Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support more secure Content-Security-Policy headers #10

Open
michaelwheeler opened this issue May 5, 2022 · 1 comment
Open

Support more secure Content-Security-Policy headers #10

michaelwheeler opened this issue May 5, 2022 · 1 comment

Comments

@michaelwheeler
Copy link
Collaborator

Currently to make Django projects embeddable within an LMS, we need to disable the django.middleware.clickjacking.XFrameOptionsMiddleware middleware. This eliminates a barrier, but opens the site up to potential clickjacking attacks. The more flexible and recommended way of handling these security restrictions is to use Content-Security-Policy headers, with frame-ancestors listing allowable domains. It might be a good idea to have some functionality built into our library to automatically generate the list of allowable domains with the set of active platforms or registrations.

@michaelwheeler
Copy link
Collaborator Author

It looks like CSP support is coming to Django, so it probably makes sense for django-lti to align with that work as much as possible.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant