“Historically, sites such as example.com that make ‘cross-origin’ requests to other domains such as microsoft.com have generally caused the browser to send microsoft.com’s cookies as part of the request,” said the Microsoft Edge team. “Normally, the user benefits by being able to reuse some state (e.g., login state) across sites no matter from where that request originated. Unfortunately, this can be abused, as in CSRF attacks. Same-site cookies are a valuable addition to the defense in depth against CSRF attacks.” Going forward, web developers will be able to set the SameSite attribute on cookies of their choice via the Set-Cookie header. This should prevent the browser from sending cookies in cross-site requests or set specific circumstances where they’re not allowed.

Backward Compatible

Though this is currently exclusive to Redstone 5, Microsoft plans to roll it out to users on the Creators Update or higher if it goes well. Either way, the attribute will be backward compatible with earlier browser versions, which will simply ignore it. The team is planning to support to SameSite cookies even though it’s not a finalized standard at the IETF. It’s stability and compelling nature are apparently enough to warrant an early implementation as its standardization progresses. You can read more about the support on the Windows blog.

Microsoft Tests SameSite Cookies in Edge with Plans for Internet Explorer Support - 96Microsoft Tests SameSite Cookies in Edge with Plans for Internet Explorer Support - 62Microsoft Tests SameSite Cookies in Edge with Plans for Internet Explorer Support - 26Microsoft Tests SameSite Cookies in Edge with Plans for Internet Explorer Support - 13Microsoft Tests SameSite Cookies in Edge with Plans for Internet Explorer Support - 31