Iframe Implementation

Iframe Implementation
 
 
Clickjacking Prevention
Clickjacking (also known as user-interface redress attack and iframe overlay) is used by attackers to trick users into clicking on a transparent layer (with malicious code) above legitimate buttons or clickable content for a site. To prevent clickjacking, you must prevent third-party sites from including your web site within an iframe.
While no security remediation can prevent every clickjacking, these are the minimum measures you must use for modern web browsers:
You are required to implement the recommended prevention techniques in your web site. See the OWASP clickjacking page and the Cross-Site scripting page for current information.
Web application protections for Cross-site Scripting (XSS), Cross-Site Request Forgery (CSRF), etc. must also be incorporated.
For CSRF protection, you are strongly encouraged to use a synchronized token pattern. This measure requires generating a randomized token associated with the user session. The token will be inserted whenever an HTTP request is sent to the server. Your server application will verify that the token from the request is the same as the one associated with the user session.
Iframe Transaction Endpoints
For iframe transaction endpoints and supported transaction types for each endpoint, see Endpoints and Transaction Types.