<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article How to determine string policy for Content Security Policy Header in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/ta-p/1715491</link>
    <description>&lt;P&gt;Customer policy adopted injection via the reverse proxy of the Content Security Policy header for security reasons.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The policy adopted is basic:&amp;nbsp;&lt;FONT face="courier new,courier"&gt;default-src 'self'&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;Opening the QlikView AccessPoint or Qlik Sense Hub may fail or the AccessPoint may only render partially.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Browser Debug tools will provide more insight:&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="content security errors identified in debug tools.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/62367i442E29DEB6A00CBB/image-size/large?v=v2&amp;amp;px=999" role="button" title="content security errors identified in debug tools.png" alt="content security errors identified in debug tools.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;LI-PRODUCT title="QlikView" id="qlikView"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;BR /&gt;&lt;LI-PRODUCT title="Qlik Sense Enterprise on Windows" id="qlikSenseEnterpriseWindows"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Header Content Security Option contains a string of rules that informs the browser which resource/code is trusted to be loaded, executed rendered.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;More details on the argument could be found here:&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;A href="https://www.w3.org/TR/CSP3/" target="_blank" rel="noopener"&gt;https://www.w3.org/TR/CSP3/&lt;/A&gt;&amp;nbsp;,&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 class="qlik-migrated-tkb-headings"&gt;&lt;FONT color="#339966"&gt;Resolution:&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;BR /&gt;For QlikView Accesspoint a first example is to use Content-Security-Policy: "default-src 'self' &amp;nbsp;'unsafe-inline' data: ;" ; (note that using 'unsafe-inline'&amp;nbsp; option could be unsafe in a the proxy injection scenario when the client will brose a different site , you could/evaluate to use instead the&amp;nbsp; sha256-hashcode version )&amp;nbsp;&amp;nbsp;&lt;BR /&gt;Further option could be necessary if for example you have QlikView Extension Object ( Server and Document Extensions) that are using external resources downloaded from CDN locations;&lt;BR /&gt;In this case the troubleshoot is the same use F12/Development Tools to check the resource that violates the policy and ad an exclusion.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;Related Content:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;BR /&gt;&lt;A href="https://community.qlik.com/t5/Knowledge/QlikView-Access-Point-not-loading-shows-a-blank-or-greyed-out/ta-p/1711810" target="_blank" rel="noopener"&gt;QlikView Access Point Shows "Loading Content" Indefinitely&lt;/A&gt;,&lt;BR /&gt;&lt;A href="https://community.qlik.com/t5/Knowledge/What-is-CSP-Content-Security-Policy-and-How-does-it-Relate-to/ta-p/1710258" target="_blank" rel="noopener"&gt;What is CSP (Content-Security-Policy) and How does it Relate to Qlik?&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 20 Sep 2021 13:14:01 GMT</pubDate>
    <dc:creator>Filippo_Nicolussi_P</dc:creator>
    <dc:date>2021-09-20T13:14:01Z</dc:date>
    <item>
      <title>How to determine string policy for Content Security Policy Header</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/ta-p/1715491</link>
      <description>&lt;P&gt;Customer policy adopted injection via the reverse proxy of the Content Security Policy header for security reasons.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The policy adopted is basic:&amp;nbsp;&lt;FONT face="courier new,courier"&gt;default-src 'self'&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;Opening the QlikView AccessPoint or Qlik Sense Hub may fail or the AccessPoint may only render partially.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Browser Debug tools will provide more insight:&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="content security errors identified in debug tools.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/62367i442E29DEB6A00CBB/image-size/large?v=v2&amp;amp;px=999" role="button" title="content security errors identified in debug tools.png" alt="content security errors identified in debug tools.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;LI-PRODUCT title="QlikView" id="qlikView"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;BR /&gt;&lt;LI-PRODUCT title="Qlik Sense Enterprise on Windows" id="qlikSenseEnterpriseWindows"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Header Content Security Option contains a string of rules that informs the browser which resource/code is trusted to be loaded, executed rendered.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;More details on the argument could be found here:&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;A href="https://www.w3.org/TR/CSP3/" target="_blank" rel="noopener"&gt;https://www.w3.org/TR/CSP3/&lt;/A&gt;&amp;nbsp;,&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 class="qlik-migrated-tkb-headings"&gt;&lt;FONT color="#339966"&gt;Resolution:&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;BR /&gt;For QlikView Accesspoint a first example is to use Content-Security-Policy: "default-src 'self' &amp;nbsp;'unsafe-inline' data: ;" ; (note that using 'unsafe-inline'&amp;nbsp; option could be unsafe in a the proxy injection scenario when the client will brose a different site , you could/evaluate to use instead the&amp;nbsp; sha256-hashcode version )&amp;nbsp;&amp;nbsp;&lt;BR /&gt;Further option could be necessary if for example you have QlikView Extension Object ( Server and Document Extensions) that are using external resources downloaded from CDN locations;&lt;BR /&gt;In this case the troubleshoot is the same use F12/Development Tools to check the resource that violates the policy and ad an exclusion.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;Related Content:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;BR /&gt;&lt;A href="https://community.qlik.com/t5/Knowledge/QlikView-Access-Point-not-loading-shows-a-blank-or-greyed-out/ta-p/1711810" target="_blank" rel="noopener"&gt;QlikView Access Point Shows "Loading Content" Indefinitely&lt;/A&gt;,&lt;BR /&gt;&lt;A href="https://community.qlik.com/t5/Knowledge/What-is-CSP-Content-Security-Policy-and-How-does-it-Relate-to/ta-p/1710258" target="_blank" rel="noopener"&gt;What is CSP (Content-Security-Policy) and How does it Relate to Qlik?&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Sep 2021 13:14:01 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/ta-p/1715491</guid>
      <dc:creator>Filippo_Nicolussi_P</dc:creator>
      <dc:date>2021-09-20T13:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to determine string policy for Content Security Policy Header</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2005644#M7797</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/36623"&gt;@Filippo_Nicolussi_P&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;How can we implement Content Security Policy in Qliksense Enterprise version?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Rohit Gharat&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 06:48:20 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2005644#M7797</guid>
      <dc:creator>rohitgharat</dc:creator>
      <dc:date>2022-11-17T06:48:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to determine string policy for Content Security Policy Header</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2007986#M7848</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/205182"&gt;@rohitgharat&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I believe I already provided you with an answer to this in a different post. Copying it in here for reference:&lt;/P&gt;
&lt;P&gt;If you are looking to add custom response headers in Qlik Sense (Enterprise on Windows), see&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/How-to-add-additional-response-headers-in-Qlik-Sense/ta-p/1717563" target="_blank" rel="noopener"&gt;How to add additional response headers in Qlik Sense&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Please note that we cannot advise on what headers to add.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 08:29:54 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2007986#M7848</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2022-11-23T08:29:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to determine string policy for Content Security Policy Header</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2483196#M14648</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;
&lt;P&gt;How can I create a SHA256 hashcode version as written in the solution in Qlik Sense Enterprise?&lt;/P&gt;
&lt;P&gt;Any other solution that makes the use of 'unsafe-inline' / 'unsafe-eval' in CSP unnecessary is also welcome.&lt;/P&gt;
&lt;P&gt;I am posting the question here because Qlik Support closed my ticket with the note:&lt;BR /&gt;&lt;EM&gt;&lt;SPAN&gt;Regarding your question about "How you can do to consider using the SHA256 hashcode version instead”, please go to this article (see below link) and post this question there. The author (owner) of this article or the content manager will provide answers/feedback&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Thank you very much for your help.&lt;/P&gt;
&lt;P&gt;Thorsten&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 10:48:46 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2483196#M14648</guid>
      <dc:creator>thorsten_wolff</dc:creator>
      <dc:date>2024-09-24T10:48:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to determine string policy for Content Security Policy Header</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2484634#M14689</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/32618"&gt;@thorsten_wolff&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have reached out to the support agent who has assisted you and am looking into what information we can provide you with.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2024 12:16:42 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2484634#M14689</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2024-10-01T12:16:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to determine string policy for Content Security Policy Header</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2484645#M14691</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/32618"&gt;@thorsten_wolff&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/28597"&gt;@Sonja_Bauernfeind&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding the sha-256 method/string to use it is proposed directly in the solution in case of the article screen-shot it correspond to the third shape highlighted:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="third-shape.png" style="width: 497px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/172375iC4AE1C04AE3F3A36/image-dimensions/497x180?v=v2" width="497" height="180" role="button" title="third-shape.png" alt="third-shape.png" /&gt;&lt;/span&gt; &amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here above in green.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The article was published 3 years ago; do the development tools still provide the sha-256 as above? Content Security Policy header is an integrations not provided natively by Qlik; as per introduction "Customer via reverse proxy was injecting that header".&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For updates and details possible suggestion is to give a look here&amp;nbsp;&lt;A href="https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP" target="_blank"&gt;https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP&lt;/A&gt;&amp;nbsp; &amp;nbsp;involving your IT Security Team.&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2024 12:47:19 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2484645#M14691</guid>
      <dc:creator>Filippo_Nicolussi_P</dc:creator>
      <dc:date>2024-10-01T12:47:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to determine string policy for Content Security Policy Header</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2484682#M14693</link>
      <description>&lt;P&gt;OK, I think I was thinking too complicatedly.&lt;BR /&gt;&lt;SPAN&gt;I used the F12/Development Tools and have&amp;nbsp;set &lt;FONT color="#FF0000"&gt;script-src 'self' 'sha256-AXWwKykxPuYO3+hAZ/9h0sc7xvhRQSSdNtWjehy0kcU='&lt;BR /&gt;&lt;/FONT&gt;&lt;/SPAN&gt;It still gives me the below error&lt;/P&gt;
&lt;P&gt;Refused to execute inline event handler because it violates the following Content Security Policy directive: "&lt;FONT color="#FF0000"&gt;script-src 'self' 'sha256-AXWwKykxPuYO3+hAZ/9h0sc7xvhRQSSdNtWjehy0kcU='&lt;/FONT&gt;". Either the 'unsafe-inline' keyword, a hash ('sha256-...'), or a nonce ('nonce-...') is required to enable inline execution. Note that hashes do not apply to event handlers, style attributes and javascript&amp;amp;colon; navigations unless the 'unsafe-hashes' keyword is present.&lt;/P&gt;
&lt;P&gt;Thank you for help.&lt;BR /&gt;Thorsten&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2024 14:29:35 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2484682#M14693</guid>
      <dc:creator>thorsten_wolff</dc:creator>
      <dc:date>2024-10-01T14:29:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to determine string policy for Content Security Policy Header</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2484817#M14695</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/32618"&gt;@thorsten_wolff&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you checked the guide&amp;nbsp;&lt;A href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src" target="_blank"&gt;https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src&lt;/A&gt;&amp;nbsp; for the updated version and how to?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2024 07:52:35 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2484817#M14695</guid>
      <dc:creator>Filippo_Nicolussi_P</dc:creator>
      <dc:date>2024-10-02T07:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to determine string policy for Content Security Policy Header</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2499713#M15190</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Community,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In Qlik sense enterprise, according to VAPT report there are some missing security headers which needs to be implemented. We are facing issue while adding the below security header in the virtual proxy.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;--&amp;gt; Content-Security-Policy: default-src 'self'&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;After implementing it we are unable to access qlik getting black/grey screen.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Articles followed:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-Securing-and-Hardening-Server/ta-p/1712239#:~:text=Optional:%20X-Content-Type,be%20changed%20and%20be%20followed" target="_blank" rel="noopener"&gt;https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-Securing-an...&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/ta-p/1715491" target="_blank" rel="noopener"&gt;How to determine string policy for Content Securit... - Qlik Community - 1715491&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="error5.JPG" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/176132iFFA566630ECB6BB1/image-size/large?v=v2&amp;amp;px=999" role="button" title="error5.JPG" alt="error5.JPG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="network.JPG" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/176133i01A439C8E989733C/image-size/large?v=v2&amp;amp;px=999" role="button" title="network.JPG" alt="network.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2025 10:51:04 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/How-to-determine-string-policy-for-Content-Security-Policy/tac-p/2499713#M15190</guid>
      <dc:creator>nilesh007</dc:creator>
      <dc:date>2025-01-02T10:51:04Z</dc:date>
    </item>
  </channel>
</rss>

