diff --git a/docs/ref/csrf.txt b/docs/ref/csrf.txt index 95e2e83d5c..175cbb7da0 100644 --- a/docs/ref/csrf.txt +++ b/docs/ref/csrf.txt @@ -276,10 +276,10 @@ The CSRF protection is based on the following things: enough under HTTP.) If the :setting:`CSRF_COOKIE_DOMAIN` setting is set, the referer is compared - against it. This setting supports subdomains. For example, - ``CSRF_COOKIE_DOMAIN = '.example.com'`` will allow POST requests from - ``www.example.com`` and ``api.example.com``. If the setting is not set, then - the referer must match the HTTP ``Host`` header. + against it. You can allow cross-subdomain requests by including a leading + dot. For example, ``CSRF_COOKIE_DOMAIN = '.example.com'`` will allow POST + requests from ``www.example.com`` and ``api.example.com``. If the setting is + not set, then the referer must match the HTTP ``Host`` header. Expanding the accepted referers beyond the current host or cookie domain can be done with the :setting:`CSRF_TRUSTED_ORIGINS` setting. diff --git a/docs/ref/settings.txt b/docs/ref/settings.txt index 429df374ad..e1b1410f62 100644 --- a/docs/ref/settings.txt +++ b/docs/ref/settings.txt @@ -318,7 +318,7 @@ Default: ``None`` The domain to be used when setting the CSRF cookie. This can be useful for easily allowing cross-subdomain requests to be excluded from the normal cross site request forgery protection. It should be set to a string such as -``"example.com"`` to allow a POST request from a form on one subdomain to be +``".example.com"`` to allow a POST request from a form on one subdomain to be accepted by a view served from another subdomain. Please note that the presence of this setting does not imply that Django's CSRF