diff options
| author | José Padilla | 2014-11-07 23:55:42 -0400 | 
|---|---|---|
| committer | José Padilla | 2014-11-07 23:55:42 -0400 | 
| commit | 058fea23d3a9776e5fb23b77e81c087d0d8d7e6a (patch) | |
| tree | f688004a027ec304572bd0f64e9146ec1dd86ed2 | |
| parent | 93633c297c69a1eefda5e153553c4f021cf10bd8 (diff) | |
| download | django-rest-framework-058fea23d3a9776e5fb23b77e81c087d0d8d7e6a.tar.bz2 | |
Fix csrf-ajax link. Closes #2045
| -rw-r--r-- | docs/topics/ajax-csrf-cors.md | 6 | 
1 files changed, 3 insertions, 3 deletions
| diff --git a/docs/topics/ajax-csrf-cors.md b/docs/topics/ajax-csrf-cors.md index 97dd4710..ad88810d 100644 --- a/docs/topics/ajax-csrf-cors.md +++ b/docs/topics/ajax-csrf-cors.md @@ -10,7 +10,7 @@ If you’re building a JavaScript client to interface with your Web API, you'll  AJAX requests that are made within the same context as the API they are interacting with will typically use `SessionAuthentication`.  This ensures that once a user has logged in, any AJAX requests made can be authenticated using the same session-based authentication that is used for the rest of the website. -AJAX requests that are made on a different site from the API they are communicating with will typically need to use a non-session-based authentication scheme, such as `TokenAuthentication`.  +AJAX requests that are made on a different site from the API they are communicating with will typically need to use a non-session-based authentication scheme, such as `TokenAuthentication`.  ## CSRF protection @@ -19,7 +19,7 @@ AJAX requests that are made on a different site from the API they are communicat  To guard against these type of attacks, you need to do two things:  1. Ensure that the 'safe' HTTP operations, such as `GET`, `HEAD` and `OPTIONS` cannot be used to alter any server-side state. -2. Ensure that any 'unsafe' HTTP operations, such as `POST`, `PUT`, `PATCH` and `DELETE`, always require a valid CSRF token.  +2. Ensure that any 'unsafe' HTTP operations, such as `POST`, `PUT`, `PATCH` and `DELETE`, always require a valid CSRF token.  If you're using `SessionAuthentication` you'll need to include valid CSRF tokens for any `POST`, `PUT`, `PATCH` or `DELETE` operations. @@ -35,7 +35,7 @@ The best way to deal with CORS in REST framework is to add the required response  [cite]: http://www.codinghorror.com/blog/2008/10/preventing-csrf-and-xsrf-attacks.html  [csrf]: https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF) -[csrf-ajax]: https://docs.djangoproject.com/en/dev/ref/contrib/csrf/#ajax +[csrf-ajax]: https://docs.djangoproject.com/en/dev/ref/csrf/#ajax  [cors]: http://www.w3.org/TR/cors/  [ottoyiu]: https://github.com/ottoyiu/  [django-cors-headers]: https://github.com/ottoyiu/django-cors-headers/ | 
