Skip to content

Commit 2eea951

Browse files
authored
Merge pull request #7352 from camunda/npp-7106-remove-tasklist-csrf
Remove outdated Tasklist CSRF documentation
2 parents 6276da5 + b55e2df commit 2eea951

File tree

2 files changed

+0
-72
lines changed

2 files changed

+0
-72
lines changed

docs/self-managed/components/orchestration-cluster/tasklist/tasklist-configuration.md

Lines changed: 0 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -51,42 +51,6 @@ See the [core settings documentation](/self-managed/components/orchestration-clu
5151

5252
See the [core settings documentation](/self-managed/components/orchestration-cluster/core-settings/configuration/logging.md).
5353

54-
## Clustering
55-
56-
### Distributed user sessions
57-
58-
If more than one Camunda Tasklist instance is accessible by users for a failover scenario, for example, persistent sessions must be configured for all instances. This enables distributed sessions among all instances and users do not lose their session when being routed to another instance.
59-
60-
| Name | Description | Default value |
61-
| :------------------------------------------- | :--------------------------------------------------------- | :------------ |
62-
| camunda.tasklist.persistent.sessions.enabled | Enables the persistence of user sessions in Elasticsearch. | false |
63-
64-
## Cross-site request forgery protection
65-
66-
Cross-site request forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they are currently authenticated. To mitigate this risk, Camunda provides CSRF protection that can be enabled in the Tasklist web application.
67-
68-
### Enabling CSRF protection
69-
70-
CSRF protection is enabled by default on Camunda Self-Managed. To explicitly define this, set the configuration variable `camunda.tasklist.csrfPreventionEnabled` to `true`. This is the recommended setting for production environments to enhance security.
71-
72-
```yaml
73-
camunda:
74-
tasklist:
75-
csrfPreventionEnabled: true
76-
```
77-
78-
When CSRF protection is enabled, the Tasklist web application requires a valid `X-CSRF-Token` header to be present in all state-changing HTTP requests (POST, PUT, DELETE, etc.)
79-
80-
### Disabling CSRF protection
81-
82-
To disable CSRF protection, set the configuration property `camunda.tasklist.csrfPreventionEnabled` to `false`. This setting is not recommended for production environments as it may expose the application to CSRF attacks.
83-
84-
```yaml
85-
camunda:
86-
tasklist:
87-
csrfPreventionEnabled: false
88-
```
89-
9054
## Allow non-self assignment
9155

9256
:::info

versioned_docs/version-8.8/self-managed/components/orchestration-cluster/tasklist/tasklist-configuration.md

Lines changed: 0 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -99,42 +99,6 @@ See the [core settings documentation](/self-managed/components/orchestration-clu
9999

100100
See the [core settings documentation](/self-managed/components/orchestration-cluster/core-settings/configuration/logging.md).
101101

102-
## Clustering
103-
104-
### Distributed user sessions
105-
106-
If more than one Camunda Tasklist instance is accessible by users for a failover scenario, for example, persistent sessions must be configured for all instances. This enables distributed sessions among all instances and users do not lose their session when being routed to another instance.
107-
108-
| Name | Description | Default value |
109-
| :------------------------------------------- | :--------------------------------------------------------- | :------------ |
110-
| camunda.tasklist.persistent.sessions.enabled | Enables the persistence of user sessions in Elasticsearch. | false |
111-
112-
## Cross-site request forgery protection
113-
114-
Cross-site request forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they are currently authenticated. To mitigate this risk, Camunda provides CSRF protection that can be enabled in the Tasklist web application.
115-
116-
### Enabling CSRF protection
117-
118-
CSRF protection is enabled by default on Camunda Self-Managed. To explicitly define this, set the configuration variable `camunda.tasklist.csrfPreventionEnabled` to `true`. This is the recommended setting for production environments to enhance security.
119-
120-
```yaml
121-
camunda:
122-
tasklist:
123-
csrfPreventionEnabled: true
124-
```
125-
126-
When CSRF protection is enabled, the Tasklist web application requires a valid `X-CSRF-Token` header to be present in all state-changing HTTP requests (POST, PUT, DELETE, etc.)
127-
128-
### Disabling CSRF protection
129-
130-
To disable CSRF protection, set the configuration property `camunda.tasklist.csrfPreventionEnabled` to `false`. This setting is not recommended for production environments as it may expose the application to CSRF attacks.
131-
132-
```yaml
133-
camunda:
134-
tasklist:
135-
csrfPreventionEnabled: false
136-
```
137-
138102
## Allow non-self assignment
139103

140104
:::info

0 commit comments

Comments
 (0)