You signed in with another tab or window.Reload to refresh your session.You signed out in another tab or window.Reload to refresh your session.You switched accounts on another tab or window.Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/admin/setup/index.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -60,7 +60,7 @@ If you are providing TLS certificates directly to the Coder server, either
60
60
options (these both take a comma separated list of files; list certificates
61
61
and their respective keys in the same order).
62
62
63
-
After you enablea wildcardsub-domain,[disable path-based apps](../../tutorials/best-practices/security-best-practices.md#disable-path-based-apps).
63
+
After you enablethe wildcardaccess URL, you should[disable path-based apps](../../tutorials/best-practices/security-best-practices.md#disable-path-based-apps) for security.
Copy file name to clipboardExpand all lines: docs/tutorials/best-practices/security-best-practices.md
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -68,10 +68,10 @@ determining the nature and scope of the impact.
68
68
69
69
###Disable path-based apps
70
70
71
-
For production deployments, disable path-based apps.
71
+
For production deployments,we recommend that youdisable path-based apps after you've configured a wildcard access URL.
72
72
73
-
Path-based apps share the same origin as the Coder API.
74
-
This setup is convenient for demos,but can expose the deployment to cross-site-scripting (XSS) attacks in production.
73
+
Path-based apps share the same origin as the Coder API, which can be convenient for trialing Coder,
74
+
but can expose the deployment to cross-site-scripting (XSS) attacks in production.
75
75
A malicious workspace could reuse Coder cookies to call the API or interact with other workspaces owned by the same user.
76
76
77
77
1.[Enable sub-domain apps with a wildcard DNS record](../../admin/setup/index.md#wildcard-access-url) (like`*.coder.example.com`)
@@ -86,7 +86,7 @@ A malicious workspace could reuse Coder cookies to call the API or interact with
86
86
87
87
By default, Coder mitigates the impact of having path-based apps enabled, but we still recommend disabling it to prevent malicious workspaces accessing other workspaces owned by the same user or performing requests against the Coder API.
88
88
89
-
If you do keep path-based apps enabled, Coder limits the risk:
89
+
If you do keep path-based apps enabled:
90
90
91
91
- Path-based apps cannot be shared with other users unless you start the Coder server with`--dangerous-allow-path-app-sharing`.
92
92
- Users with the site`owner` role cannot use their admin privileges to access path-based apps for workspace unless the server is started with`--dangerous-allow-path-app-site-owner-access`.