-
Type: New Feature
-
Status: Resolved
-
Priority: Major
-
Resolution: Fixed
-
Affects Version/s: None
-
Fix Version/s: 10.3
-
Component/s: Web Common
-
Epic Link:
-
Impact type:Configuration Change
-
Upgrade notes:
-
Sprint:nxFG 10.3.9, nxFG 10.3.10
-
Story Points:5
In order to have a second layer of CSRF protection (beyond the existing one based one the Origin header, see NXP-24331), we want to allow the use of CSRF tokens.
The implementation of CSRF Tokens for the platform requires to:
- define the token retrieval API
- define the token passing mechanism from the clients
- make it optional (to allow for old clients)
In addition, the CMIS token mechanism must be activated automatically when the platform tokens are active.
Note that the SAML callback endpoint is done using a POST and must be excluded from CSRF token checks.
- is related to
-
NXP-24331 CSRF Protection for Platform
- Resolved
- is required by
-
JAVACLIENT-169 CSRF Token for Java Client
- Open
-
NETCLIENT-15 CSRF Token for .NET Client
- Open
-
NXJS-173 CSRF Token for JavaScript Client
- Open
-
NXPY-73 CSRF Token for Python Client
- Open
-
PHPCLIENT-20 CSRF Token for PHP Client
- Open
-
NXP-25904 CSRF Token for JSF
- Resolved