Closer to production browser behavior
Developer Guide
Written by Casper Fenger Jensen • Updated 2026-04-14
How to Test Secure Cookies and Auth Flows in Local Development
Use a real HTTPS origin in development for secure cookies, browser auth behavior, embedded flows, and feature checks that do not behave the same way on plain HTTP localhost.
A lot of 'local auth problems' are really secure-origin problems. When the browser expects HTTPS for a cookie, redirect, or embedded workflow, Bore gives the local app an origin that behaves more like production.
Install Bore
curl -sL https://bore.dk/install.sh | bashUseful for auth and embedded flows
Can separate app and API origins when needed
How It Works
Simple local workflow, real HTTPS externally
Step 1
Run the local app or auth surface
Start the frontend or backend that needs secure-origin browser behavior.
Step 2
Expose it with Bore
Use Bore to provide the HTTPS origin that the browser will treat as secure.
bore up 3000Step 3
Test the flow against the HTTPS URL
Repeat the cookie, auth, iframe, or callback scenario using the Bore hostname instead of plain localhost.
Step 4
Split origins when required
If the app and API should be on different hosts, reserve a child host under the same namespace.
Where Bore Differs
Bore can keep HTTPS on reserved child hosts too
Most tunnel workflows stop at one public hostname. Bore can keep your main app on one HTTPS namespace and reserve a child host like `api.<namespace>.bore.dk` for a second local service.
bore host add <namespace> api
bore host set-port <namespace> api 3001That matters when frontend and API origins need to stay separate in local development, or when webhook, auth, and admin traffic should not all share one hostname.
FAQ
Common questions
Why is localhost not enough for some auth flows?
Some browser and provider behaviors depend on a secure origin or a realistic host setup. A public HTTPS URL often reproduces the production behavior more accurately.
Can this help with secure cookie testing?
Yes. Bore gives the local app a proper HTTPS origin, which is useful when you need to test secure-cookie behavior outside plain localhost assumptions.
Can I keep the frontend and auth API on different origins?
Yes. Bore can route the main hostname and a child host such as api.<namespace>.bore.dk to different local ports.
Related Guides
More HTTPS development guides
How to Test Webhooks on Localhost Over HTTPS
Receive webhooks on a local app over HTTPS without opening inbound firewall rules or keeping a manually configured reverse proxy around for development.
How to Use OAuth Callbacks With Localhost HTTPS
Handle OAuth and SSO callback flows in local development with a real HTTPS URL instead of trying to fit providers around plain localhost.
How to Expose a Local API Over HTTPS
Put a local API on a real HTTPS URL for browser clients, mobile apps, webhook callbacks, and partner integrations without adding local TLS complexity.
How to Open Localhost on HTTPS From Your Phone or Another Device
Test a local app or API on a phone, tablet, or another laptop over HTTPS without opening your whole machine to the internet or sharing raw LAN URLs.