For anything in the browser, just verify "application/json" content type and built-in CORS rules will keep you safe.
For anything in the browser, just verify "application/json" content type and built-in CORS rules will keep you safe.
There's no way I can think of to avoid direct non-browser requests outside of custom code for request forgery tokens.
There's no way I can think of to avoid direct non-browser requests outside of custom code for request forgery tokens.
The 50 recommendation is for full domain aliases versus subdomains since each of those need to go inside the TLS certificate and you don't want the size of that to explode.
The 50 recommendation is for full domain aliases versus subdomains since each of those need to go inside the TLS certificate and you don't want the size of that to explode.