Jump to: navigation, search

Configuring security

Web Services adheres to the standards described in the Open Web Application Security Project (OWASP) Top 10 — see the OWASP website for details about the Top 10 — and has adopted several methods of ensuring security, for example:

  • Errors are logged locally to prevent information leakage through API requests.
  • User sessions have a timeout option.
  • Cross Site Request Forgery Protection

Web Services includes additional security configurations that you can use with your installation:

For details about how Web Services handles authentication, see Web Services authentication flow.

Next step

This page was last edited on February 15, 2024, at 19:04.
Comments or questions about this documentation? Contact us for support!