Movatterモバイル変換


[0]ホーム

URL:


  1. Web
  2. HTTP
  3. Reference
  4. Headers
  5. Content-Security-Policy
  6. sandbox

Content-Security-Policy: sandbox directive

Baseline Widely available

This feature is well established and works across many devices and browser versions. It’s been available across browsers since ⁨November 2016⁩.

The HTTPContent-Security-Policy (CSP)sandbox directive enables a sandbox for the requested resource similar to the<iframe>sandbox attribute.It applies restrictions to a page's actions including preventing popups, preventing the execution of plugins and scripts, and enforcing a same-origin policy.

CSP version1.1 / 2
Directive typeDocument directive
This directive is not supported in the<meta> element or by theContent-Security-policy-Report-Only header field.

Syntax

http
Content-Security-Policy: sandbox;Content-Security-Policy: sandbox <value>;

where<value> can optionally be one of the following values:

allow-downloads

Allows downloading files through an<a> or<area> element with thedownload attribute, as well as through the navigation that leads to a download of a file.This works regardless of whether the user clicked on the link, or JS code initiated it without user interaction.

allow-forms

Allows the page to submit forms. If this keyword is not used, form will be displayed as normal, but submitting it will not trigger input validation, sending data to a web server or closing a dialog.

allow-modals

Allows the page to open modal windows byWindow.alert(),Window.confirm(),Window.print() andWindow.prompt(), while opening a<dialog> is allowed regardless of this keyword. It also allows the page to receiveBeforeUnloadEvent event.

allow-orientation-lock

Lets the resourcelock the screen orientation.

allow-pointer-lock

Allows the page to use thePointer Lock API.

allow-popups

Allows popups (created, for example, byWindow.open() ortarget="_blank").If this keyword is not used, popup display will silently fail.

allow-popups-to-escape-sandbox

Allows a sandboxed document to open new windows without forcing the sandboxing flags upon them. This will allow, for example, a third-party advertisement to be safely sandboxed without forcing the same restrictions upon the page the ad links to.

allow-presentation

Allows embedders to have control over whether an iframe can start apresentation session.

allow-same-origin

Allows a sandboxed resource to retain itsorigin.A sandboxed resource is otherwise treated as being from anopaque origin, which ensures that it will always failsame-origin policy checks, and hence cannot accesslocalstorage anddocument.cookie and some JavaScript APIs.TheOrigin of sandboxed resources without theallow-same-origin keyword isnull.

allow-scripts

Allows the page to run scripts (but not create pop-up windows). If this keyword is not used, this operation is not allowed.

allow-storage-access-by-user-activationExperimental

Lets the resource request access to the parent's storage capabilities with theStorage Access API.

allow-top-navigation

Lets the resource navigate the top-level browsing context (the one named_top).

allow-top-navigation-by-user-activation

Lets the resource navigate the top-level browsing context, but only if initiated by a user gesture.

allow-top-navigation-to-custom-protocols

Allows navigations to non-http protocols built into browser orregistered by a website. This feature is also activated byallow-popups orallow-top-navigation keyword.

Note:Theallow-top-navigation and related values only make sense for embedded documents (such as child iframes). For standalone documents, these values have no effect, as the top-level browsing context is the document itself.

Examples

http
Content-Security-Policy: sandbox allow-scripts;

Specifications

Specification
Content Security Policy Level 3
# directive-sandbox

Browser compatibility

See also

Help improve MDN

Learn how to contribute

This page was last modified on byMDN contributors.


[8]ページ先頭

©2009-2025 Movatter.jp