X-Frame-Options Allow-From multiple domains

x-frame-options allow-from all
nginx x-frame-options allow-from
iframe whitelist domain
x-frame-options apache
<meta http-equiv="x-frame-options" content="allow">
allow iframe from specific domain
umbraco x frame options
x-frame-options browser support

I have an ASP.NET 4.0 IIS7.5 site which I need secured using the X-Frame-Options header.

I also need to enable my site pages to be iframed from my same domain as well as from my facebook app.

Currently I have my site configured with a site headed of:

Response.Headers.Add("X-Frame-Options", "ALLOW-FROM SAMEDOMAIN, www.facebook.com/MyFBSite")

When I viewed my Facebook page with Chrome or Firefox my sites pages (being iframed with my facebook page) are display ok, but under IE9, I get the error:

"this page cannot be displayed…" (because of the X-Frame_Options restriction).

How do I set the X-Frame-Options: ALLOW-FROM to support more than a single domain?

X-FRAME-OPTION being a new feature seems fundamentally flawed if only a single domain can be defined.

X-Frame-Options is deprecated. From MDN:

This feature has been removed from the Web standards. Though some browsers may still support it, it is in the process of being dropped. Do not use it in old or new projects. Pages or Web apps using it may break at any time.

The modern alternative is the Content-Security-Policy header, which along many other policies can white-list what URLs are allowed to host your page in a frame, using the frame-ancestors directive. frame-ancestors supports multiple domains and even wildcards, for example:

Content-Security-Policy: frame-ancestors 'self' example.com *.example.net ;

Unfortunately, for now, Internet Explorer does not fully support Content-Security-Policy.

UPDATE: MDN has removed their deprecation comment. Here's a similar comment from W3C's Content Security Policy Level

The frame-ancestors directive obsoletes the X-Frame-Options header. If a resource has both policies, the frame-ancestors policy SHOULD be enforced and the X-Frame-Options policy SHOULD be ignored.

Apache X-Frame-Options Allow-From multiple domains, <Location /myapp> # For the context /myapp, whitelist multiple domains Header append X-Frame-Options "ALLOW-FROM https://raastech.com"  Include multiple domains in ALLOW-FROM for X-Frame-Options (Apache) Every single forum, blog post, and documentation online will tell you the same thing that it's not possible to whitelist multiple domains with X-Frame-Options and to use Content-Security-Policy instead or some complicated and messy JavaScript as alternatives. I'm here to tell you that they're all wrong.

From RFC 7034:

Wildcards or lists to declare multiple domains in one ALLOW-FROM statement are not permitted


How do I set the X-Frame-Options: ALLOW-FROM to support more than a single domain?

You can't. As a workaround you can use different URLs for different partners. For each URL you can use it's own X-Frame-Options value. For example:

partner   iframe URL       ALLOW-FROM
Facebook  fb.yoursite.com  facebook.com
VK.COM    vk.yoursite.com  vk.com

For yousite.com you can just use X-Frame-Options: deny.

BTW, for now Chrome (and all webkit-based browsers) does not support ALLOW-FROM statements at all.

Include multiple domains in ALLOW-FROM for X-Frame-Options, The question is “how do I whitelist multiple domains with X-FRAME-OPTIONS? our server side, we can make the decision whether or not to allow the domain: But I am unable to add 2 domains/URL as specified above. My requirement is the the X-Frame contents should be displayed only if the page is accessed from 2 different domains. So obviously I cannot give SAMEORGIN. Please specify any alternate solutions to add 2 domains/URL in X-Frame-Options.

Necromancing. The provided answers are incomplete.

First, as already said, you cannot add multiple allow-from hosts, that's not supported. Second, you need to dynamically extract that value from the HTTP referrer, which means that you can't add the value to Web.config, because it's not always the same value.

It will be necessary to do browser-detection to avoid adding allow-from when the browser is Chrome (it produces an error on the debug - console, which can quickly fill the console up, or make the application slow). That also means you need to modify the ASP.NET browser detection, as it wrongly identifies Edge as Chrome.

This can be done in ASP.NET by writing a HTTP-module which runs on every request, that appends a http-header for every response, depending on the request's referrer. For Chrome, it needs to add Content-Security-Policy.

// https://stackoverflow.com/questions/31870789/check-whether-browser-is-chrome-or-edge
public class BrowserInfo

    public System.Web.HttpBrowserCapabilities Browser { get; set; }
    public string Name { get; set; }
    public string Version { get; set; }
    public string Platform { get; set; }
    public bool IsMobileDevice { get; set; }
    public string MobileBrand { get; set; }
    public string MobileModel { get; set; }

    public BrowserInfo(System.Web.HttpRequest request)
        if (request.Browser != null)
            if (request.UserAgent.Contains("Edge")
                && request.Browser.Browser != "Edge")
                this.Name = "Edge";
                this.Name = request.Browser.Browser;
                this.Version = request.Browser.MajorVersion.ToString();
            this.Browser = request.Browser;
            this.Platform = request.Browser.Platform;
            this.IsMobileDevice = request.Browser.IsMobileDevice;
            if (IsMobileDevice)
                this.Name = request.Browser.Browser;


void context_EndRequest(object sender, System.EventArgs e)
    if (System.Web.HttpContext.Current != null && System.Web.HttpContext.Current.Response != null)
        System.Web.HttpResponse response = System.Web.HttpContext.Current.Response;

            // response.Headers["P3P"] = "CP=\\\"IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT\\\"":
            // response.Headers.Set("P3P", "CP=\\\"IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT\\\"");
            // response.AddHeader("P3P", "CP=\\\"IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT\\\"");
            response.AppendHeader("P3P", "CP=\\\"IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT\\\"");

            // response.AppendHeader("X-Frame-Options", "DENY");
            // response.AppendHeader("X-Frame-Options", "SAMEORIGIN");
            // response.AppendHeader("X-Frame-Options", "AllowAll");

            if (System.Web.HttpContext.Current.Request.UrlReferrer != null)
                // "X-Frame-Options": "ALLOW-FROM " Not recognized in Chrome 
                string host = System.Web.HttpContext.Current.Request.UrlReferrer.Scheme + System.Uri.SchemeDelimiter
                            + System.Web.HttpContext.Current.Request.UrlReferrer.Authority

                string selfAuth = System.Web.HttpContext.Current.Request.Url.Authority;
                string refAuth = System.Web.HttpContext.Current.Request.UrlReferrer.Authority;

                // SQL.Log(System.Web.HttpContext.Current.Request.RawUrl, System.Web.HttpContext.Current.Request.UrlReferrer.OriginalString, refAuth);

                if (IsHostAllowed(refAuth))
                    BrowserInfo bi = new BrowserInfo(System.Web.HttpContext.Current.Request);

                    // bi.Name = Firefox
                    // bi.Name = InternetExplorer
                    // bi.Name = Chrome

                    // Chrome wants entire path... 
                    if (!System.StringComparer.OrdinalIgnoreCase.Equals(bi.Name, "Chrome"))
                        response.AppendHeader("X-Frame-Options", "ALLOW-FROM " + host);    

                    // unsafe-eval: invalid JSON https://github.com/keen/keen-js/issues/394
                    // unsafe-inline: styles
                    // data: url(data:image/png:...)

                    // https://www.owasp.org/index.php/Clickjacking_Defense_Cheat_Sheet
                    // https://www.ietf.org/rfc/rfc7034.txt
                    // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
                    // https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP

                    // https://stackoverflow.com/questions/10205192/x-frame-options-allow-from-multiple-domains
                    // https://content-security-policy.com/
                    // http://rehansaeed.com/content-security-policy-for-asp-net-mvc/

                    // This is for Chrome:
                    // response.AppendHeader("Content-Security-Policy", "default-src 'self' 'unsafe-inline' 'unsafe-eval' data: *.msecnd.net vortex.data.microsoft.com " + selfAuth + " " + refAuth);

                    System.Collections.Generic.List<string> ls = new System.Collections.Generic.List<string>();

                    // http://az416426.vo.msecnd.net/scripts/a/ai.0.js

                    // ls.Add("*.msecnd.net");
                    // ls.Add("vortex.data.microsoft.com");


                    string contentSecurityPolicy = string.Join(" ", ls.ToArray());
                    response.AppendHeader("Content-Security-Policy", contentSecurityPolicy);
                    response.AppendHeader("X-Frame-Options", "SAMEORIGIN");

                response.AppendHeader("X-Frame-Options", "SAMEORIGIN");
        catch (System.Exception ex)
            // WTF ? 
            System.Console.WriteLine(ex.Message); // Suppress warning

    } // End if (System.Web.HttpContext.Current != null && System.Web.HttpContext.Current.Response != null)

} // End Using context_EndRequest

private static string[] s_allowedHosts = new string[] 

public static bool IsHostAllowed(string host)
    return Contains(s_allowedHosts, host);
} // End Function IsHostAllowed 

public static bool Contains(string[] allowed, string current)
    for (int i = 0; i < allowed.Length; ++i)
        if (System.StringComparer.OrdinalIgnoreCase.Equals(allowed[i], current))
            return true;
    } // Next i 

    return false;
} // End Function Contains 

You need to register the context_EndRequest function in the HTTP-module Init function.

public class RequestLanguageChanger : System.Web.IHttpModule

    void System.Web.IHttpModule.Dispose()
        // throw new NotImplementedException();

    void System.Web.IHttpModule.Init(System.Web.HttpApplication context)
        // https://stackoverflow.com/questions/441421/httpmodule-event-execution-order
        context.EndRequest += new System.EventHandler(context_EndRequest);

    // context_EndRequest Code from above comes here


Next you need to add the module to your application. You can either do this programmatically in Global.asax by overriding the Init function of the HttpApplication, like this:

namespace ChangeRequestLanguage

    public class Global : System.Web.HttpApplication

        System.Web.IHttpModule mod = new libRequestLanguageChanger.RequestLanguageChanger();

        public override void Init()

        protected void Application_Start(object sender, System.EventArgs e)


        protected void Session_Start(object sender, System.EventArgs e)


        protected void Application_BeginRequest(object sender, System.EventArgs e)


        protected void Application_AuthenticateRequest(object sender, System.EventArgs e)


        protected void Application_Error(object sender, System.EventArgs e)


        protected void Session_End(object sender, System.EventArgs e)


        protected void Application_End(object sender, System.EventArgs e)




or you can add entries to Web.config if you don't own the application source-code:

        <add name="RequestLanguageChanger" type= "libRequestLanguageChanger.RequestLanguageChanger, libRequestLanguageChanger" />

    <validation validateIntegratedModeConfiguration="false"/>

    <modules runAllManagedModulesForAllRequests="true">
      <add name="RequestLanguageChanger" type="libRequestLanguageChanger.RequestLanguageChanger, libRequestLanguageChanger" />

The entry in system.webServer is for IIS7+, the other in system.web is for IIS 6. Note that you need to set runAllManagedModulesForAllRequests to true, for that it works properly.

The string in type is in the format "Namespace.Class, Assembly". Note that if you write your assembly in VB.NET instead of C#, VB creates a default-Namespace for each project, so your string will look like

"[DefaultNameSpace.Namespace].Class, Assembly"

If you want to avoid this problem, write the DLL in C#.

Allowing multiple domains to render your app in an iframe, using X , X-Frame-Options: Allow-From do not accept multiple domains and is wrongly written. Closed (works as designed). Project: Security Kit. Version:. 1 Answer 1. If you can entertain approaches outside of X-Frame-Options, consider creating a server-to-server API that can be called to access the content in question, and then allow it to be displayed without requiring framing.

How about an approach that not only allows multiple domains, but allows dynamic domains.

The use case here is with a Sharepoint app part which loads our site inside of Sharepoint via an iframe. The problem is that sharepoint has dynamic subdomains such as https://yoursite.sharepoint.com. So for IE, we need to specify ALLOW-FROM https://.sharepoint.com

Tricky business, but we can get it done knowing two facts:

  1. When an iframe loads, it only validates the X-Frame-Options on the first request. Once the iframe is loaded, you can navigate within the iframe and the header isn't checked on subsequent requests.

  2. Also, when an iframe is loaded, the HTTP referer is the parent iframe url.

You can leverage these two facts server side. In ruby, I'm using the following code:

  uri = URI.parse(request.referer)
  if uri.host.match(/\.sharepoint\.com$/)
    url = "https://#{uri.host}"
    response.headers['X-Frame-Options'] = "ALLOW-FROM #{url}"

Here we can dynamically allow domains based upon the parent domain. In this case, we ensure that the host ends in sharepoint.com keeping our site safe from clickjacking.

I'd love to hear feedback on this approach.

X-Frame-Options: Allow-From do not accept multiple domains and is , i can't find any example for X-Frame-Options with multiple uriis my syntax correct ? do i have to add the http and the https ? and also the domain  Is it true that ALLOW-FROM in X-Frame-Options is not supported in Chrome primarily and then Safari? add multiple uri/domains to the web.config? Jan 29, 2014 02:52

As per the MDN Specifications, X-Frame-Options: ALLOW-FROM is not supported in Chrome and support is unknown in Edge and Opera.

Content-Security-Policy: frame-ancestors overrides X-Frame-Options (as per this W3 spec), but frame-ancestors has limited compatibility. As per these MDN Specs, it's not supported in IE or Edge.

X-Frame-Options Allow-From multiple url, The X-Frame-Options HTTP response header can be used to ALLOW-FROM uri (obsolete): This is an obsolete directive that no longer works  The X-Frame-Options header has three different directives in which you can choose from. These must be sent as an HTTP header, as the browser will ignore if found in a META tag. These must be sent as an HTTP header, as the browser will ignore if found in a META tag.

X-Frame-Options, The X-Frame-Options HTTP response header can help protect your The allow-​from uri directive allows the page to only be loaded in a One major benefit to this directive is that it allows you to authorize multiple domains. The X-Frame-Options HTTP response header can be used to indicate whether or not a browser should be allowed to render a page in a <frame>, <iframe>, <embed> or <object>. Sites can use this to avoid clickjacking attacks, by ensuring that their content is not embedded into other sites.

Using X-Frame-Options customHeaders, Ross & Gondrom Informational [Page 1] RFC 7034 X-Frame-Options October 2013 Table Wildcards or lists to declare multiple domains in one ALLOW-​FROM  Keep Server Online. If you find the Apache Lounge, the downloads and overall help useful, please express your satisfaction with a donation. or. A donation makes a contribution towards the costs, the time and effort that's going in this site and building.

X-Frame-Options - How to Combat Clickjacking, I'll be amazed if setting multiple values for Allow From actually does what you want it to do, because although the specs are very confusing on the matter, my firm understanding (having investigated this in detail in the past) is that the only way to use Allow From is to set a single value (such that if you need to support multiple values, you must set the correct single value on any given

  • This seems to be a known limitation: owasp.org/index.php/…
  • frame-ancestors is marked as "experimental API and should not be used in production code" on MDN. + X-Frame-Options is not deprecated but "non-standard" but "is widely supported and can be used in conjunction with CSP"
  • @JonathanMuller - The wording on X-Frame-Options changed, and is less severe now. It's a good point that it is risky to used a spec that isn't finalized. Thanks!
  • I can't find the deprectated warning on MDN any more. Has Mozilla changed their opinion?
  • @to0om - Thanks! I updated the answer with another comment. I may have come on too strong in my answer. Either way, X-Frame-Options doesn't support multiple sources.
  • @Kobi, I think the answer needs re-organizing. The very first sentence says that this is deprecated as per the MDN. It'll be less misleading if you add your update at the top (with a bold colored "UPDATE:"). Thanks.
  • It looks like webkit now supports ALLOW-FROM using the link you provided.
  • @Jimi No it doesn't - the last comment on the link in question, says you need to use a CSP policy instead. This option still doesn't work in Chrome.
  • I think you might want to remove 'vmswisslife' and 'vmraiffeisen' from the answer so it won't get false correlations.
  • @quetzalcoatl: I left them there as an example, it's not an oversight, it's not in any way confidential. But true, maybe better remove them. Done.
  • Caution: this breaks if the host is "fakesharepoint.com". The regex should be: /\.sharepoint\.com$/
  • @StefanSteiger that's right, but Chrome also doesn't experience this issue. Chrome and more standards compliant browsers follow the newer Content Security Policy (CSP) model.
  • This is not documented on MDN.
  • This won't work due to same origin policy when calling top.location.