Question
SiriusXM
US
Last activity: 25 Oct 2024 3:17 EDT
Cross-Site Request Forgery : Implementation Questions
Hi, We are planning to implement Cross-Site Request Forgery Token Check at Pega end , as an Incident was reported from Pen-Test of our application. There are some questions regarding the implementation ,and how it can be QA validated.
- Would the CSRF token be sent to client as an input field on the form?
- If so, would that be a hidden field?
- As Pega is a single page application, how do we preserve through the token through out the user session if the <form> is refreshed?
- Would this token be stored on client side in form of a cookie too? If so, what would be the life time of this cookie?
We tried looking at HTML request for our application pre and post implementation of CSRF settings "Enable CSRF Token check" . In both the HTML we could find <input type="hidden" id="XCSRFToken" name="XCSRFToken" value="XXXXXXXXXXXXXXX"> Is this the token tag ?