Free 1-Year Domain Offer with WordPress GO Service

This blog post provides a comprehensive overview of Cross-Origin Resource Sharing (CORS), a critical part of web security. It explains what CORS is and why it is important for web applications, while providing information about its history and development. The key benefits of using CORS are highlighted, and the configuration steps are explained with a simple guide. By delving into technical details, CORS errors and solutions are examined in detail. Strategies and policy implementation examples to enhance the security of CORS are presented. Additionally, common misconceptions about CORS are dispelled and the most important points to know about it are summarized. It's a comprehensive guide to CORS for web developers.
Cross-Origin Resource Sharing (CORS) is a security mechanism for web browsers that allows or prevents a web page from accessing resources from a different domain. Essentially, it allows a web application to control its access to resources outside its domain (e.g., APIs, fonts, images). CORS is one of the cornerstones of modern web security and plays a critical role in ensuring the security of web applications.
CORS is particularly crucial in modern web development approaches, such as single-page applications (SPAs) and microservices architectures. Such applications often depend on APIs and other resources in different domains. By ensuring that these resources are shared securely, CORS prevents malicious sites from accessing sensitive data. If there were no CORS mechanism, any website could use JavaScript to steal or modify another site's user data.
CORS is vital for web security because it works with the same Same-Origin Policy (SOP) to protect the data of web applications and users. An SOP allows a web page to access resources only on the same domain, protocol, and port. CORS, on the other hand, relaxes the SOP, allowing access to resources from different domains under certain conditions. This allows web applications to be more flexible and functional while also maintaining security.
Correct configuration of CORS is essential for the security of web applications critical importance Contain. A misconfigured CORS policy can make web applications vulnerable to various vulnerabilities. Therefore, understanding how CORS works and how to configure it correctly is important for any web developer.
Cross-Origin Resource Sharing (CORS) is an indispensable part of modern web applications, but the roots and evolution of this technology are crucial for understanding its relevance today. Initially, web browsers were limited to the same-origin policy, which allowed a resource to access only resources from its own domain. This significantly limited the development of modern web applications that required pulling data from different domains. CORS was developed to bypass these restrictions and make cross-origin requests securely.
The development of CORS began as a response to the practical challenges faced by web developers. In particular, the need to collect data from different sources and access APIs required a solution to enable web applications to be more dynamic and feature-rich. Based on this need, standards have been set by the World Wide Web Consortium (W3C) and how browsers and servers should interact has been defined. These standards aimed to offer developers more flexibility while also minimizing security vulnerabilities.
| Year | Development | Explanation |
|---|---|---|
| Early 2000s | Initial Needs | Web developers have recognized the need to pull data from different domains. |
| 2004 | Initial Solutions | Workarounds like JSONP have emerged, but they contained vulnerabilities. |
| 2009 | W3C Studies | The W3C has begun developing standards for CORS. |
| 2010+ | Widely Usage | CORS became supported by modern browsers and became widely used. |
The evolution of CORS has progressed, constantly considering the balance between web security and functionality. While the initial implementations were sufficient for simple requests, they have been expanded over time to support more complex scenarios. For example, the preflight request mechanism provides an additional layer of security to check whether the server allows a particular cross-origin request. These and similar enhancements have made CORS a foundational technology that enables modern web applications to run securely and effectively.
Development Stages of CORS
Today, CORS is a critical mechanism that enables web applications to securely exchange data from different sources. However CORSProper configuration and implementation of is of paramount importance to prevent security vulnerabilities. A misconfigured CORS policy can allow malicious actors to access sensitive data. Therefore, web developers need to have a good understanding of the basic principles of CORS and the correct configuration methods.
Cross-Origin Resource Sharing (CORS) is an indispensable mechanism for enhancing the security and functionality of modern web applications. It offers great flexibility to web developers by enabling the secure exchange of data between sources that do not have the same origin. This flexibility provided by CORS facilitates the integration of services in different domains and enriches the user experience.
One of the main benefits of CORS is the Same origin policy (Same-Origin Policy). This policy only allows a web page to access resources with the same protocol, the same port (if specified), and the same host. CORS allows servers to specify which origins to allow requests from, safely loosening these restrictions.
Advantages of CORS
In the table below, you can explore the key features and advantages of CORS in more detail:
| Feature | Explanation | Advantage |
|---|---|---|
| Cross-Origin Requests | HTTP requests from different domains. | It enables data sharing and service integration. |
| Preflight Requests | OPTIONS method, which controls the server's CORS policy. |
It ensures secure data transfer and prevents potential security vulnerabilities. |
| Allowed Origins | A list of domains that the server allows requests from. | It provides controlled and safe access. |
| Credential Support | It enables the sharing of information such as cookies and authentication headers. | It supports user sessions and personalized experiences. |
Proper configuration of CORS is critical for the security of web applications. A misconfigured CORS policy can allow attackers to access sensitive data or execute malicious code. Therefore, careful planning and implementation of CORS configuration is of great importance to ensure web security.
Cross-Origin Resource Configuring Sharing (CORS) is critical for securing your web applications and orchestrating the exchange of data from different sources. This configuration allows you to control a web page's access to resources through a different domain. A misconfigured CORS policy can lead to security vulnerabilities, while a correctly configured CORS enhances the security of your application and ensures its smooth operation.
Before you begin configuring CORS, it's important to determine the needs of your application and what resources it needs access to. This helps you understand which domains are trusted and which HTTP methods (GET, POST, PUT, DELETE, etc.) should be allowed. This analysis allows you to take further configuration steps more informed.
During CORS configuration, it is essential to set the appropriate HTTP headers on the server side. The 'Access-Control-Allow-Origin' header specifies which domains can access the resource. The 'Access-Control-Allow-Methods' header defines which HTTP methods can be used. The 'Access-Control-Allow-Headers' header specifies which custom headers can be included in the request. Properly configuring these headers ensures that your application operates securely and compliantly.
| HTTP Header | Explanation | Sample Value |
|---|---|---|
| Access-Control-Allow-Origin | Allowed resource domains | https://example.com |
| Access-Control-Allow-Methods | Allowed HTTP methods | GET, POST, PUT |
| Access-Control-Allow-Headers | Allowed custom titles | Content-Type, Authorization |
| Access-Control-Allow-Credentials | Allow cookies to be sent | true |
It's important to properly handle CORS errors and provide meaningful feedback to your users. CORS errors that appear in the browser console are often a sign of a misconfigured CORS policy. To fix these errors, check your server-side configuration and make the necessary corrections. Also, to improve the security of your app CORS Regularly review your policies and keep them up to date.
Cross-Origin Resource Sharing (CORS) is a mechanism by which web browsers allow web pages loaded from one origin to access resources from a different source. Essentially, it makes it possible for a web page to request resources through a different domain, protocol, or port. This mechanism is critical for meeting the modern requirements of web applications. However, it can pose serious security risks if not configured correctly.
Before delving into the technical details of CORS, it's important to understand the concept of origin. A resource consists of a combination of protocol (http/https), domain (example.com), and port (80/443). If any of these three components are different, the two sources are considered different. CORS is shaped around the Same-Origin Policy, a security measure implemented by browsers.
| Scenario | Request Source | Target Source | Is CORS Necessary? |
|---|---|---|---|
| Same Domain | http://example.com | http://example.com/api | No |
| Different Port | http://example.com:8080 | http://example.com:3000/api | Yes |
| Different Protocol | http://example.com | https://example.com/api | Yes |
| Different Domain | http://example.com | http://api.example.com/api | Yes |
CORS is controlled via HTTP headers on the server side. When the browser makes a cross-origin request, the server responds to the request with specific CORS headers. These headers specify which resources are allowed to access the browser, what HTTP methods (GET, POST, etc.) can be used, and what custom headers can be sent. The most important title sent by the server is the Access-Control-Allow-Origin is the title. This header specifies which resources are allowed to access. A single source, multiple sources, or a wildcard (*) can be used as a value. When a wildcard is used, all resources are allowed, but this can be risky from a security perspective.
The CORS mechanism supports two types of requests: simple requests and preflight requests. Simple requests are requests that satisfy certain conditions (for example, using the GET, HEAD, or POST methods and using certain headers). Preflight requests, on the other hand, are more complex requests and a preflight request is sent to the server using the OPTIONS method to check whether the actual request can be sent securely.
While CORS is designed to enhance the security of web applications, it can create vulnerabilities if misconfigured. For example Access-Control-Allow-Origin The use of a wildcard (*) in the title can allow a malicious website to access sensitive data. Therefore It is important to carefully determine which resources are allowed access.
Another point to be considered in terms of security is, Access-Control-Allow-Credentials is the use of the title. This header allows credentials (cookies, HTTP authentication) to be sent with cross-origin requests. If this header is accidentally enabled, attacks such as cross-site scripting (XSS) can become more dangerous.
CORS configuration can also have performance implications. Preflight requests cause an additional HTTP request to be sent for each cross-origin request. This can negatively impact performance, especially in applications that frequently make cross-origin requests. Therefore, various optimization techniques can be employed to minimize preflight requests. For example, using simple requests or employing server-side caching mechanisms can improve performance.
It is important to test and monitor the CORS configuration correctly. By using browser developer tools or specialized CORS testing tools, CORS errors can be detected and resolved. Additionally, regular checks should be conducted to ensure that CORS headers are set correctly on the server side.
Cross-Origin Resource Sharing (CORS) errors are one of the common problems encountered in the web development process. These errors occur when a web page attempts to access resources (e.g., JavaScript files, CSS, or API data) from a different domain. For security reasons, browsers apply a same-origin policy, which blocks requests from different sources by default. CORS is a mechanism developed to alleviate these constraints and enable the secure exchange of data from different sources. However, misconfigurations or missing settings can lead to CORS errors.
| Error Code | Explanation | Possible Solution |
|---|---|---|
| No 'Access-Control-Allow-Origin' header is present on the requested resource. | The server does not contain the header 'Access-Control-Allow-Origin' for the requested resource. | On the server side, configure the 'Access-Control-Allow-Origin' header. |
| The 'Access-Control-Allow-Origin' header contains the invalid value 'null'. | The 'Access-Control-Allow-Origin' header contains an invalid 'null' value. | On the server side, set the correct domain name or '*' (for all resources). |
| Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource. | The same Resource Policy prevents the remote resource from being read. | Check the CORS configuration and provide the necessary permissions on the server side. |
| CORS preflight channel did not succeed. | The CORS preflight request failed. | Configure the correct CORS headers for the OPTIONS request on the server side. |
Understanding and resolving CORS errors is critical for the smooth operation of web applications. These errors are usually indicated by detailed error messages in the browser console. These messages offer important clues to understand the source of the error and possible solutions. For instance, if an error message states that the server does not contain the 'Access-Control-Allow-Origin' header, it is necessary to configure this header appropriately on the server side. Additionally, failure of preflight requests may indicate that the server is not handling OPTIONS requests correctly.
CORS Errors and Solution Methods
The resolution of CORS errors is usually related to server-side configurations. However, in some cases, client-side solutions can also be produced. For example, CORS issues can be overcome by using a proxy server or trying alternative data retrieval methods like JSONP. However, it's important to note that such solutions are not always the best option and may pose security risks. The most secure and permanent solution is to configure the correct CORS headers on the server side. Configuring CORS correctly ensures both security and enables data exchange from different sources.
One of the most important points about CORS is that security is the subject. While CORS is a mechanism designed to enhance the security of web applications, misconfigurations can lead to security vulnerabilities. For example, setting the 'Access-Control-Allow-Origin' header to '*' means that all domains can access the resource, which can be risky in terms of security. Therefore, it is important to make CORS configurations carefully and only allow trusted sources. Web developers need to have a good understanding of how CORS works and the potential security risks.
Cross-Origin Resource Sharing (CORS) is a critical mechanism for securing web applications. However, with misconfigured or incomplete security measures, CORS can lead to potential vulnerabilities. Therefore, it is important to implement various strategies to enhance the security of CORS. These strategies are designed to prevent unauthorized access, protect sensitive data, and strengthen the overall security of web applications.
The first step to improve the security of CORS is to It is the correct configuration of the Origin header. On the server side, only trusted and authorized sources (origin) should be allowed access. The use of Wildcards (*) should be avoided, as it increases security risk by allowing access to all resources. Instead, a list of specific resources should be created and only those resources should be granted access.
The following table contains some headings and their descriptions that can be used to improve CORS security. Proper configuration of these headers is essential to prevent unauthorized access and ensure data security.
| Title | Explanation | Sample Value |
|---|---|---|
| Access-Control-Allow-Origin | Specifies the resources to which access is allowed. | https://example.com |
| Access-Control-Allow-Methods | Specifies the allowed HTTP methods. | GET, POST, PUT, DELETE |
| Access-Control-Allow-Headers | Specifies the allowed titles. | Content-Type, Authorization |
| Access-Control-Allow-Credentials | Specifies whether it is allowed to send credentials (cookies, authorization headers). | true |
Regular auditing of CORS configurations and needs to be updated. As new vulnerabilities and threats emerge, it is important to adjust CORS policies accordingly. In addition, the CORS policies of all third-party libraries and services that the web application uses should also be reviewed. In this way, possible security risks can be minimized and the overall security of the web application can be ensured.
Cross-Origin Resource Sharing (CORS) policies define the security mechanisms of web browsers that restrict web pages loaded from one origin from accessing resources from a different source. These policies aim to enhance user security by preventing malicious websites from accessing sensitive data. Essentially, CORS allows a web application to retrieve data only from permitted sources, thus preventing unauthorized access.
The implementation of CORS policies is determined by server-side configurations. The server specifies which resources are allowed to access via HTTP headers. By looking at these headers, the browser checks whether the resource from which the request is made is allowed. If the resource is not allowed, the browser blocks the request and displays an error message in the JavaScript console. In this way, web applications can run securely without any changes on the client side.
| HTTP Header | Explanation | Sample Value |
|---|---|---|
| Access-Control-Allow-Origin | Specifies the allowed resources. | https://example.com |
| Access-Control-Allow-Methods | Specifies the allowed HTTP methods. | GET, POST, PUT |
| Access-Control-Allow-Headers | Specifies allowed custom headers. | X-Custom-Header, Content-Type |
| Access-Control-Allow-Credentials | Specifies whether to send credentials (cookies, authorization headers). | true |
Configuring CORS policies can sometimes be complex, and misconfigurations can lead to security vulnerabilities. For example Access-Control-Allow-Origin: * means allowing access to all resources, which can be risky in some cases. Therefore, it is important to carefully configure CORS policies and allow only the resources that are necessary. Security experts recommend regularly reviewing CORS configurations and conducting security tests.
Enforcement of CORS policies may vary slightly between browsers. But in general, all modern browsers support CORS standards and work according to the same basic principles. Browsers analyze HTTP headers from the server to check whether the resource from which the request is made is allowed. If the resource is not allowed, the browser blocks the request and shows an error message to the user.
Below are some examples of applications for configuring and testing CORS policies:
Access-Control-Allow-Origin Specify which resources are allowed to access by setting their titles.OPTIONS Correctly respond to preflight requests made with the method, ensuring that complex CORS requests run smoothly.Access-Control-Allow-Credentials header to allow or block the sending of credentials such as cookies and authorization headers.CORS is an essential part of web security, and when configured correctly, it can significantly enhance the security of web applications. However, misconfigurations or deficiencies can lead to security vulnerabilities. Therefore, understanding and correctly implementing CORS policies is critical for web developers and security professionals.
CORS is an indispensable tool for securing modern web applications. Properly configured CORS policies protect user data by preventing unauthorized access.
Cross-Origin Resource Sharing (CORS) is a topic that is often misunderstood among web developers. These misunderstandings can lead to unnecessary security concerns or misconfigurations. Having a clear understanding of what CORS does and doesn't do is critical for ensuring the security and functionality of your web applications.
Many developers perceive CORS as a kind of firewall. However, this is not true. CORS is a security mechanism implemented by browsers, allowing the server to specify domains to which it grants access to specific resources. Rather than preventing malicious attacks, CORS Client-side restricts access to unauthorized resources.
Aşağıdaki tablo, CORS ile ilgili bazı yaygın senaryoları ve bu senaryolarda yapılması gereken doğru yapılandırmaları özetlemektedir. Bu tablo, CORS’u doğru bir şekilde anlamanıza ve uygulamanıza yardımcı olacaktır.
| Scenario | Explanation | Gerekli CORS Başlığı |
|---|---|---|
| Basit İstek (GET, HEAD) | Cross-origin’den yapılan basit bir GET veya HEAD isteği. | Access-Control-Allow-Origin: * veya belirli bir alan adı |
| Preflight İstek (OPTIONS) | PUT veya DELETE gibi metotlarla yapılan ve özel başlıklar içeren istekler. | Access-Control-Allow-Origin: *, Access-Control-Allow-Methods: PUT, DELETE, Access-Control-Allow-Headers: Content-Type |
| Kimlik Bilgileriyle İstek (credentials) | Çerezler veya yetkilendirme başlıkları içeren istekler. | Access-Control-Allow-Origin: belirli bir alan adı, Access-Control-Allow-Credentials: true |
| Herhangi Bir Alan Adına İzin Verme | Tüm alan adlarından gelen isteklere izin verme. | Access-Control-Allow-Origin: * (Güvenlik açığına neden olabileceği için dikkatli kullanılmalıdır) |
CORS’un doğru anlaşılması, web uygulamalarınızın güvenliğini ve işlevselliğini artırmanın anahtarıdır. Bu nedenle, CORS ile ilgili yanlış anlamaları gidermek ve doğru uygulamaları benimsemek önemlidir. Unutmayın ki CORS, ek bir güvenlik katmanı sağlamakla birlikte, tek başına bir güvenlik çözümü değildir. Diğer güvenlik önlemleriyle birlikte kullanılmalıdır.
Cross-Origin Resource Sharing (CORS), modern web uygulamalarının güvenliğini sağlamak için kritik bir mekanizmadır. Temel olarak, bir web sayfasının farklı bir domainden kaynaklara (örneğin, JavaScript, fontlar, resimler) erişmesini kontrol eder. Tarayıcılar, varsayılan olarak aynı köken politikasını (Same-Origin Policy) uygular, bu da bir kökenin diğerine erişimini sınırlar. CORS, bu kısıtlamaları güvenli bir şekilde gevşeterek, geliştiricilere esneklik sunar.
CORS’un nasıl çalıştığını anlamak için, sunucunun istemciye hangi kökenlere izin verdiğini belirten HTTP başlıklarını incelemek önemlidir. Örneğin, Access-Control-Allow-Origin başlığı, hangi kökenlerin kaynağa erişebileceğini belirtir. Eğer bu başlıkta istemcinin kökeni belirtilmişse veya joker karakter (*) kullanılmışsa, erişime izin verilir. Ancak, joker karakterin hassas verilerle kullanılması güvenlik riskleri oluşturabilir.
| Başlık Adı | Explanation | Sample Value |
|---|---|---|
| Access-Control-Allow-Origin | Kaynağa erişebilecek kökenleri belirtir. | https://example.com, * |
| Access-Control-Allow-Methods | Specifies the allowed HTTP methods. | GET, POST, PUT |
| Access-Control-Allow-Headers | Specifies the allowed titles. | Content-Type, Authorization |
| Access-Control-Expose-Headers | İstemciye gösterilecek başlıkları belirtir. | X-Custom-Header |
CORS hataları, geliştirme sürecinde sıkça karşılaşılan sorunlardandır. Bu hataların temel nedeni, sunucunun doğru CORS başlıklarını göndermemesidir. Hata mesajları genellikle tarayıcı konsolunda belirir ve sorunun kaynağını anlamanıza yardımcı olur. Bu hataları çözmek için, sunucu tarafında doğru yapılandırmaların yapılması ve gerekli başlıkların eklenmesi gereklidir.
Access-Control-Allow-Origin başlığını ayarlayın.Access-Control-Allow-Methods) açıkça belirtin.Access-Control-Allow-Headers) doğru yapılandırın.CORS’un sadece bir güvenlik mekanizması olmadığını, aynı zamanda web uygulamalarının işlevselliğini artıran bir araç olduğunu unutmamak önemlidir. Doğru yapılandırıldığında, farklı kaynaklardan veri çekme ve paylaşma yeteneği sayesinde daha zengin ve etkileşimli web deneyimleri oluşturulabilir. Ancak, her zaman güvenlik önlemlerini ön planda tutarak, potansiyel riskleri en aza indirmek önemlidir.
CORS, web uygulamalarının güvenliği açısından neden bu kadar kritik öneme sahip?
CORS, tarayıcı tabanlı web uygulamalarının farklı kaynaklardan (domain, protokol, port) veri çekmesini kontrol ederek, kötü niyetli web sitelerinin kullanıcı verilerine erişmesini engeller. Bu sayede kullanıcı gizliliği ve uygulama bütünlüğü korunmuş olur. Temelde, bir güvenlik duvarı görevi görür.
CORS'un geliştirilme süreci nasıl oldu ve hangi ihtiyaçlardan doğdu?
CORS, web uygulamalarının API'lere erişiminin giderek artmasıyla birlikte ortaya çıkan bir ihtiyaçtan doğdu. Aynı Kaynak İlkesi (Same-Origin Policy) bazı durumlarda çok kısıtlayıcı kalıyordu ve geliştiricilerin farklı domain'lerden güvenli bir şekilde veri alışverişi yapmasına izin verecek bir mekanizma gerekiyordu. W3C tarafından standartlaştırıldı ve zamanla web tarayıcıları tarafından benimsendi.
CORS kullanmak yerine başka hangi alternatif yöntemler tercih edilebilir ve CORS'un diğerlerine göre avantajları nelerdir?
CORS'a alternatif olarak JSONP (JSON with Padding) gibi yöntemler kullanılabilir. Ancak JSONP sadece GET isteklerini destekler ve daha az güvenlidir. CORS, hem GET hem de diğer HTTP metodlarını (POST, PUT, DELETE vb.) destekler ve daha güvenli bir mekanizma sunar. Ayrıca CORS, sunucu tarafında daha ince ayar yapma imkanı tanır.
CORS yapılandırmasını daha anlaşılır hale getirmek için en temel adımlar nelerdir ve dikkat edilmesi gereken hususlar nelerdir?
CORS yapılandırmasının temel adımları arasında sunucu tarafında 'Access-Control-Allow-Origin' başlığını ayarlamak yer alır. Bu başlık, hangi domain'lerin kaynağa erişmesine izin verildiğini belirtir. Dikkat edilmesi gereken en önemli nokta, '*' karakterinin kullanımının kontrollü olmasıdır. Gerekli değilse, belirli domain'ler belirtilmelidir.
Preflight isteği (OPTIONS isteği) tam olarak nedir ve CORS mekanizmasındaki rolü nedir?
Preflight isteği, tarayıcının sunucuya asıl isteği göndermeden önce yaptığı bir ön kontroldür. OPTIONS metodu ile gönderilir ve sunucudan, asıl isteğin (örneğin, POST) yapılmasına izin verilip verilmediğini sorar. Bu, özellikle 'simple request' olmayan istekler için güvenlik önlemi olarak kullanılır. Sunucu, bu isteğe uygun CORS başlıklarıyla yanıt verirse asıl istek gönderilir.
Sık karşılaşılan CORS hatalarının en belirgin nedenleri nelerdir ve bu hataları gidermek için pratik çözüm önerileri nelerdir?
Sık karşılaşılan CORS hatalarının nedenleri arasında sunucu tarafında yanlış veya eksik CORS başlıkları, domain uyuşmazlığı ve ön kontrol isteğinin (preflight) başarısız olması yer alır. Çözüm önerileri arasında sunucu tarafındaki CORS başlıklarını kontrol etmek, izin verilen domain'leri doğru yapılandırmak ve ön kontrol isteğinin başarıyla tamamlanmasını sağlamak yer alır.
CORS'un güvenliğini artırmak için hangi ileri düzey teknikler ve stratejiler uygulanabilir?
CORS'un güvenliğini artırmak için 'Access-Control-Allow-Credentials' başlığının dikkatli kullanımı, 'Access-Control-Expose-Headers' başlığı ile sadece gerekli başlıkların istemci tarafına sunulması, 'Origin' başlığının sunucu tarafında doğrulanması ve Subresource Integrity (SRI) gibi ek güvenlik önlemleri alınabilir.
CORS hakkında geliştiriciler arasında en sık karşılaşılan yanlış anlaşılan konular nelerdir ve bu yanlış anlamaları gidermek için neler söylenebilir?
CORS hakkında en sık karşılaşılan yanlış anlama, '*' değerinin 'herkese izin ver' anlamına geldiği ve her zaman güvenli olduğudur. Bu doğru değildir. '*' değeri, kimlik bilgileri (credentials) gerektiren isteklerde kullanılamaz ve potansiyel güvenlik riskleri taşır. Geliştiricilerin belirli domain'leri belirtmesi ve 'Access-Control-Allow-Credentials' başlığının ne anlama geldiğini tam olarak anlaması önemlidir.
More information: MDN Web Docs: Cross-Origin Resource Sharing (CORS)
Leave a Reply