It turned out that the root cause was the Ajax call.
The problematic flow was
1) OAuth cookie got expired after some time
2) Expiration normally causes redirection the page to login.microsoft.com
to refresh the cookie. In this step OAuth framework adds new nonce
cookie to the response (every time)!
3) But Ajax doesn't handle redirections outside of the domain (cross-domain to login.microsoft.com
). But the cookie was already appended to the page.
4) Next periodical Ajax call repeated the flow causing rapid increase of 'nonce' cookies.
Solution
I had to extend the "OWIN OpenId" framework setup code to handle Ajax calls differently - to prevent redirection and stop sending cookies.
public void ConfigureAuth(IAppBuilder app)
{
app.SetDefaultSignInAsAuthenticationType(CookieAuthenticationDefaults.AuthenticationType);
app.UseCookieAuthentication(new CookieAuthenticationOptions());
app.UseOpenIdConnectAuthentication(
new OpenIdConnectAuthenticationOptions
{
ClientId = clientId,
Authority = authority,
Notifications = new OpenIdConnectAuthenticationNotifications
{
RedirectToIdentityProvider = ctx =>
{
bool isAjaxRequest = (ctx.Request.Headers != null && ctx.Request.Headers["X-Requested-With"] == "XMLHttpRequest");
if (isAjaxRequest)
{
ctx.Response.Headers.Remove("Set-Cookie");
ctx.State = NotificationResultState.HandledResponse;
}
return Task.FromResult(0);
}
}
});
}
The Ajax caller had to be adjusted too to detect 401
code and perform full page refresh (which caused a quick redirect to Microsoft authority).
与恶龙缠斗过久,自身亦成为恶龙;凝视深渊过久,深渊将回以凝视…