Skip to content
This repository was archived by the owner on Aug 28, 2023. It is now read-only.

Commit 3369263

Browse files
committedJul 7, 2020
README: recommend regenerating session by default
The Passport library by default does not prevent against session fixation. Since the default experience for `passport-azure-ad` is to use cookies, I thought it would be helpful for the README example to clearly regenerate the session. This is not a vulnerability with the library itself, but rather just extra caution common to the passport ecosystem per jaredhanson/passport#192.
1 parent fcf9b75 commit 3369263

File tree

1 file changed

+16
-2
lines changed

1 file changed

+16
-2
lines changed
 

‎README.md

+16-2
Original file line numberDiff line numberDiff line change
@@ -181,8 +181,10 @@ passport.use(new OIDCStrategy({
181181

182182
* `useCookieInsteadOfSession` (Conditional)
183183

184-
Passport-azure-ad saves state and nonce in session by default for validation purpose. If `useCookieInsteadOfSession` is set to true, passport-azure-ad will encrypt the state/nonce and
185-
put them into cookie instead. This is helpful when we want to be completely session-free, in other words, when you use { session: false } option in passport.authenticate function.
184+
Passport-azure-ad saves state and nonce in session by default for validation purpose. Consider regenerating the session
185+
after authentication to prevent session fixation attacks when using the default. If `useCookieInsteadOfSession` is set to
186+
true, passport-azure-ad will encrypt the state/nonce and put them into cookie instead. This is helpful when we want to be
187+
completely session-free, in other words, when you use { session: false } option in passport.authenticate function.
186188
If `useCookieInsteadOfSession` is set to true, you must provide `cookieEncryptionKeys` for cookie encryption and decryption.
187189

188190
* `cookieEncryptionKeys` (Conditional)
@@ -341,13 +343,25 @@ app.get('/login',
341343
res.redirect('/');
342344
});
343345

346+
function regenerateSessionAfterAuthentication(req, res, next) {
347+
var passportInstance = req.session.passport;
348+
return req.session.regenerate(function (err){
349+
if (err) {
350+
return next(err);
351+
}
352+
req.session.passport = passportInstance;
353+
return req.session.save(next);
354+
});
355+
}
356+
344357
// POST /auth/openid/return
345358
// Use passport.authenticate() as route middleware to authenticate the
346359
// request. If authentication fails, the user will be redirected back to the
347360
// home page. Otherwise, the primary route function function will be called,
348361
// which, in this example, will redirect the user to the home page.
349362
app.post('/auth/openid/return',
350363
passport.authenticate('azuread-openidconnect', { failureRedirect: '/' }),
364+
regenerateSessionAfterAuthentication,
351365
function(req, res) {
352366
res.redirect('/');
353367
});

0 commit comments

Comments
 (0)
This repository has been archived.