HttpOnly session cookies
To help protect against cross-site scripting (XSS) attacks, configure session cookies with the HttpOnly flag.
When a cookie has this flag, browsers prevent client-side scripts from accessing it.
This is an effective way to prevent attackers from stealing session information.
By default, AM enables the HttpOnly flag on its session cookies.
| 
 When the  For example: 
 | 
Verify the httpOnly flag is enabled
The httpOnly flag is enabled by default. To verify that it’s enabled, follow these steps:
- 
In the AM admin UI, go to Configure > Server Defaults > Advanced.
 - 
Find the
com.sun.identity.cookie.httponlyadvanced server property and make sure it’s set totrue. - 
If you change the value, save your changes and restart AM or the container where it runs.
 - 
If you have a site with multiple AM servers, verify this setting on each server.
 
| 
 AM also uses the   |