Cookie Security

Этот раздел перенесён из документации Camunda 7 и в дальнейшем будет доработан с учётом особенностей OpenBPM Engine

Camundas Web applications use cookies to preserve user sessions and to prevent CSRF attacks. This page explains how these cookies should be configured to increase the security.

The Web applications set the following cookies:

  • Session Cookie (<code>JSESSIONID</code>)

  • Supposed to remember the authenticated user after the login

  • CSRF Prevention Cookie (<code>XSRF-TOKEN</code>)

  • Supposed to prevent Cross-Site Request Forgery (CSRF) by sending a newly generated token along with each modifying request

What are the properties supposed to be?

This section describes the purpose of security-related cookie properties.You can find more information about Secure and HttpOnly https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies#Secure_and_HttpOnly_cookies as well as SameSite cookies https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies#samesite_attribute in Mozilla’s Developer Guide.

Secure

When enabling the <code>Secure</code> flag, the browser does not send the cookie via a plain (insecure) HTTP connection.

To provide a seamless getting started experience, we disabled the <code>Secure</code> flag by default for all cookies. However, you can easily enable the <code>Secure</code> flag. When the Secure flag is present, some browsers prevent cookies from being sent via a plain (insecure) HTTP connection.

HEADS-UP!: It is highly recommended to use an HTTPS connection and enable the <code>Secure</code> flag.

HttpOnly

When enabling the <code>HttpOnly</code> flag, the cookie cannot be read via JavaScript to mitigate cross-site scripting (XSS) attacks.

SameSite

When enabling the <code>SameSite</code> flag, the browser only sends the cookie if the client performs the request from the same domain that initially set the cookie. In case of a cross-site request, the browser will not send the cookie.

HEADS-UP!: The standard related to <code>SameSite</code> recently changed. Most current browser versions treat cookies without <code>SameSite</code> attributes as 'SameSite=Lax'. Have a look at SameSite cookies https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies#samesite_attribute in Mozilla’s Developer Guide.

What are the limitations?

The following section lists the limitations of the cookie security settings.

For the CSRF Cookie, the <code>HttpOnly</code> flag is absent and not configurable to ensure the functionality of the Web applications. Aforementioned is due to the reason that the CSRF cookie must be readable by the JavaScript HTTP Client to guarantee that the browser sends the token along with every modifying request.

In the following pre-packaged distributions, the <code>SameSite</code> property is absent by default since the Java Container manages the cookie and the latest Servlet specification does currently not support the <code>SameSite</code> property:

  • JBoss EAP/WildFly

For all other distributions, the <code>SameSite</code> flag is enabled by default.

HEADS-UP!: The absence of the <code>SameSite</code> property does not have any negative impact on the security of the Web applications: The <code>SameSite</code> property is supposed to ensure protection from CSRF attacks. With the CSRF Protection Filter, there already exists a dedicated protection mechanism for such scenarios.

What are the defaults?

The following table shows the default configuration of the Web applications.

|==

|Property Name
|Session Cookie
|CSRF Cookie
|+HttpOnly+
|+true+
|–
|+Secure+
|+false+
|+false+
|+SameSite+
|+Lax *+
|+Lax *+

|==

\* The <code>SameSite</code> property is disabled by default for both cookies. The Session Cookie also has no <code>SameSite</code> attribute by default on JBoss EAP/WildFly.

SAMESITE & FIREFOX: Firefox prevents sending the Cookie to the server for all subsequent requests until the next restart …​

  • …​ on Strict when opening the Webapps from a cross-origin (GET)

  • …​ on Lax when a modifying request (e. g. POST) is performed from a cross-origin

How to configure?

This section describes how to configure the Session Cookie as well as the CSRF Cookie.

Here you can find how to configure the session cookie for the following containers:

In the CSRF Prevention documentation, you can find how to configure the CSRF Cookie.

Лицензия и атрибуция

Эта документация была создана на базе материала "Camunda 7 Docs" от Camunda, находится под лицензией Creative Commons Attribution-ShareAlike 3.0 Unported License .

Оригинал документации: https://docs.camunda.org