You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: doc/sphinx-guides/source/installation/config.rst
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3961,16 +3961,16 @@ After changing these settings, restart Payara and re-check the response headers.
3961
3961
3962
3962
Session-Cookie Hardening vs Bearer Token Auth
3963
3963
3964
-
- Session-cookie auth and bearer-token auth use different trust models:
3965
-
- Session cookie (``JSESSIONID``) is automatically sent by browsers.
3966
-
- Bearer token is sent only when the client explicitly includes it.
3967
-
- Because of browser auto-send behavior, session-cookie auth requires anti-CSRF controls for state-changing API calls.
3964
+
- Session-cookie auth and bearer-token auth use different trust models. Session cookie
3965
+
(``JSESSIONID``) is automatically sent by browsers, while bearer token is sent only when the
3966
+
client explicitly includes it.
3967
+
- Because of browser auto-send behavior, session-cookie auth requires anti-CSRF controls for
3968
+
state-changing API calls.
3968
3969
With this hardening track enabled, Dataverse enforces Origin/Referer and CSRF token checks, which brings session-cookie browser usage into a security posture comparable to bearer for first-party, same-origin UI calls.
3969
3970
- Bearer remains preferable for non-browser and cross-origin API clients.
3970
-
- Neither model protects against stolen credentials by itself:
3971
-
- session hijack (stolen ``JSESSIONID``),
3972
-
- bearer-token theft.
3973
-
For both, use HTTPS, secure cookie/token handling, short lifetimes where possible, and strong XSS prevention.
3971
+
- Neither model protects against stolen credentials by itself (session hijack via stolen
3972
+
``JSESSIONID`` or bearer-token theft). For both, use HTTPS, secure cookie/token handling, short
3973
+
lifetimes where possible, and strong XSS prevention.
0 commit comments