This article addresses concerns raised around the presence of the arcottest_cookie, which is created by the Strong Authentication sample application. The cookie stores a timestamp value for the client-side session but does not contain any sensitive or user-specific data.
A patch has been developed to disable the creation of this cookie, especially in environments where its presence may trigger privacy or compliance concerns.
You have reported concerns about a cookie named arcottest_cookie appearing in browser sessions while using the sample application or embedded JavaScript libraries. The concern arises due to:
Lack of clarity around the purpose of the cookie
Compliance/privacy scanner flags
Confusion caused by the name arcottest_cookie
Advanced Authentication (Strong Authentication) Version 9.1.5 and above
The cookie is used internally by the sample application's JavaScript client to store a timestamp for the authentication flow. It was originally created for diagnostic and demo purposes.
Key points:
It does not store personally identifiable information (PII), device identifiers, or session tokens.
The cookie is non-functional and not required for production-grade deployments.
The naming may cause confusion but does not imply insecure usage.
A patch has been created to remove the logic that sets the arcottest_cookie.
Organizations:
Who do not use the sample application but still include the client JavaScript.
Who are undergoing strict compliance scans.
Who want to ensure minimal cookie footprint for end users.
Replace the following file:
Example for Tomcat App server:
Use the patched version of arcotclient.js provided with this KB or via your support case.
If you are using a custom frontend that embeds arcotclient.js, replace the JS file within your project or build pipeline with the patched version.
After deploying the patch:
Clear browser cache
Restart the application server (if applicable)
Initiate a fresh authentication flow
Use browser dev tools → Application → Cookies → Confirm arcottest_cookie is no longer present
Q: Will disabling this cookie break any authentication flow?
A: No, this cookie is not used in actual authentication logic or backend validation.
Q: Can we rename the cookie instead of removing it?
A: While possible, the recommended and supported fix is to remove it entirely.
Q: Does this apply to Arcot Payment SDKs?
A: No, this patch is specific to Strong Authentication client SDK/sample app.
arcotclient.js (patched version) – Attach below.