Content-Security-Policy and Administration Application

Administration application content-security-policy compliance.

Content Security Policy (CSP) is a W3C recommendation for specifying restrictions on how browsers should handle potentially dangerous components in an HTTP response entity. As of this writing, 2 levels of the recommendation are available.

  • CSP Level 2 (recommendation 2016-12-15)
  • CSP Level 3 (working draft; many features implemented in modern browsers)

By default, TD includes the following Content-Security-Policy HTTP header on all administration application pages.

default-src 'self’; script-src ‘self’ 'unsafe-inline' 'unsafe-eval'; style-src ‘self’ ‘unsafe-inline’;image-src ‘self’ data:;

The admin application will function as expected in browsers that implement these CSP directives.

If your site requires a different policy, contact Oberon Support to discuss your requirements. The following stricter policies can be implemented on request, but will impose restrictions on certain aspects of the application.

For sites that do not allow script-src 'unsafe-inline' 'unsafe-eval', the TD administration application will function normally except the assembly editor will be disabled if the following policy is in effect.

default-src 'self’; script-src ‘self’; style-src ‘self’ ‘unsafe-inline’;image-src ‘self’ data:;
A future version of TD will lift this limitation with respect to the assembly editor.

For sites that do not allow style-src 'unsafe-inline', the TD administration application will function normally except content item preview may be degraded (due to the use of inline @style attributes in the preview HTML). It may be possible to remedy these defects by providing a doctype preview.xsl stylesheet that eliminates the use of inline styles. (See "Custom Preview Stylesheets" in the Titania Delivery Developer's Guide.) Then the following policy could be added.

default-src 'self’; script-src ‘self’; style-src ‘self’;image-src ‘self’ data:;