retweet icon bullhorn icon reply icon info icon flickr icon tumblr icon vimeo icon reddit icon podcast icon angle-down icon angle-left icon angle-right icon angle-up icon ban icon hamburger icon book icon bookmark icon bug icon caret-down icon caret-left icon caret-right icon caret-up icon chain icon check icon check-circle icon chevron-down icon chevron-left icon chevron-right icon chevron-up icon circle icon circle-o icon clone icon close icon download-cloud icon code icon download icon ellipsis icon envelope icon warning icon external-link icon eye icon eye-slash icon facebook icon github icon google-plus icon heart icon heart-o icon home icon info-circle icon instagram icon linkedin icon lock icon medium icon minus-circle icon send icon pause-circle icon play-circle icon plus-circle icon question-circle icon quote-left icon quote-right icon rss-square icon search icon share-alt icon slack icon snapchat icon ticket icon twitter icon wheelchair icon youtube icon Skip to main content
University of Texas at Austin - home
    Home
  • Home
  • Quick Links
    • Office of the CIO
    • University IT Policies
    • UT Austin Disaster Recovery Planning (UT Ready)
    • Acceptable Use Acknowledgement Form (for staff/faculty)
    • Travel to Foreign Adversary Nations
    • Security Exception Request
    • Stolen Equipment Report Form
    • Engagement Request Form
    • Anti-Virus Software
    • Vendor Product Security Assessment Request
    • Hall of Fame
    • Why You Should Work In Cybersecurity
  • Policies
    • Information Resources Use and Security Policy
    • Acceptable Use Policy for University Employees
    • Acceptable Use Policy for University Students
    • Digital Millennium Copyright Act
    • Policies, Standards, and Guidelines Continued
    • Minimum Security Standards
  • Support Topics
    • Security Awareness
    • Compromised Credentials
    • EDUCATION & OUTREACH
    • GETTING ANTI-VIRUS
    • ISORA
    • PROCEDURAL DOCUMENTATION
    • Stache Basics
    • VULNERABILITY MANAGEMENT PROGRAM
    • WAYS TO IMPROVE YOUR SECURITY POSTURE - IT SUPPORT COMMUNITY
  • Report Violation
  • Contact

Restrict Session Cookie To A Particular Domain And Path

Restrict Session Cookie To A Particular Domain And Path

Breadcrumb

  • Home
  • Restrict Session Cookie To A Particular Domain And Path
Submitted by Anonymous (not verified) on Wed, 07/29/2015 - 12:08
Section
2.1.10
Top Level
Session Management
Sub Level
2.1 Session Cookies
General
Restricting the session cookie to only the parts of the site that require the user to be authenticated will help to prevent its inadvertent disclosure.
Django

Use the SESSION_COOKIE_DOMAIN and SESSION_COOKIE_PATH settings.

ISO eye

Information Security Office

Copyright © 2006-2025, Information Security Office. All rights reserved.
Privacy Policy  |   Accessibility Policy
UT Austin logo