4.2. Browser Cookies

Because the cookies store non-volatile information (License_Key and Device_ID), the cookies are given a far-future expiration date. Unlike the registry and p-list APIs, MetaAccess does not provide policy compliance information in the cookie itself. The intention is for the cookie to be used for identifying the device and securely calling the MetaAccess APIs to fetch device compliance status.

The injection works only for Windows devices. If the persistent OPSWAT Client is uninstalled, the cookies will be removed with it. If the on-demand OPSWAT Client is stopped, the cookies will be deleted as the agent shuts down.

Because of XSS protections, cookies are not visible from one domain to another. For this reason, the MetaAccess provides a form to specify the domains that require cookie injection.


Cookie Format

Whenever a cookie injection is scheduled, actually two separate cookies are injected. This allows for either secure or insecure integration types. Format of the two cookies:

Cookie Name




{Unique Device ID}

{MetaAccess license key}

Each cookie is also set as follows:


{hostname configured on your MetaAccess account}



Send For

Any connection type







Cookie: License_Key

The License_Key cookie provides the account license key to which the MetaAccess account is associated.

Cookie: Device_ID

The Device_ID cookie is provided so the web service can access the richest and most secure information directly from the MetaAccess. MetaAccess has APIs which documented at MetaAccess APIs. Calling these APIs to get device information requires either a MAC address or a Device_ID. Since most web services (without the use of Java) cannot query the device’s MAC address, the Device_ID is made available in this cookie.

The MetaAccess APIs are secured with OAuth 2.0. A client_key and client_secret for calling the APIs can be obtained by registering at https://gears.opswat.com/o/app/register. This registration is tied to each MetaAccess account.


  • Because the cookies are cleaned-up when OPSWAT Client is uninstalled (persistent) or stopped (on-demand), the presence of the cookie can be used as an indicator that OPSWAT Client is running on the endpoint. This is not deterministic though as special cases can arise where OPSWAT Client is stopped or removed without the cookies being cleaned up, and vice-e-versa a user may delete their cookies without removing OPSWAT Client (though in this case OPSWAT Client will try to recreate the cookies from time to time). Cookie injection is automatic as long as OPSWAT Client is running on the endpoint. It is not configurable.

  • The cookie is injected into all detected and supported browsers on the endpoint. Even if one fails, the remaining browsers will still be tried.

  • This cookie injection has little to no impact on system resources (CPU, memory, disk IO, etc.)

Supported browsers

As of November 10th, 2016, the cookie integration is only supported on Windows 7+


Persistent agent

On-demand agent with admin

On-demand agent with non-admin

Chrome 34+

(ID: 41)




Firefox 28+

(ID: 46)




Internet Explorer 8+









Not yet supported


  • The cookie couldn't be injected if there is at least 1 instance of chrome.exe running

  • On Firefox, you need to set baseDomain different with Hostname. If not, the cookie will not be injected

  • OPSWAT Client can inject cookie to IE database but IE couldn't transmit the cookie to servers if IE runs protected mode.

  • Windows on-demand OPSWAT Client is available with and without UAC. When using the non-UAC version as a user without local administrator rights, the cookie injection will not work with Internet Explorer