Back to Browse

The X-FRAME-OPTIONS HTTP Header with IdentityServer

35 views
May 7, 2026
7:43

Clickjacking is one of the sneakiest web application attacks out there, and the defense is surprisingly simple if you know how! In this video, we dive into how clickjacking works, where an attacker literally "hijacks" a user's click by placing an invisible iframe over a legitimate action, causing the user to unknowingly interact with the attacked application. See a live demo showing how this vulnerability can be exploited on an application like Duende IdentityServer to force a logout with a single click. The good news is that you can stop this attack instantly with a single HTTP security header: X-FRAME-OPTIONS. We cover: * The two main values of X-FRAME-OPTIONS: SAMEORIGIN and DENY. * How ASP.NET Core's anti-CSRF protection often handles this for you automatically. * When you need more flexibility, how to use the Content Security Policy (CSP) and its frame-ancestors directive to specify exactly which pages are allowed to embed your content. Protect your applications from clickjacking with a simple security header today! #dotnet #websecurity

Download

1 formats

Video Formats

360pmp48.5 MB

Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.

The X-FRAME-OPTIONS HTTP Header with IdentityServer | NatokHD