From 1177cdb3e22968dcdd44549bc6971da71951ad4d Mon Sep 17 00:00:00 2001 From: Bruno Oliveira Date: Wed, 1 Jun 2016 10:14:16 -0300 Subject: [PATCH] Replace Adin by admin --- topics/threat/csrf.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/topics/threat/csrf.adoc b/topics/threat/csrf.adoc index b4e3cc7b0a..1e3cac4cc1 100644 --- a/topics/threat/csrf.adoc +++ b/topics/threat/csrf.adoc @@ -8,7 +8,7 @@ These attacks are mitigated by matching a state cookie against a posted form or OAuth 2.0 login specification requires that a state cookie be used and matched against a transmitted state parameter. {{book.project.name}} fully implements this part of the specification so all logins are protected. -The {{book.project.name}} Adin Console is a pure Javascript/HTML5 application that makes REST calls to the backend {{book.project.name}} admin REST API. +The {{book.project.name}} Admin Console is a pure Javascript/HTML5 application that makes REST calls to the backend {{book.project.name}} admin REST API. These calls all require bearer token authentication and are made via JavaScript Ajax calls. CSRF does not apply here. The admin REST API can also be configured to validate the CORS origins as well.