patterns in the documentation!
It seems to me that users using multiple browser tabs is commonplace now, so what other patterns are there? In every case they show, you are essentially creating a token, sending it down to the JavaScript and sending it back up in requests... what other pattern is even possible with an antiforgery token? I don't get it.

After more searching, it seems the solution is not to use an AntiForgery token at all, and use a different pattern entirely. There are a few listed in the OWASP cheat sheet for CSRF, although only one other method is not frowned up. That method is the Signed Double Submit Cookie method as described here, which I will pursue.
https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html