See the announcements here:
https://devblogs.microsoft.com/aspnet/upcoming-samesite-cookie-changes-in-asp-net-and-asp-net-core/
aspnet/Announcements#390
Affected libraries like OpenIdConnect and WsFederation will automatically set SameSite=None once the patches are installed. Beware that this is not compatible with many browsers and user-agent sniffing will be required. Examples are given in the announcements.
After installing the patch announced above, SameSite=None; Secure can be sent on a cookie using the following:
Response.Cookies.Add(new HttpCookie("key", "value")
{
SameSite = SameSiteMode.None,
Secure = true,
});
After installing the patches announced above, SameSite=None; Secure can be sent on a cookie using the following:
Response.Cookies.Append("Key", "Value", new CookieOptions()
{
SameSite = SameSiteMode.None,
Secure = true,
});