Important
We are updating the images for OroCommerce version 6.1 to align with the latest changes in the back-office design. During this transition, some images may still show older versions. Thank you for your patience as we work to update all visuals to reflect these changes.
Content Security Policy (CSP)
SalesFrontendBundle automatically configures CSP headers to allow embedding of the OroCommerce application into an iframe of the Sales Frontend application.
CSP is automatically configured for the following URLs:
%oro_sales_frontend.routing_prefix%/*
where %oro_sales_frontend.routing_prefix%
is /admin/sales-frontend
by default.
Note
Routing prefix can be changed via the bundle configuration, see more in the Routing Prefix configuration.
CSP is configured by \Oro\Bundle\SalesFrontendBundle\EventListener\Kernel\SetContentSecurityPolicyOnResponseListener
which by default sets the following directive into the Content-Security-Policy
header:
frame-ancestors
self
The allowed frame ancestors (i.e., the Sales Frontend application hosts) are configured automatically as per the oro_sales_frontend.app_base_urls
bundle configuration setting. Example of the CSP header that would be sent to browser when the Sales Frontend host is https://example.com:
Content-Security-Policy: frame-ancestors 'self' https://example.com
Note
As per the W3C CSP document, the frame-ancestors
directive replaces the X-Frame-Options
header.