Table of Contents

Cross-Site Request Forgery (CSRF)


Only available versions of this content are shown in the dropdown

Cross-Site Request Forgery (CSRF), also known as an XSRF or a sea surf, is a web security attack in which an intruder tricks customers to perform certain malicious activities on their web applications where they are currently authenticated. When you enable the CSRF token check in the Pega Customer Service application Dev Studio, the system defends activities and streams from the CSRF attack.

CSRF Settings for chat-specific activities and streams

Enabling CSRF Settings prevents unwanted attacks on customer web applications. In the following use case, the system performs the CSRF check on all activities and streams except chat-specific activities and streams.

  1. In the header of Dev Studio, click Configure System Settings Cross-Site Request Forgery .

    The system opens the Cross-Site Request Forgery page.
  2. In the Cross-Site Request Forgery (CSRF) Settings section, select the Enable CSRF token check radio button.

    The system displays the Secure section with the following two options:
    • All activities & streams: Secures all activities and streams except the specified activities.
    • Specific activities & streams: Secures only specific activities and streams and allows the rest.
    Enabling the CSRF check doesn’t allow the chatbot to load on a web page.
  3. To exclude CSRF check on the chat-specific activities and streams, perform the following tasks:

    1. In the Secure section, select All activities & streams.

    2. In the Allowed Activities field, enter the following activities to exclude them from the CSRF check:

      • SetChatParams
      • GetCoBrowseConfigurations
      • czInvokeRouting
      • czUpdateConversationOnChatClosure

    3. In the Allowed Streams field, enter the ProcessChatAPI stream to exclude the stream from the CSRF check.

  4. In the Referrer Settings section, perform the following steps:

    1. To enable referrer check, select the Enable referrer check check box.

      • When you select the Enable referrer check option, the system white lists the specified referrer URLs from the CSRF check.
    2. In the Allowed referrers field, enter the following URLs:

      Specifying allowed activities, streams, and referrer URLs in CSRF Settings
      CSRF Settings displaying the allowed activities, streams,
                                        and referrer URLs
  5. To save the changes, click Submit.

Did you find this content helpful?

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.