You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Aug 28, 2023. It is now read-only.
The Passport library by default does not prevent against session fixation. Since
the default experience for `passport-azure-ad` is to use cookies, I thought it
would be helpful for the README example to clearly regenerate the session.
This is not a vulnerability with the library itself, but rather just extra caution
common to the passport ecosystem per jaredhanson/passport#192.
Passport-azure-ad saves state and nonce in session by default for validation purpose. If `useCookieInsteadOfSession` is set to true, passport-azure-ad will encrypt the state/nonce and
185
-
put them into cookie instead. This is helpful when we want to be completely session-free, in other words, when you use { session: false } option in passport.authenticate function.
184
+
Passport-azure-ad saves state and nonce in session by default for validation purpose. Consider regenerating the session
185
+
after authentication to prevent session fixation attacks when using the default. If `useCookieInsteadOfSession` is set to
186
+
true, passport-azure-ad will encrypt the state/nonce and put them into cookie instead. This is helpful when we want to be
187
+
completely session-free, in other words, when you use { session: false } option in passport.authenticate function.
186
188
If `useCookieInsteadOfSession` is set to true, you must provide `cookieEncryptionKeys` for cookie encryption and decryption.
0 commit comments