Only set this checkbox, if it really is required and you understood the impact!
Better options are: Setting BE/cookieSameSite to none in TYPO3 configuration,
or to have the easydb hostname on the same top level domain as your TYPO3 backend.
Detailed explanation
On every successful backend login TYPO3 generates a user session
with a corresponding identifier. This identifier is stored in a cookie by the browser.
Every time the TYPO3 backend is accessed, the browser sends the cookie
with the identifier. TYPO3 reads the cookie value, checks if a corresponding session exists
and authenticates the user that is associated with this session.
This means, that knowing a (valid) session id is enough to authenticate
a user in TYPO3. This is why this id (and the cookie) needs to be secured
as much as possible. Security measurements are:
The cookie can not be accessed by JavaScript code, the cookie is only sent over secure
https connections (TYPO3 backend must only be accessible via https for that).
By doing so, the session cookie and the session ID is only "known" by the user,
the browser and TYPO3.
Recently a new security measurement for cookies was specified and implemented by browser vendors.
A cookie can have the SameSite attribute. There are three possible values for this
attribute: strict, lax and none. It was implemented to be able to protect
users from CSRF attacks.
A cookie with the SameSite attribute strict instructs the browser to
not send the cookie to the corresponding domain, when the request originates
from a different website. The value lax also instructs browsers to not send
the cookie, but will send it when a simple link to the cookie domain should be followed.
The Chrome browser in recent versions changed the default behaviour for cookies,
when no SameSite is set to be treated as lax.
This affected easydb users, where the easydb host name is on a different domain as
the TYPO3 backend. Chrome would not send the cookie any more when files should be
imported (via POST request).
To fix this issue, it is recommended to either change the eadydb host name to be
a subdomain of the typo3 domain, or to configure TYPO3 to set the backend
cookie to SameSite none. With the latter the CSRF protection of the cookie
is disabled, but TYPO3 itself implements a different token based CSRF protection
anyway, so the risk in doing so is negligible. Please note, that with this solution,
every client browser used must be configured to allow sending cross-site cookies.
Recent browser versions opted to change the defaults to disallow sending cross-site cookies
to prevent cross site tracking.
If both options are not possible or not quickly possible, the easydb adapter for TYPO3
has the option to allow a "session transfer" to the easydb server, so that
easydb during import can send a session id to TYPO3 so that the file import
will work. However this option should only be used as temporary workaround,
because it decreases the security of the user session significantly.
Since the session id is sent as URL argument from TYPO3 to easydb, the session
id will accessible by JavaScript from within the TYPO3 and easdb application.
Additionally, the session id of a concrete user will be exposed to easydb,
so that, theoretically not only TYPO3 administrators, but also easydb administrators
gain access to user sessions.
The session id that is sent to the easydb server isn't the regular TYPO3 session id
and it will only be valid for file imports, but knowing this session id
will allow an attacker knowing this id to import files in any folder the
user has access to.
When choosing this option, recent TYPO3 security improvements on how session records are stored
in the database are reverted and the cookie value of the TYPO3 session is again
stored in clear text in the database. Therefore it is highly recommended to chose a different
option from above.