search cancel

How do we prevent a cookie replay attack in Siteminder?


Article ID: 108653


Updated On:


CA Single Sign On Secure Proxy Server (SiteMinder) CA Single Sign On SOA Security Manager (SiteMinder) CA Single Sign-On


How do we prevent a cookie replay attack in Siteminder?



Applicable to all the supported components.

Component : Policy Server 12.8.x releases.



Any application that manages sessions via cookie is subject to replay attacks. Siteminder has multiple embedded features that can help in preventing Cookie Replay. 

1) Implement a Session Store 

2) Configure your Realms to use the Session Store by configuring the Realm to use Persistent Sessions and by configuring the validation period setting. 

3) Configure a Logoff URI. If set with Session Store. The Logoff URI will set the Cookie as LOGGEDEOFF in the session store and it can no longer be replayed.

4) Implement IP Checking (Enable or disable IP checking with persistent and transient cookies):

- Compare IP Addresses to Prevent Security Breaches:

Document reference:

5) Use the Session Store to Increase Security for Multi-Domain Single Sign-On:

Document reference:

- Detailed documented Information regarding the Session Cookie Management: