Skip to content

Preventing CSRF attacks when using the cookie_session authenticator #658

Answered by aeneasr
cameron-martin asked this question in Q&A
Discussion options

You must be logged in to vote

CSRF is an application concern, not of Oathkeeper. Authentication and CSRF are very distinct problems. The only crossover is that you generally want to refresh the CSRF cookie/token when a user logs out and freshly logs in.

Replies: 2 comments 1 reply

Comment options

You must be logged in to vote
1 reply
@cameron-martin
Comment options

Answer selected by vinckr
Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
3 participants