<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article What is CSP (Content-Security-Policy) and How does it Relate to Qlik? in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/What-is-CSP-Content-Security-Policy-and-How-does-it-Relate-to/ta-p/1710258</link>
    <description>&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;What is CSP (Content-Security-Policy)?&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;CSP helps to prevent cross-site scripting attacks by controlling what resources a browser can request from a server.&lt;BR /&gt;&lt;BR /&gt;Say a user navigates to &lt;A href="https://www.goodpage.com" target="test_blank"&gt;https://www.goodpage.com&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;The user's browser sends a GET request to&amp;nbsp;&lt;A href="https://www.goodpage.com" target="_blank" rel="noopener"&gt;https://www.goodpage.com&lt;/A&gt;, and the server in-turn responds with resources such as HTML, CSS, images, etc. In a cross-site scripting attack, the browser is tricked into making requests also to an unintended page such as &lt;A href="https://evilpage.com" target="test_blank"&gt;https://evilpage.com&lt;/A&gt;. Normally, browsers implement something called the Same Origin Policy; this restricts how scripts from one origin can interact with resources requested from a different origin (a same-origin meaning coming from the same protocol, domain, and port). However, this can be circumvented in various ways that are outside the scope of this article.&lt;BR /&gt;&lt;BR /&gt;What Content-Security-Policy allows a web administrator to do is send a custom set of instructions ("policies") to the browser (via the header, "Content-Security-Policy") that tells the browser to treat resources according to particular rules. For example, it's possible to tell the browser to only&amp;nbsp;execute&amp;nbsp;javascript resources from a specific domain, and if a browser attempts to do this it is also possible to send error reports to a specified URI. If a browser doesn't implement CSP, it will default to the Same Origin Policy.&lt;BR /&gt;&lt;BR /&gt;There is a wealth of information about this available online (such as Mozilla's developer documentation) if you wish to dig further into the specific details of how to implement various Content Security Policies.&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;How is CSP (Content-Security-Policy) Relevant to Qlik?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Generally speaking, it's not.&lt;BR /&gt;&lt;BR /&gt;CSP is implemented by the browser, and its implementation is therefore going to vary from browser to browser. If there is an issue with CSP or a general question about CSP with a specific browser version, then this is a browser issue and not a Qlik issue.&lt;BR /&gt;&lt;BR /&gt;The&amp;nbsp;&lt;I&gt;only&lt;/I&gt;&amp;nbsp;point where Qlik comes into the equation is if Qlik&amp;nbsp;&lt;I&gt;Sense&lt;/I&gt;&amp;nbsp;has been configured to send custom response headers (instead of using a frontend web server to do this, which is a better practice). If Qlik Sense is not sending custom response headers at all, then this would be a Qlik problem. Please see&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge/How-to-add-additional-response-headers-in-Qlik-Sense/ta-p/1717563" target="_blank" rel="noopener"&gt;How to add additional response headers in Qlik Sense&lt;/A&gt;&amp;nbsp;for information on how to send custom response headers in Qlik Sense. Please also see&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge/QlikView-WebServer-Custom-HTTP-Header/ta-p/1712716" target="_blank" rel="noopener"&gt;Can QlikView Send Custom HTTP Response Headers?&lt;/A&gt;&amp;nbsp;for more information on sending custom headers in Qlikview.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;LI-PRODUCT title="Qlik Sense Enterprise on Windows" id="qlikSenseEnterpriseWindows"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;BR /&gt;&lt;LI-PRODUCT title="QlikView" id="qlikView"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 13 Apr 2026 11:34:05 GMT</pubDate>
    <dc:creator>Sonja_Bauernfeind</dc:creator>
    <dc:date>2026-04-13T11:34:05Z</dc:date>
    <item>
      <title>What is CSP (Content-Security-Policy) and How does it Relate to Qlik?</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/What-is-CSP-Content-Security-Policy-and-How-does-it-Relate-to/ta-p/1710258</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;What is CSP (Content-Security-Policy)?&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;CSP helps to prevent cross-site scripting attacks by controlling what resources a browser can request from a server.&lt;BR /&gt;&lt;BR /&gt;Say a user navigates to &lt;A href="https://www.goodpage.com" target="test_blank"&gt;https://www.goodpage.com&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;The user's browser sends a GET request to&amp;nbsp;&lt;A href="https://www.goodpage.com" target="_blank" rel="noopener"&gt;https://www.goodpage.com&lt;/A&gt;, and the server in-turn responds with resources such as HTML, CSS, images, etc. In a cross-site scripting attack, the browser is tricked into making requests also to an unintended page such as &lt;A href="https://evilpage.com" target="test_blank"&gt;https://evilpage.com&lt;/A&gt;. Normally, browsers implement something called the Same Origin Policy; this restricts how scripts from one origin can interact with resources requested from a different origin (a same-origin meaning coming from the same protocol, domain, and port). However, this can be circumvented in various ways that are outside the scope of this article.&lt;BR /&gt;&lt;BR /&gt;What Content-Security-Policy allows a web administrator to do is send a custom set of instructions ("policies") to the browser (via the header, "Content-Security-Policy") that tells the browser to treat resources according to particular rules. For example, it's possible to tell the browser to only&amp;nbsp;execute&amp;nbsp;javascript resources from a specific domain, and if a browser attempts to do this it is also possible to send error reports to a specified URI. If a browser doesn't implement CSP, it will default to the Same Origin Policy.&lt;BR /&gt;&lt;BR /&gt;There is a wealth of information about this available online (such as Mozilla's developer documentation) if you wish to dig further into the specific details of how to implement various Content Security Policies.&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;How is CSP (Content-Security-Policy) Relevant to Qlik?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Generally speaking, it's not.&lt;BR /&gt;&lt;BR /&gt;CSP is implemented by the browser, and its implementation is therefore going to vary from browser to browser. If there is an issue with CSP or a general question about CSP with a specific browser version, then this is a browser issue and not a Qlik issue.&lt;BR /&gt;&lt;BR /&gt;The&amp;nbsp;&lt;I&gt;only&lt;/I&gt;&amp;nbsp;point where Qlik comes into the equation is if Qlik&amp;nbsp;&lt;I&gt;Sense&lt;/I&gt;&amp;nbsp;has been configured to send custom response headers (instead of using a frontend web server to do this, which is a better practice). If Qlik Sense is not sending custom response headers at all, then this would be a Qlik problem. Please see&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge/How-to-add-additional-response-headers-in-Qlik-Sense/ta-p/1717563" target="_blank" rel="noopener"&gt;How to add additional response headers in Qlik Sense&lt;/A&gt;&amp;nbsp;for information on how to send custom response headers in Qlik Sense. Please also see&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge/QlikView-WebServer-Custom-HTTP-Header/ta-p/1712716" target="_blank" rel="noopener"&gt;Can QlikView Send Custom HTTP Response Headers?&lt;/A&gt;&amp;nbsp;for more information on sending custom headers in Qlikview.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;LI-PRODUCT title="Qlik Sense Enterprise on Windows" id="qlikSenseEnterpriseWindows"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;BR /&gt;&lt;LI-PRODUCT title="QlikView" id="qlikView"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 11:34:05 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/What-is-CSP-Content-Security-Policy-and-How-does-it-Relate-to/ta-p/1710258</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2026-04-13T11:34:05Z</dc:date>
    </item>
    <item>
      <title>Re: What is CSP (Content-Security-Policy) and How does it Relate to Qlik?</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/What-is-CSP-Content-Security-Policy-and-How-does-it-Relate-to/tac-p/1998068#M7639</link>
      <description>&lt;P&gt;How to add content security policy in response headers?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 11:29:30 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/What-is-CSP-Content-Security-Policy-and-How-does-it-Relate-to/tac-p/1998068#M7639</guid>
      <dc:creator>_rohitgharat</dc:creator>
      <dc:date>2022-10-28T11:29:30Z</dc:date>
    </item>
    <item>
      <title>Re: What is CSP (Content-Security-Policy) and How does it Relate to Qlik?</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/What-is-CSP-Content-Security-Policy-and-How-does-it-Relate-to/tac-p/1998069#M7640</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/45381"&gt;@_rohitgharat&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are looking to add custom response headers in Qlik Sense (Enterprise on Windows), see&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/How-to-add-additional-response-headers-in-Qlik-Sense/ta-p/1717563" target="_blank" rel="noopener"&gt;How to add additional response headers in Qlik Sense&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Please note that we cannot advise on what headers to add.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 11:32:09 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/What-is-CSP-Content-Security-Policy-and-How-does-it-Relate-to/tac-p/1998069#M7640</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2022-10-28T11:32:09Z</dc:date>
    </item>
  </channel>
</rss>

