Skip to content

Commit 0588394

Browse files
docs: fix broken links to csrf and e-mail verification docs (#10140)
### What? This fixes a couple of broken links, specifically to the CSRF and the e-mail verification doc pages, which appear to have been moved from the root Authentication page. ### Why? While it makes sense to familiarize one self with the Authentication Overview page as well, if you are specifically looking for info on CSRF protection (which I was doing while evaluting Payload for my agency), the link should go to the right place.
1 parent 3bbc5bf commit 0588394

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

docs/configuration/overview.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ The following options are available:
7979
| **`loggingLevels`** | An object to override the level to use in the logger for Payload's errors. |
8080
| **`graphQL`** | Manage GraphQL-specific functionality, including custom queries and mutations, query complexity limits, etc. [More details](../graphql/overview#graphql-options). |
8181
| **`cookiePrefix`** | A string that will be prefixed to all cookies that Payload sets. |
82-
| **`csrf`** | A whitelist array of URLs to allow Payload to accept cookies from. [More details](../authentication/overview#csrf-protection). |
82+
| **`csrf`** | A whitelist array of URLs to allow Payload to accept cookies from. [More details](../authentication/cookies#csrf-attacks). |
8383
| **`defaultDepth`** | If a user does not specify `depth` while requesting a resource, this depth will be used. [More details](../queries/depth). |
8484
| **`defaultMaxTextLength`** | The maximum allowed string length to be permitted application-wide. Helps to prevent malicious public document creation. |
8585
| **`maxDepth`** | The maximum allowed depth to be permitted application-wide. This setting helps prevent against malicious queries. Defaults to `10`. [More details](../queries/depth). |

docs/production/preventing-abuse.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Querying a collection and automatically including related documents via `depth`
2020

2121
## Cross-Site Request Forgery (CSRF)
2222

23-
CSRF prevention will verify the authenticity of each request to your API to prevent a malicious action from another site from authorized users. See how to configure CSRF [here](/docs/authentication/overview#csrf-protection).
23+
CSRF prevention will verify the authenticity of each request to your API to prevent a malicious action from another site from authorized users. See how to configure CSRF [here](/docs/authentication/cookies#csrf-attacks).
2424

2525
## Cross Origin Resource Sharing (CORS)
2626

@@ -38,7 +38,7 @@ If you do not need GraphQL it is advised that you disable it altogether with the
3838

3939
Payload does not execute uploaded files on the server, but depending on your setup it may be used to transmit and store potentially dangerous files. If your configuration allows file uploads there is the potential that a bad actor uploads a malicious file that is then served to other users. Consider the following ways to mitigate the risks.
4040

41-
First, enable email [verification](/docs/authentication/overview#email-verification) when users are allowed to register new accounts and add other bot prevention services.
41+
First, enable email [verification](/docs/authentication/email#email-verification) when users are allowed to register new accounts and add other bot prevention services.
4242

4343
Review that `create` and `update` access on file upload collections are as restrictive as your application needs allow. Consider limiting `read` access of uploaded user's files and how you might limit user uploaded files from being served outside of Payload.
4444

0 commit comments

Comments
 (0)