SameSite cookie management
See original GitHub issueHas anyone looked at supporting the new stricter samesite cookie standard? Chrome has started enforcing the behavior, so I see following exception after /login:
A cookie associated with a resource at http://localhost/ was set with SameSite=Nonebut withoutSecure. It has been blocked, as Chrome now only delivers cookies marked SameSite=Noneif they are also markedSecure. You can review cookies in developer tools under Application>Storage>Cookies and see more details at https://www.chromestatus.com/feature/5633521622188032.
After reviewing https://www.thinktecture.com/en/identity/samesite/prepare-your-identityserver/ I was able to modify the server to return SameSite=Lax without much effort, but it’s a simplistic approach. I assume a better implementation would be to allow the policy to be configurable.
Issue Analytics
- State:
- Created 3 years ago
- Reactions:2
- Comments:10 (7 by maintainers)

Top Related StackOverflow Question
I mean to add function to
Config.csthat will parse json from file/env (like all other configurations) and then to merge the parsed object into the options argument of theAddCookiefunction.So summarizing the issue. There are two ways to solve it.
None) and make calls the server via HTTPS protocol.Laxand use HTTP protocol. It can be done by setting the following inSERVER_OPTIONS_PATHenv var