Skip to main content

Browser - Data Storage & Cookies

This section goes over the storage methods and Cookies used in the LoginRadius System.

Internet Explorer

For IE browsers we do the following three things to make sure all of the LoginRadius services function correctly:

  • HTML5 >IE8 : >IE8 doesn’t support HTML5, so we do not support HTML5 technology on >IE8 browsers for social login.

  • postMessage across domain windows: IE browsers do not provide postMessage for child popup windows. To support this, this we use ‘#’ communication workaround, we do redirection in child window to parent window’s site with the token as part of a URL hash. We then read the token, pass it to the parent, and then close the child window.

  • SSO Cookie: IE doesn’t allow setting Cookies on a site that is not actually visited by a user, but IE provides a way to do this by setting up P3P header. We do not set this header and IE allows us to set Cookies for SSO.

Safari

  • Single Sign-On- Safari doesn’t allow setting Cookies on a site that is not actually visited by a user, so it is very difficult for a Single Sign-On service to set the Cookie using JSONP requests. LoginRadius SSO API handles the process in the Safari browser by redirecting users to a unique LoginRadius site subdomain (< LoginRadius-site-Name >.hub.loginradius.com) and sets the browser Cookie to enable Single Sign-On.

  • Private Mode- In Safari private mode, storage for your browser is disabled, which means you cannot use your session storage or local storage to keep the LoginRadius token. The solution for this scenario is first detecting if the storage is disabled. If so, we use URL hash to pass the access tokens instead of doing it within the storage.

iOS

  • For iOS Safari and Chrome, both of them are having issues with child window popups and redirects, in addition to some webkit bugs. It affects our normal social login flow on iOS devices. The fix for these issues is to first detect if the loading device is an iOS device, then set the Social Login parameter to make it use the same window and do the social login instead of popping up.

Browser Data Storage

The Local Storage is used to store the access token after authentication and will have an expiration time. Please see the information below:

NameDomainTypeAge(days)Product FeatureDescription
lr-user-uidYour WebsiteLocalStorage (persistence)Clear on LogoutUserRegistrationThe account ID (UID) of the logged in user.
LRTokenKeyYour WebsiteLocalStorage (persistence)Clear on LogoutUser Registration and HTML5 based Social LoginLogged in users Access Token

Browser Cookies

The Browser cookies are used during Social Login, User Registration, Single Sign-on and Social Sharing Analytics. Please see the information below:

On hub_domain.hub.loginradius.com domain:

Cookie NameDomainTypeAge(days)Product FeatureDescription
isaccesstokenCustom Domain^Persistence30¹²Social LoginIf request is coming for access token, LoginRadius has the option to get either the access token or the request token. The access token can be used for direct client-side requests.
IsMobileTechnologyCustom Domain^Persistence30¹²Social LoginIf Social Login is requested from a mobile device, this value is set.
providerCustom Domain^Persistence30¹Social LoginProvider Name for initiated Social Login
isSameWindowCallbackCustom Domain^Persistence30¹²Social LoginThis controls whether or not the request will callback to the child window.
Callback URLCustom Domain^Persistence30¹Social LoginAfter successful Social Login Loginradius will return to this URL.
account_linkingCustom Domain^Persistence30¹²Social LoginIf Social Login requests linking of another social account.
Is_error_redirectCustom Domain^Persistence30¹²Social LoginIf an error occurs return to call back with the error message.
custome_token_responseCustom Domain^Persistence30¹Social LoginIf the callback type has been changed from default
tokCustom Domain^Persistence30Social LoginThe stored access token after successful login, with AES encryption.
htokCustom Domain^Persistence30Social LoginStored HMAC-SHA1 hash of 'tok' cookie to prevent tampering or malicious use.
lr-session-tokenCustom Domain^PersistenceLong-timeUser RegistrationStore access token for hosted page.
lr-user--tokenCustom Domain^PersistenceLong-timeUser RegistrationStore token to compare with the new token in SSO. This helps control the login process.

1: After Social Login request is finished, this Cookie will be expired. So the actual age of this Cookie would be the request time.

2: These Cookies are boolean type and they are created only when value is set to true.

3: LoginRadius Custom Domain for your site : <Site-Name>.hub.loginradius.com OR if you have CNAME masking feature for your LoginRadius account then the Cookie will be created on your website domain. The LoginRadius system also utilizes Session Storage to store some account details.

On your site’s domain:

Cookie NameDomainTypeAge(days)Product FeatureDescription
LRTokenKeyYour WebsitePersistenceLong-timeCustomer RegistrationTo maintain token your website, and this make sure to sync same session if in same browser on other SSO site user has login with another account
**lsuidYour WebsitePersistenceLong-timeSocial Sharing AnalyticsVisitors Unique ID based on session.
**lsurlYour WebsitePersistenceLong-timeSocial Sharing AnalyticsMD5 of current page URL to prevent recapturing of data.
LRTraditionalLoginYour WebsitePersistenceLong-timeCustomer RegistrationTo maintain that it was traditional (email, phone or username) login.
lr-remembermeYour WebsitePersistenceLong-timeCustomer RegistrationTo maintain that user has checked remember me option
lr-user-uidYour WebsitePersistenceLong-timeCustomer RegistrationTo keep all things working on basis of uid after login
lr2fatokYour WebsitePersistenceLong-timeCustomer RegistrationTo handle Multi-Factor Authentication
lrotpauthverYour WebsitePersistenceLong-timeCustomer RegistrationTo maintain if OTP verification is done
lrgaauthverYour WebsitePersistenceLong-timeCustomer RegistrationTo maintain if Google Authenticator app verification is done