SAML Authentication Failing After Chrome/Edge Update – Possible Cookie Policy Enforcement Issue.

Waghulde, Mayur 0 Reputation points
2025-08-27T04:44:41.4133333+00:00

We are experiencing a sudden failure in SAML authentication (500 Internal Server Error) starting August 25, 2025, in our web application that uses Microsoft Entra ID for SSO.

Our application has had requireSSL = false and httpCookies = true since February 2, 2025, and everything worked fine until August 22, 2025.

On August 25, users running Edge version 139.0.0.0 (based on Chromium 139.0.7258.129) began encountering SAML failures. We suspect this is related to SameSite=None cookie enforcement, where cookies not marked Secure are now being blocked.

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/139.0.0.0 Safari/537.36 Edg/139.0.0.0

Could you please confirm:

  • Whether Edge 139 enforces blocking of SameSite=None cookies unless marked Secure?
  • If this change was part of a security update or CVE fix?
  • Any recommended workaround or documentation to handle this scenario?

Thank you!

Microsoft Edge | Other | Windows 11
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Emmanuel Santana 24,230 Reputation points Independent Advisor
    2025-08-27T06:03:44.31+00:00

    Hello. I noticed a very similar question posted on StackOverflow earlier; perhaps that was also from you? In any case, I wanted to share some insights here as well.

    To my knowledge, there is no official update notes regarding this specific change. However, Chromium (by default) strictly enforces that any cross-site cookie set with SameSite=None must also include the Secure attribute and be transmitted only over HTTPS. If any part of your workflow uses HTTP, the cookie will not function as expected.

    As for why this worked previously, older versions of the browser may have permitted this behavior for legacy reasons, but with version 139, this requirement is now strictly enforced.

    Potential workarounds:

    • Using a browser flag to temporarily disable enforcement (note that this affects only the local browser, not server-wide).
    • If you manage a reverse proxy (such as NGINX or Apache), you can rewrite the Set-Cookie headers at the edge to inject the Secure attribute and SameSite=None as needed.

    Ultimately, the correct solution is to ensure all SAML or session cookies are set with SameSite=None; Secure and that your application is served exclusively over HTTPS. Browsers will block Secure cookies over HTTP without exception.

    Delaying or downgrading browser updates is also an option, but I would not advise this since it may introduce additional risks.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.