Secure and protect a processor
-
- UpdatedJan 30, 2025
- 1 minute read
- Yokohama
- Building applications
You can protect your processor against unauthorized use by using role restrictions, and protect it by requiring a CSRF token.
About this task
Note: This feature is deprecated. While legacy, existing custom processors continue to be supported, creating new custom processors has been deprecated. Instead, use the Scripted REST APIs.
You can re-use a table's user role restrictions to protect it from access by your processor. This protection method assumes the processor will access table data.
Procedure
Protect a processor with a CSRF token
You can protect a processor by requiring a CSRF token.
About this task
Script type processors can require a CSRF token check before the processor runs.
Procedure
- Navigate to .
- Open a processor record.
- Select the CSRF protect option.
- Click Update.