CSH
Secure and protect a processor
You can protect your processor against unauthorized use by using role restrictions, and protect it by requiring a CSRF token.
- Jan 30, 2025
- Publication: Yokohama API Reference
- Yokohama
- API implementation
Secure and protect a processor
You can protect your processor against unauthorized use by using role restrictions, and protect it by requiring a CSRF token.
- Jan 30, 2025
- Publication: Yokohama Build or modify applications
- Yokohama
- Building applications