Cross-Origin Resource Sharing (CORS) is a security feature implemented in web browsers that allows or restricts resources from being requested from another domain outside the domain from which the first resource was served. Proper implementation of CORS is crucial for securing APIs, especially when they are accessed from different origins. Below are three practical examples that illustrate how to implement CORS effectively while adhering to security best practices.
In scenarios where an API needs to be accessed only from specific domains, it is essential to configure CORS settings to allow requests only from those trusted origins.
For instance, consider an API that provides user data for a web application hosted at https://myapp.com
. To restrict access to this domain, the server can be configured to include the following CORS headers:
const express = require('express');
const cors = require('cors');
const app = express();
const allowedOrigins = ['https://myapp.com'];
app.use(cors({
origin: function (origin, callback) {
if (!origin || allowedOrigins.indexOf(origin) !== -1) {
callback(null, true);
} else {
callback(new Error('Not allowed by CORS'));
}
}
}));
app.get('/user-data', (req, res) => {
res.json({ message: 'This is user data' });
});
app.listen(3000, () => {
console.log('Server running on port 3000');
});
By implementing this configuration, the API will only respond to requests from myapp.com
, thereby mitigating risks associated with unauthorized access from other origins.
When dealing with APIs that require authentication or session management, it’s crucial to configure CORS to handle credentials securely. This is particularly relevant for APIs that must accept cookies or HTTP authentication.
For example, if your API is hosted at https://api.myapp.com
and it needs to allow credentials from https://myapp.com
, you can set it up as follows:
const express = require('express');
const cors = require('cors');
const app = express();
app.use(cors({
origin: 'https://myapp.com',
credentials: true
}));
app.post('/login', (req, res) => {
// Authentication logic here
res.cookie('sessionId', 'abc123', { httpOnly: true });
res.json({ message: 'Logged in successfully' });
});
app.listen(3000, () => {
console.log('Server running on port 3000');
});
In this setup, the credentials
option is set to true, allowing cookies to be sent with requests, which is essential for maintaining user sessions securely.
credentials
option is only enabled for trusted origins.APIs often receive complex requests that require a preflight request to check permissions. Proper handling of these preflight requests is vital for ensuring that the API responds appropriately and securely.
For instance, an API that accepts PUT
requests from an application might need to handle preflight requests correctly:
const express = require('express');
const cors = require('cors');
const app = express();
app.options('/update-data', cors()); // Preflight request handling
app.put('/update-data', cors(), (req, res) => {
// Logic to update data
res.json({ message: 'Data updated successfully' });
});
app.listen(3000, () => {
console.log('Server running on port 3000');
});
In the above example, the options
method is used to handle preflight requests for PUT
operations. This ensures that the client is informed about which methods and headers are allowed before making the actual request.
Origin
and Access-Control-Request-Headers
in preflight requests.Implementing these examples of CORS and security best practices for APIs will help in building robust and secure applications that can effectively manage cross-origin requests while safeguarding sensitive data.