Cookie Strategy
Payload offers the ability to Authenticate via HTTP-only cookies. These can be read from the responses of login
, logout
, refresh
, and me
auth operations.
Automatic browser inclusion
Modern browsers automatically include http-only
cookies when making requests directly to URLs—meaning that if you are running your API on https://example.com
, and you have logged in and visit https://example.com/test-page
, your browser will automatically include the Payload authentication cookie for you.
HTTP Authentication
However, if you use fetch
or similar APIs to retrieve Payload resources from its REST or GraphQL API, you must specify to include credentials (cookies).
Fetch example, including credentials:
For more about including cookies in requests from your app to your Payload API, read the MDN docs.
CSRF Attacks
CSRF (cross-site request forgery) attacks are common and dangerous. By using an HTTP-only cookie, Payload removes many XSS vulnerabilities, however, CSRF attacks can still be possible.
For example, let's say you have a popular app https://payload-finances.com
that allows users to manage finances, send and receive money. As Payload is using HTTP-only cookies, that means that browsers automatically will include cookies when sending requests to your domain - no matter what page created the request.
So, if a user of https://payload-finances.com
is logged in and is browsing around on the internet, they might stumble onto a page with malicious intent. Let's look at an example:
In this scenario, if your cookie was still valid, malicious-intent.com would be able to make requests like the one above on your behalf. This is a CSRF attack.
CSRF Prevention
Define domains that your trust and are willing to accept Payload HTTP-only cookie based requests from. Use the csrf
option on the base Payload Config to do this:
Cross domain authentication
If your frontend is on a different domain than your Payload API then you will not be able to use HTTP-only cookies for authentication by default as they will be considered third-party cookies by the browser. There are a few strategies to get around this:
1. Use subdomains
Cookies can cross subdomains without being considered third party cookies, for example if your API is at api.example.com then you can authenticate from example.com.
2. Configure cookies
If option 1 isn't possible, then you can get around this limitation by configuring your cookies on your authentication collection to achieve the following setup:
Configuration example:
If you're configuring cors in your Payload config, you won't be able to use a wildcard anymore, you'll need to specify the list of allowed domains.