Difference between revisions of "SameSite"
From MgmtWiki
(Created page with "==Full Title or Meme== SameSite is an attribute in HTTP that is applied to the Cookie header. ==Context== Cross-site scripting (XSS) attacks have allows an attacker to se...") |
(→References) |
||
Line 10: | Line 10: | ||
==References== | ==References== | ||
+ | <refernces /> | ||
+ | |||
+ | ===Other Materiel=== | ||
* [https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie/SameSite SameSite cookies] from Mozilla. | * [https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie/SameSite SameSite cookies] from Mozilla. | ||
[[Category: Authentication]] | [[Category: Authentication]] |
Revision as of 10:51, 8 May 2021
Full Title or Meme
SameSite is an attribute in HTTP that is applied to the Cookie header.
Context
Cross-site scripting (XSS) attacks have allows an attacker to see and reuse cookies supplied for Authentication of user by another site.
Problems
- The use of Cookies on various devices and User Agents has be restricted in ever more severe ways. These restrictions have limited the functionality of the Authentication Cookie.
- In particular Apple introduced a restriction on SameSite cookies that caused common implementations of OAuth 2.0 and OpenID Connect to fail. Brock Allen has decoded that issue on his site[1] The basic problem with OAuth front channel Authentication is determining which site is the SameSite. So, while the authentication works, the redirect to the client code is not considered, by iOS 12, to be a same-site operation. Even in the case a refresh of the client site will work and be fully authenticated, because it is not a redirect, but a SameSite operation.
References
<refernces />
Other Materiel
- SameSite cookies from Mozilla.