Closed kevinreiss closed 10 months ago
See comment from OIT on reports of cookie issues with SSO: https://github.com/pulibrary/orangelight/issues/3896#issuecomment-1857212948
I think we should set this directive to Strict (the default, which we currently use in the catalog, is Lax). It provides additional protection against CSRF (especially if our CORS is misconfigured), does not interfere with CAS logins, and is recommended by Mozilla. However, I don't think it will help much with https://github.com/pulibrary/orangelight/issues/3896 (huge Cookie headers caused by many large cookies set by other Princeton subdomains), since the SameSite directive considers all subdomains to be the same site.
The only drawback I see is the following scenario:
I found this from Mozilla, this from Portswigger, and this blog post from Andrew Lock to be helpful in understanding this topic.
Investigation complete, we opened tickets for the various applications to accomplish this.
See https://web.dev/articles/samesite-cookies-explained. This could be a path to a more secure and efficient way to manage the cookies our applications create.