Secure and protect a processor
-
- UpdatedAug 3, 2023
- 1 minute read
- Vancouver
- Building applications
The Vancouver release is no longer supported. As such, the product documentation and release notes are provided for informational purposes only, and will not be updated.
You can protect your processor against unauthorized use by using role restrictions, and protect it by requiring a CSRF token.
About this task
Note: This feature is deprecated. While legacy, existing custom processors continue to be supported, creating new custom processors has been deprecated. Instead, use the Scripted REST APIs.
You can re-use a table's user role restrictions to protect it from access by your processor. This protection method assumes the processor will access table data.
Procedure
Protect a processor with a CSRF token
You can protect a processor by requiring a CSRF token.
About this task
Script type processors can require a CSRF token check before the processor runs.
Procedure
- Navigate to .
- Open a processor record.
- Select the CSRF protect option.
- Click Update.