Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

COOP, sessionStorage and server-side redirection for SSO protocols #6821

Open
lauredogit opened this issue Jul 1, 2021 · 2 comments
Open
Labels
topic: cross-origin-opener-policy Issues and ideas around the new "inverse of rel=noopener" header

Comments

@lauredogit
Copy link

lauredogit commented Jul 1, 2021

Similar to the thread for #6356 #6356, what is the expected behaviour for navigations due to server-side redirections (e.g. HTTP 302 / 303) when COOP is enabled?

We are now observing that Firefox 89 clears the sessionStorage on such server-side redirections and this is breaking client applications using SSO protocols (e.g. OpenID Connect, OAuth2, SAML2, etc.) if they have stored state in sessionStorage prior to the authentication using the SSO provider located on a different origin.

I opened a bug at Mozilla: https://bugzilla.mozilla.org/show_bug.cgi?id=1718850

Edited:
On the contrary to what we first suspected, Firefox 89 clears the sessionStorage not because of the HTTP redirection to the SSO provider but because within the SSO provider, a redirection is made with location.href.

@domenic domenic added the topic: cross-origin-opener-policy Issues and ideas around the new "inverse of rel=noopener" header label Jul 1, 2021
@annevk
Copy link
Member

annevk commented Jul 21, 2021

This is considered a bug. COOP shouldn't break a session. @jakearchibald's work in #6315 will codify this.

I suppose we could leave this open to verify it's written down accurately in the end.

@jakearchibald
Copy link
Contributor

Yeah, happy to leave this open to verify

@whatwg whatwg deleted a comment Sep 25, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
topic: cross-origin-opener-policy Issues and ideas around the new "inverse of rel=noopener" header
Development

No branches or pull requests

5 participants
@jakearchibald @domenic @annevk @lauredogit and others