billions-elephant-38030
04/29/2024, 2:22 PMchilly-king-10285
04/29/2024, 2:22 PMchilly-king-10285
04/29/2024, 2:23 PMlocalStorage
or document.cookies
due to the security risks associated with these methods. Instead, Ory implements special browser APIs which use additional security measures such as anti-CSRF cookies. This approach is designed to protect your users from common browser attack vectors, such as Cross-site scripting (XSS) or Cross-site request forgery (CSRF). In the context of flows, Ory uses HTTP cookies to prevent CSRF and Session Hijacking attack vectors. For example, when making requests for the browser flow, Ory recommends using the -c
flag to store the cookies in a file and the -b
flag to read the cookies from the file on subsequent requests. This method ensures that all security requirements are fulfilled and that the flow IDs are persisted safely through a browser reload. For more information, you can refer to the [Ory Documentation](https://www.ory.sh/docs/security-model).