-
I've searched the repo and read through https://github.com/fedidcg/FedCM/issues/212 and https://github.com/fedidcg/FedCM/issues/248 but I'm still confused about the SameSite=none requirement.
[Last…
-
## Acceptance criteria
- [x] The listed features are documented sufficiently on MDN
- [x] BCD is updated
- [x] Interactive example and data repos are updated if appropriate
- [x] The content has…
-
## Description
**SameSite Cookie High-Level Overview:**
- This SameSite attribute restricts a browser from sending a cookie in various requests.
- In Open Liberty, SameSite is enabled via the ser…
-
-
**Description**
Browser tells me this:
> Cookie “darkMode” does not have a proper “SameSite” attribute value. Soon, cookies without the “SameSite” attribute or with an invalid value will be trea…
-
The [SameSite attribute section](https://github.com/privacycg/CHIPS?tab=readme-ov-file#samesite-attribute) seems like it was written at a time when only cross-site (A embeds B) Partitioned cookies wer…
-
Since EPrints 3.4.5 the `secure_eprints_session` cookie has set its `SameSite` attribute to `Strict`. This creates a problem when ORCID redirects back to the EPrints repository (`/cgi/orcid/authentic…
-
**Jetty Version** : 12
**Jetty Environment** : ee8
**Java Version** : 17
**Question** : Unable to Add SameSite Cookie Attribute Value in Jetty 12 EE8 environment with Java 17
Our appli…
-
open-api-framework issue, raised by @sergei-maertens
```
SESSION_COOKIE_SAMESITE = config(
"SESSION_COOKIE_SAMESITE",
"Strict",
help_text=(
"The value of the SameSite flag…
-
[Lax + POST mitigation](https://www.chromium.org/updates/same-site/faq/#q-what-is-the-lax-post-mitigation) as well as the following Spring Security tickets:
* https://github.com/spring-projects/spr…