diff --git a/user_guide_src/source/general/common_functions.rst b/user_guide_src/source/general/common_functions.rst index a7b701241007..75d2cbebd13c 100755 --- a/user_guide_src/source/general/common_functions.rst +++ b/user_guide_src/source/general/common_functions.rst @@ -226,7 +226,7 @@ Miscellaneous Functions :rtype: string Returns the nonce attribute for a script tag. For example: ``nonce="Eskdikejidojdk978Ad8jf"``. - See :ref:`content-security-policy`. + See :ref:`Content Security Policy `. .. php:function:: csp_style_nonce() @@ -234,7 +234,7 @@ Miscellaneous Functions :rtype: string Returns the nonce attribute for a style tag. For example: ``nonce="Eskdikejidojdk978Ad8jf"``. - See :ref:`content-security-policy`. + See :ref:`Content Security Policy `. .. php:function:: csrf_token() diff --git a/user_guide_src/source/outgoing/csp.rst b/user_guide_src/source/outgoing/csp.rst index 0761f289a611..6d22edee0f25 100644 --- a/user_guide_src/source/outgoing/csp.rst +++ b/user_guide_src/source/outgoing/csp.rst @@ -21,7 +21,7 @@ the response's ``Content-Security-Policy`` header and offers various configurati options. This sounds complex, and on some sites, can definitely be challenging. For many simple sites, though, where all content -is served by the same domain (http://example.com), it is very simple to integrate. +is served by the same domain (e.g., **http://example.com**), it is very simple to integrate. As this is a complex subject, this user guide will not go over all of the details. For more information, you should visit the following sites: @@ -88,7 +88,12 @@ Inline Content It is possible to set a website to not protect even inline scripts and styles on its own pages, since this might have been the result of user-generated content. To protect against this, CSP allows you to specify a nonce within the -``