You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There should be an option to set a
Content-Security-Policy
header to allow embedding from specified URLS.
Alternative to X-Frame-Options: Content Security Policy (CSP) While X-Frame-Options is a simple and effective solution, it's somewhat limited. The modern and more flexible alternative is the Content Security Policy (CSP) with the frame-ancestors directive, which offers better control and granularity.
The text was updated successfully, but these errors were encountered:
Also, if the CUPS server is only being bound to an internal network IP, the risk is minimal anyway. Just leave the default as it is and put the appropriate warnings/instructions in the documentation.
There should be an option to set a
Content-Security-Policy
header to allow embedding from specified URLS.
Alternative to X-Frame-Options: Content Security Policy (CSP) While X-Frame-Options is a simple and effective solution, it's somewhat limited. The modern and more flexible alternative is the Content Security Policy (CSP) with the frame-ancestors directive, which offers better control and granularity.
The text was updated successfully, but these errors were encountered: