Skip to content
Visit Access on GitHub
Set theme to dark (⇧+D)

Session management


Pages that rely heavily on AJAX or single-page applications can block sub-requests due to an expired Access token without prompting the user to re-authenticate.

You can configure Access to provide a 401 response on sub-requests with an expired session token. We recommend using this response code to either force a page refresh or to display a message to the user that their session has expired.

In order to receive a 401 for expired session, add the following header to all AJAX requests:

X-Requested-With: XMLHttpRequest

Global Session Duration

When users log in to an application protected by Access, Access generates two session tokens:

Global session tokenEstablishes the maximum amount of time for a user’s Access sessionYour Cloudflare auth domain <auth_domain>
Application tokenEstablishes a session for a specific applicationThe hostname of the application protected

You can configure the duration of both tokens on the dashboard. When users log in, the global session token will default to the duration of the application token. You can configure the duration of the global session token to be shorter or longer than the application’s session token.

Global session

  • If the global session duration is shorter than an application’s session length, users will be required to re-authenticate each time the global session time elapses.

    This can be helpful to establish a maximum session duration across all applications.

  • If the global session duration is longer than an application’s session length, a user’s application session will be automatically refreshed until the global session expires.

    This provides a more secure way, since the global session cookie cannot be used to directly access an application, to allow for longer user sessions.

Browser Cookies Configuration Options

Cloudflare Access provides optional security settings that can be added to the browser cookies generated by Access for an authenticated user. The three enhanced browser cookie settings available are:

  • HttpOnly flag
  • Binding cookie
  • SameSite

All three settings can be enabled in an Application’s settings menu.

To reach the settings menu:

  1. Navigate to the Teams Dashboard.
  2. Select Applications.
  3. Locate the application for which you would like to enable these settings.
  4. Click Edit.
  5. Select Settings.

Settings menu


The HTTP Only flag is a cookie attribute that prevents the cookie from being accessed by any client-side scripts, reducing the likelihood of XSS attacks.

When not to use HttpOnly

Do not enable HttpOnly if:

  • You are using the Access application for non-browser based tools
  • You have software that relies on being able to access a user’s cookie generated by Access

The Binding Cookie is an additional cookie created when a user successfully authenticates, shared with Cloudflare to verify identity, and then stripped before it reaches the origin server. The Binding Cookie associates the browser with the Access token; the association protects against compromised authorization tokens because the origin webapp would never see this binding cookie. This protects against session hijack style attacks.

  • Do not use the Binding Cookie for non-browser based Access applications that rely on protocols like SSH, RDP, etc.

SameSite Attribute

The SameSite Attribute selector is a cookie attribute that restricts the cookie to only being sent if the cookie’s defined site matches the site being requested in the browser. This adds protection against CSRF attacks.

The selector options are[1]:

  • None - Cookies will be sent in all contexts, i.e sending cross-origin is allowed.
  • Lax - Cookies are allowed to be sent with top-level navigations and will be sent along with GET requests initiated by third party websites.
  • Strict - Cookies will only be sent in a first-party context and not be sent along with requests initiated by third party websites.

See here for specific behaviors of these options.

When not to use SameSite

  • If you have additional sites or applications that rely on a specific application’s authorization cookie.


1. Source: SameSite Cookies