In my previous post
I presented the basics of sharing sessions in a cluster by storing session data in a client-side cookie. In part 2, I'll talk about the security aspects of this client-side cookie store, i.e. how to protect it from security threats.
To prevent attacks specific to client-side sessions, I'll add encryption, signing, and session timeout to the code. In addition, I'll talk about solutions to protect against security threats common to any web application, such as Session Hijacking, Session Replay, and Cross-Site Scripting. The result will be an implementation of the Session-In-Cookie pattern that allows simple and secure session-sharing in a cluster.
15 January, 2013