From 74de2475ca23f6232694a7ee9fc979600b5aa45e Mon Sep 17 00:00:00 2001 From: MorgeMoensch <62468040+MorgeMoensch@users.noreply.github.com> Date: Tue, 29 Sep 2020 16:32:22 +0200 Subject: [PATCH] Fix Link to OWASP SameSite information (#27895) The old link (https://owasp.org/index.php/SameSite) no longer works, so I suggest to use this one instead: https://owasp.org/www-community/SameSite --- docs/sources/administration/configuration.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/sources/administration/configuration.md b/docs/sources/administration/configuration.md index c13fb23cc0b..eb94dd2d6a0 100644 --- a/docs/sources/administration/configuration.md +++ b/docs/sources/administration/configuration.md @@ -461,7 +461,7 @@ Set to `true` if you host Grafana behind HTTPS. Default is `false`. ### cookie_samesite -Sets the `SameSite` cookie attribute and prevents the browser from sending this cookie along with cross-site requests. The main goal is to mitigate the risk of cross-origin information leakage. This setting also provides some protection against cross-site request forgery attacks (CSRF), [read more about SameSite here](https://www.owasp.org/index.php/SameSite). Valid values are `lax`, `strict`, `none`, and `disabled`. Default is `lax`. Using value `disabled` does not add any `SameSite` attribute to cookies. +Sets the `SameSite` cookie attribute and prevents the browser from sending this cookie along with cross-site requests. The main goal is to mitigate the risk of cross-origin information leakage. This setting also provides some protection against cross-site request forgery attacks (CSRF), [read more about SameSite here](https://owasp.org/www-community/SameSite). Valid values are `lax`, `strict`, `none`, and `disabled`. Default is `lax`. Using value `disabled` does not add any `SameSite` attribute to cookies. ### allow_embedding