Skip to content

Commit f03e650

Browse files
Copilotsamdark
andcommitted
Combine External APIs and Webhooks sections into single argument
Co-authored-by: samdark <[email protected]>
1 parent e791dea commit f03e650

File tree

1 file changed

+2
-7
lines changed

1 file changed

+2
-7
lines changed

cookbook/en/disabling-csrf-protection.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,18 +10,13 @@ For a comprehensive understanding of CSRF attacks and protection mechanisms, see
1010

1111
While CSRF protection should generally remain enabled for web applications, there are specific scenarios where you might need to disable it:
1212

13-
### External APIs
13+
### When external systems cannot provide CSRF tokens
1414

15-
When building REST APIs or web services that are consumed by external applications, CSRF protection can interfere with legitimate requests:
15+
When building APIs or handling automated requests from external systems, CSRF protection can interfere with legitimate requests since these systems cannot provide valid CSRF tokens:
1616

1717
- **Third-party integrations**: External services cannot provide valid CSRF tokens
1818
- **Mobile applications**: Native mobile apps typically don't use cookies or sessions in the same way as web browsers
1919
- **Server-to-server communication**: API endpoints designed for machine-to-machine communication
20-
21-
### Webhooks
22-
23-
Webhook endpoints receive automated requests from external services and cannot provide CSRF tokens:
24-
2520
- **Payment processors**: PayPal, Stripe, and other payment systems send webhook notifications
2621
- **Version control systems**: GitHub, GitLab webhooks for CI/CD pipelines
2722
- **Social media platforms**: Twitter, Facebook webhook notifications

0 commit comments

Comments
 (0)