Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Building Web Apps with Spring 5 and Angular

You're reading from   Building Web Apps with Spring 5 and Angular Modern end-to-end web application development

Arrow left icon
Product type Paperback
Published in Aug 2017
Publisher Packt
ISBN-13 9781787284661
Length 370 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Ajitesh Kumar Shukla Ajitesh Kumar Shukla
Author Profile Icon Ajitesh Kumar Shukla
Ajitesh Kumar Shukla
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. Introduction to Spring Web Framework FREE CHAPTER 2. Preparing the Spring Web Development Environment 3. Data Access Layer with Spring and Hibernate 4. Testing and Running Spring Web App 5. Securing Web App with Spring Security 6. Getting Started with Angular 7. Creating SPA with Angular and Spring 5 8. Unit Testing with Angular Apps 9. Securing an Angular App 10. Integrating Angular App with Spring Web APIs 11. Deploying the Web Application

CSRF protection for API requests


In this section, you will learn about different aspects of cross-site request forgery (CSRF or XSRF) attack protection, which need to be taken care in both the Angular app and Spring app. Before getting into details, lets quickly understand what CSRF is.

CSRF is an attack in which attackers lure authenticated users to unknowingly perform undesired action on the website. For example, an attacker can log in as the user, and without the user's knowledge, transfer money from his account to the attacker's account. The following is a typical use-case scenario of a CSRF attack:

  1. The user logs into the actual website which will later be compromised using the CSRF attack. Once logged in, the website sends token information assigned to a cookie as part of the response.
  2. While the user is logged in, the attacker lures the user to visit attacker's web page from where the CSRF attack would take place. One such example is the attacker luring the user to click on a link in...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image