Cookie Settings for PoolParty
04/09/2025
You can use the SameSite and HttpOnly cookie flags to make the PoolParty managed cookies more secure.
The SameSite cookie flag prevents the browser from sending this cookie along with cross-site requests. The main goal is to mitigate the risk of cross-origin information leakage. It also provides some protection against cross-site request forgery attacks.
The HttpOnly cookie flag is a tag added to a browser cookie preventing client-based scripts from accessing data. It provides a gate preventing the specialized cookie from being accessed by anything other than the server. Using the HttpOnly tag when generating a cookie helps to mitigate the risk of client-based scripts accessing the protected cookie, thus making these cookies more secure.
By default, PoolParty comes with the HttpOnly flag activated and the SameSite flag set to lax.
HttpOnly FlagOpen the settings file located in
PPAppDir/tomcat/conf/web.xmlFind the
cookie-configsection (web-app > session-config > cookie-config) and set the value inside of thehttp-onlyelement totrueorfalse.Restart the PoolParty server for the changes to take effect.
SameSite FlagOpen the settings file located in
PPAppDir/tomcat/conf/context.xmlFind the
CookieProcessorsection and set the value of thesameSiteCookiesattribute to one of the following:strict,lax,none,unset. For more information on the individual values, refer to the Apache Tomcat documentation.Restart the PoolParty server for the changes to take effect.