Effect on SharePoint sites that use ADFS/SAML Authentication in Chrome version 80 or later

This post has been republished via RSS; it originally appeared at: SharePoint Support Blog articles.

Issue :

You are using Google Chrome 80, and when you have ADFS/SAML configured site, you notice that intermittently, users logging in fails and goes into a login loop.

The following error is received on ADFS :

"An error occured. Contact your administrator for more information"

Cause :

This behavior is because of Chrome’s new security feature :

A cookie associated with a cross-site resource at <URL> was set with the `SameSite` attribute. It has been blocked, as Chrome now only delivers cookies with cross-site requests if they are set with `SameSite=None` and `Secure`. You can review cookies in developer tools under Application>Storage>Cookies.

Ref: https://blog.chromium.org/2020/02/samesite-cookie-changes-in-february.html


Testing/Troubleshooting to understand the behavior :

  • First test by passing any load balancer and check if you have the issue
  • We need to collect a fiddler trace, and look for the frame in fiddler which is a GET request to the site, and in request header you will see that the ‘Fedauth’ cookie still exists. 
  • This is the response from the server, a "Set-Cookie" Header, that sets the FedAuth to blank, this is because the user is browsing the site with an expired FedAuth cookie :

Annotation 2020-03-25 143906.png



  •  Even after setting it to blank by SharePoint Server, Chrome does not deliver the blank Fedauth cookie(due to the same changes in it's cookie handling behavior), and in the next POST to the site it sends the same old expired cookie, you can see it in the request header in next request  :

    Annotation 2020-03-25 143906.png


  • When we use "Set-Cookie" to set theFedauth to blank, we also see the ‘SameSite=None’ attribute, but Chrome will deliver the cookie only if it has ‘SameSite=None’ alongwith ‘Secure’ attribute

Resolution :

Step 1 -- Recommendations by Microsoft
Ref: https://docs.microsoft.com/en-us/office365/troubleshoot/miscellaneous/chrome-behavior-affects-applications

Microsoft customers who use Active Directory Federation Services (AD FS) or Web Application Proxy must deploy one of the following Windows Server updates:


KB Article

Release Date

Windows Server 2019

KB 4534273

January 14, 2020

Windows Server 2016

KB 4534271

January 14, 2020

Windows Server 2012 R2

KB 4534309

January 14, 2020


The following Microsoft server or client products must also be updated. The updates will be added to this article when they're available. We recommend that you revisit this article regularly for the latest updates.


KB Article

Release Date

Exchange Server


March 2020 Cumulative Update

Project Server 2013

KB 4484279

March 10, 2020

Project Server 2010

KB 4484239

March 10, 2020

SharePoint Foundation 2013

KB 4484282

(Cumulative Update: KB 4484278)1

March 10, 2020

SharePoint Foundation 2010

KB 4484197

March 10, 2020

SharePoint Server 2019

KB 4484259

February 11, 2020

SharePoint Server 2016

KB 4484272

March 10, 2020

SharePoint Server 2013

KB 4484280

March 10, 2020

SharePoint Server 2010

KB 4484241

March 10, 2020


This Cumulative Update contains the fix for the SameSite cookie issue, plus additional fixes unrelated to the SameSite cookie issue. Microsoft recommends installing the Cumulative Update rather than the individual update to ensure your environment has all of the fixes available at the time the Cumulative Update was released.

Reference : https://docs.microsoft.com/en-us/office365/troubleshoot/miscellaneous/chrome-behavior-affects-applications


Step 2 -- If you still see issue continues after March 2020 CU update

If you still see issues with Load Balancer in place, you will have to contact your load balancer vendor for having an iRule created to add the SameSite=None and Secure parameter in the "Set-Cookie" header.

REMEMBER: these articles are REPUBLISHED. Your best bet to get a reply is to follow the link at the top of the post to the ORIGINAL post! BUT you're more than welcome to start discussions here:

This site uses Akismet to reduce spam. Learn how your comment data is processed.