Frame Ancestors
Starting with Appsmith v1.7.10, you can control where your apps can be loaded in a frame.

Why should I control this?

Allowing your Appsmith apps to be embedded on any website makes them susceptible to clickjacking attacks. Controlling this is one of the simplest ways to avoid these attacks.
By default, starting Appsmith v1.7.10, apps cannot be loaded in a frame/iframe on domains other than the app's domain. That is, if your Appsmith is available at http://mydomain.com, then only pages on http://mydomain.com will be able to embed apps.
To change/customize this, we've introduced the APPSMITH_ALLOWED_FRAME_ANCESTORS environment variable. To allow another domain like http://trusted-other.com to also embed apps from your Appsmith, use:
APPSMITH_ALLOWED_FRAME_ANCESTORS="'self' http://trusted-other.com"
Or, to allow all subdomains on mycompany.com, use:
APPSMITH_ALLOWED_FRAME_ANCESTORS="'self' http://*.mycompany.com"
You can add multiple entries by separating them with spaces. For example:
APPSMITH_ALLOWED_FRAME_ANCESTORS="'self' http://trusted-other.com http://*.mycompany.com"
Under the covers, this feature uses a Content-Security-Policy header with the frame-ancestors directive. You can read more on the same here.
Copy link
Edit on GitHub