aboutsummaryrefslogtreecommitdiffstats
path: root/guides
diff options
context:
space:
mode:
authorYves Senn <yves.senn@gmail.com>2015-08-21 09:24:35 +0200
committerYves Senn <yves.senn@gmail.com>2015-08-21 09:24:35 +0200
commitacb2b07ebdfcf8f683b90a0e5de0558ae0f20259 (patch)
tree1cfe662afa8d1ce6faff15fcadfc42c2ac78e7ea /guides
parent90bb73781128bd1ce1b1059bb173b8e1cf310e3a (diff)
parent0b18876e153d96f2bda0e1762a32c29235004398 (diff)
downloadrails-acb2b07ebdfcf8f683b90a0e5de0558ae0f20259.tar.gz
rails-acb2b07ebdfcf8f683b90a0e5de0558ae0f20259.tar.bz2
rails-acb2b07ebdfcf8f683b90a0e5de0558ae0f20259.zip
Merge pull request #21312 from piton4eg/patch-7
Small fixes [ci skip]
Diffstat (limited to 'guides')
-rw-r--r--guides/source/security.md18
1 files changed, 6 insertions, 12 deletions
diff --git a/guides/source/security.md b/guides/source/security.md
index 21cf48c2cf..850d111bd7 100644
--- a/guides/source/security.md
+++ b/guides/source/security.md
@@ -1014,18 +1014,12 @@ config.action_dispatch.default_headers.clear
Here is a list of common headers:
-* X-Frame-Options
-_'SAMEORIGIN' in Rails by default_ - allow framing on same domain. Set it to 'DENY' to deny framing at all or 'ALLOWALL' if you want to allow framing for all website.
-* X-XSS-Protection
-_'1; mode=block' in Rails by default_ - use XSS Auditor and block page if XSS attack is detected. Set it to '0;' if you want to switch XSS Auditor off(useful if response contents scripts from request parameters)
-* X-Content-Type-Options
-_'nosniff' in Rails by default_ - stops the browser from guessing the MIME type of a file.
-* X-Content-Security-Policy
-[A powerful mechanism for controlling which sites certain content types can be loaded from](http://w3c.github.io/webappsec/specs/content-security-policy/csp-specification.dev.html)
-* Access-Control-Allow-Origin
-Used to control which sites are allowed to bypass same origin policies and send cross-origin requests.
-* Strict-Transport-Security
-[Used to control if the browser is allowed to only access a site over a secure connection](http://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security)
+* **X-Frame-Options:** _'SAMEORIGIN' in Rails by default_ - allow framing on same domain. Set it to 'DENY' to deny framing at all or 'ALLOWALL' if you want to allow framing for all website.
+* **X-XSS-Protection:** _'1; mode=block' in Rails by default_ - use XSS Auditor and block page if XSS attack is detected. Set it to '0;' if you want to switch XSS Auditor off(useful if response contents scripts from request parameters)
+* **X-Content-Type-Options:** _'nosniff' in Rails by default_ - stops the browser from guessing the MIME type of a file.
+* **X-Content-Security-Policy:** [A powerful mechanism for controlling which sites certain content types can be loaded from](http://w3c.github.io/webappsec/specs/content-security-policy/csp-specification.dev.html)
+* **Access-Control-Allow-Origin:** Used to control which sites are allowed to bypass same origin policies and send cross-origin requests.
+* **Strict-Transport-Security:** [Used to control if the browser is allowed to only access a site over a secure connection](http://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security)
Environmental Security
----------------------