Chrome 80 will introduce a new attribute which is SameSite.
- Strict - Only attach cookies for ‘same-site’ requests.
- Lax - Send cookies for ‘same-site’ requests, along with ‘cross-site’ top level navigations using safe HTTP methods e.g. (GET HEAD OPTIONS TRACE).
- None - send cookies for all ‘same-site’ and ‘cross-site’ requests.
For more information, this article explains SameSite pretty good.
From Azure documentation:
The cloud service (the service provider) uses an HTTP Redirect binding to pass an AuthnRequest (authentication request) element to Azure AD (the identity provider). Azure AD then uses an HTTP post binding to post a Response element to the cloud service
My question is why SameSite breaks SAML flow? 🔍"saml" samesite problem
When IdP POST response back to SP, if SameSite=Lax, user-agent will not send cookies that has SP domain. Even if it does not send cookies I don't see there is any problem with SP.