Skip to content

Conversation

@mrajput7-db
Copy link

Example of Secure Flask Apps with and without OBO(On behalf of User Autorization) and Origin Based CSRF Implementation

flask-secure-app-sp

Uses Service Principal authentication with token-based CSRF protection (Flask-WTF) and SQL injection prevention via Databricks IDENTIFIER clause.

csrf_safe-using-origin

Implements On-Behalf-Of-User (OBO) authentication with Origin header validation for CSRF protection, demonstrating an alternative to token-based CSRF. Uses parameterized queries with placeholder binding for SQL injection prevention on a fixed table schema.

flask-secure-app-obo

Combines OBO authentication with robust token-based CSRF protection (Flask-WTF) and Databricks IDENTIFIER clause for SQL injection prevention.

Example of Secure Flask Apps with and without OBO(On behalf of User Autorization) and Origin Based CSRF Implementation

## flask-secure-app-sp
Uses Service Principal authentication with token-based CSRF protection (Flask-WTF) and SQL injection prevention via Databricks `IDENTIFIER` clause.

## csrf_safe-using-origin
Implements On-Behalf-Of-User (OBO) authentication with Origin header validation for CSRF protection, demonstrating an alternative to token-based CSRF. Uses parameterized queries with placeholder binding for SQL injection prevention on a fixed table schema.

## flask-secure-app-obo
Combines OBO authentication with robust token-based CSRF protection (Flask-WTF) and Databricks `IDENTIFIER` clause for SQL injection prevention.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant