Another consideration with the token approach is clustering. Either a sticky session or a distributed cache are required.
- Re: Content Security Policy without unsafe-in... Lance Java
- Re: Content Security Policy without unsafe-in... Christian Köberl
- Re: Content Security Policy without unsafe-in... Lance Java
- Re: Content Security Policy without unsafe-in... Christian Köberl
- Re: Content Security Policy without unsafe-in... Thiago H de Paula Figueiredo
- Re: Content Security Policy without unsafe-in... Kristian Marinkovic
- Re: Content Security Policy without unsafe-in... Lance Java
- Re: Content Security Policy without unsafe-in... Kristian Marinkovic
- Re: Content Security Policy without unsafe-in... Thiago H de Paula Figueiredo
- Re: Content Security Policy without unsafe-in... Barry Books
- Re: Content Security Policy without unsafe-in... Lance Java
- Re: Content Security Policy without unsafe-in... Lance Java
- Re: Content Security Policy without unsafe-in... Thiago H de Paula Figueiredo
- Re: Content Security Policy without unsafe-in... Lance Java
- Re: Content Security Policy without unsafe-in... Barry Books
- Re: Content Security Policy without unsafe-in... Lance Java
- Re: Content Security Policy without unsafe-in... Thiago H de Paula Figueiredo
- Re: Content Security Policy without unsafe-in... Lance Java
- Re: Content Security Policy without unsafe-in... Lance Java
- Re: Content Security Policy without unsafe-in... Barry Books
- Re: Content Security Policy without unsafe-in... Lance Java