Building a great product often means scaling your internal tooling. But as a company grows, a common architectural headache emerges: every single internal application from the Cashier dashboard to the Point of Sale (POS) system ends up with its own isolated login system.
Before you know it, managing user credentials, sessions, and multi-app permissions becomes an absolute nightmare for both users and the security team.
A few years ago, I tackled a project to solve exactly this by centralizing authentication across multiple internal applications. The goal was to transition the entire ecosystem into a single, unified system using a central SSO Engine & IAM Service to handle complex, multi-app roles and permissions.
Note: I'm sharing this architectural breakdown and diagram because I've already received explicit permission to do so! 😉
Architectural Flow Diagram
Below is the complete sequence flow mapping out how the authentication state behaves across different subdomains.
Figure 1: High-level overview of the request routing between Domain 1 (Cashier), Domain 2 (POS), and the central Identity Provider.
How the Data Flows
When mapping out this architecture, we compared two main approaches: Full Token Callback Flow (OAuth2/OIDC style) and Shared Wildcard Cookies. Because we were operating in a controlled, purely internal ecosystem sharing the exact same root domain (*.domain.com), we opted for the Wildcard Cookie route.
Here is exactly how it works under the hood:
1. The Initial Authentication (Domain 1: Cashier)
When a user first lands on cashier.domain.com:
- The Frontend (FE) browser checks for existing cookie validity.
- If no valid authentication exists, the frontend triggers a redirect to the SSO Login Page.
- The user inputs their credentials. The login page hands this over to the Cashier Backend API.
- The Backend API acts as a client, requesting authentication from the central SSO Engine & IAM Service.
- Once verified, the SSO Engine returns all user permissions, metadata, and the session token.
-
The Magic Step: The Cashier Backend API issues a
Set-Cookieheader to the browser. Instead of scoping it strictly tocashier.domain.com, it sets the cookie domain attribute to the wildcard root:.domain.com.
2. Seamless Cross-Domain Access (Domain 2: POS)
Now, when the same user navigates to pos.domain.com:
- Because the cookie was set at the root
.domain.comlevel, the browser automatically includes the cookie in requests heading to the POS Frontend and Backend API. - The POS Backend API captures this incoming cookie.
- To ensure strict validation, integrity, and up-to-date permissions, the Backend API securely forwards the cookie along with an
app_keyandsecret_keydirectly to the central SSO Engine & IAM Service. - The SSO engine verifies the keys and the cookie, returning the specific permissions and tokens required for the POS domain.
- The session is seamlessly established without a single redirect or manual login prompt.
Why Wildcard Cookies? (Pros & Cons)
While a Full Token Callback Flow (using authorization codes and state parameters) is the gold standard for public-facing third-party apps, it introduces significant engineering overhead, constant browser redirects, and callback route handling for every internal app you build.
For our specific use case, Shared Wildcard Cookies offered distinct advantages:
The Pros:
-
Zero Redirect Fatigue: Users transition between
cashier.andpos.instantly. No jarring page blinks or auth redirects. -
Radical Simplicity: Frontend applications don't need complex token-storage mechanisms (like dealing with
localStoragevssessionStorageXSS trade-offs). They simply let the browser do what it does best: manage cookies. -
Centralized Cryptographic Trust: By enforcing that every backend API must validate the cookie alongside an
app_keyandsecret_keyagainst the central SSO engine, we eliminated the risk of downstream microservices blindly trusting stale data.
The Trade-offs to Keep in Mind:
-
Tight Domain Coupling: This strategy strictly requires your apps to live under the same top-level domain. If your app moves to
completely-different-domain.com, this mechanism breaks, and you'll have to implement standard token exchange. -
CSRF Mitigation is Mandatory: Because cookies are sent automatically by the browser, you must implement robust Cross-Site Request Forgery (CSRF) defenses, ensure
HttpOnlyandSecureflags are strictly enforced, and set properSameSitepolicies (LaxorStrictdepending on your cross-subdomain API interactions).
Conclusion
When building internal tooling, over-engineering can be just as dangerous as under-engineering. Choosing a Shared Wildcard Cookie flow backed by a robust, server-to-server app_key verification loop allowed us to ship a highly secure, centralized IAM ecosystem with minimal architectural friction.

Top comments (0)