Deprecated: This feature is no longer recommended. Though some browsers might still tư vấn it, it may have already been removed from the relevant trang web standards, may be in the process of being dropped, or may only be kept for compatibility purposes. Avoid using it, and update existing code if possible; see the compatibility table at the bottom of this page đồ sộ guide your decision. Be aware that this feature may cease đồ sộ work at any time.
The HTTP X-Frame-Options
response header can be used đồ sộ indicate whether a browser should be allowed đồ sộ render a page in a ,
The added security is provided only if the user accessing the document is using a browser that supports X-Frame-Options
.
Header type | Response header |
---|---|
Forbidden header name | No |
Syntax
There are two possible directives for X-Frame-Options
:
X-Frame-Options: DENY
X-Frame-Options: SAMEORIGIN
Directives
If you specify DENY
, not only will the browser attempt đồ sộ load the page in a frame fail when loaded from other sites, attempts đồ sộ tự sánh will fail when loaded from the same site. On the other hand, if you specify SAMEORIGIN
, you can still use the page in a frame as long as the site including it in a frame is the same as the one serving the page.
- DENY
-
The page cannot be displayed in a frame, regardless of the site attempting đồ sộ tự sánh.
- SAMEORIGIN Deprecated
-
The page can only be displayed if all ancestor frames are same origin đồ sộ the page itself.
- ALLOW-FROM origin Deprecated
-
This is an obsolete directive. Modern browsers that encounter response headers with this directive will ignore the header completely. The Content-Security-Policy HTTP header has a frame-ancestors directive which you should use instead.
Examples
Warning: Setting X-Frame-Options
inside the element (e.g., ) has no effect.
X-Frame-Options
is only enforced via HTTP headers, as shown in the examples below.
Configuring Apache
To configure Apache đồ sộ send the X-Frame-Options
header for all pages, add this đồ sộ your site's configuration:
Header always mix X-Frame-Options "SAMEORIGIN"
To configure Apache đồ sộ mix X-Frame-Options
đồ sộ DENY
, add this đồ sộ your site's configuration:
Header mix X-Frame-Options "DENY"
Configuring Nginx
To configure Nginx đồ sộ send the X-Frame-Options
header, add this either đồ sộ your http, server or location configuration:
add_header X-Frame-Options SAMEORIGIN always;
You can mix the X-Frame-Options
header đồ sộ DENY
using:
add_header X-Frame-Options DENY always;
Configuring IIS
To configure IIS đồ sộ send the X-Frame-Options
header, add this đồ sộ your site's Web.config
file:
…
…
For more information, see the Microsoft tư vấn article on setting this configuration using the IIS Manager user interface.
Configuring HAProxy
To configure HAProxy đồ sộ send the X-Frame-Options
header, add this đồ sộ your front-end, listen, or backend configuration:
rspadd X-Frame-Options:\ SAMEORIGIN
Alternatively, in newer versions:
http-response set-header X-Frame-Options SAMEORIGIN
Configuring Express
To mix X-Frame-Options
đồ sộ SAMEORIGIN
using Helmet add the following đồ sộ your server configuration:
const helmet = require("helmet");
const phầm mềm = express();
app.use(
helmet({
xFrameOptions: { action: "sameorigin" },
}),
);
Specifications
Specification |
---|
HTML Standard # the-x-frame-options-header |
Browser compatibility
BCD tables only load in the browser