SlideShare a Scribd company logo
1 of 10
cloud.analogy info@cloudanalogy.com +1(415)830-3899
cloud.analogy info@cloudanalogy.com +1(415)830-3899
LockerService brings multi-tenancy to the browsers. This is done by
sandboxing of code and isolation of elements, thereby setting them apart
from the rest of the system. Locker acts as a Virtual iframe that helps to
bring all the security benefits - minus the drawbacks of UI for an iframe.
LockerService for businesses are enabled for components with API version
39.0 and lower.
Consequently, the Locker issues may simply stop the components or the
Lightning page - with Locker services enforced by Salesforce. Here is an use
case on enforcement of LockerService on Lightning component.
What is LockerService ?
cloud.analogy info@cloudanalogy.com +1(415)830-3899
What are the security benefits of
Locker Services?
● Locker source is open-source Javascript files maintained by
Salesforce.
● When Single Page Applications (SPAs) are built using Lightning
components, then Security can be enforced by LockerServices.
● Locker makes use of Content Security Policy (CSP) of the browser.
Next, we speak about Locker Compliance and reworking of LCs.
cloud.analogy info@cloudanalogy.com +1(415)830-3899
Locker Compliance and reworking of LCs.
The Salesforce admin or the developer can enable
the Locker services with critical updates and test the
component/application - whether it is functional.
Next we move to CSP Policy, that is implemented in
the modern applications.
How to implement CSP in the modern applications ?
CSP is supported by all the modern browsers - Firefox, Chrome, Safari and
others. CSP can be enforced by an HTTP header, rule pattern and a name. A
ruleset defined browser can be used for prevention webpage downloading of
malicious content from unknown sources.
The LC code can be broken under Locker, let us now find the causes for that.
cloud.analogy info@cloudanalogy.com +1(415)830-3899
CSP is supported by all the modern browsers - Firefox, Chrome, Safari and others.
CSP can be enforced by an HTTP header, rule pattern and a name. A ruleset defined
browser can be used for prevention webpage downloading of malicious content from
unknown sources.
How to implement CSP in the
modern applications ?
The LC code can be broken under Locker, let us now find the causes for
that.
cloud.analogy info@cloudanalogy.com +1(415)830-3899
What are the Causes for broken LC
Code in Locker ?
The causes for broken LC code are as follows:
● ESS Strict Mode Compliance of Javascript
● Third-party libraries not locker-compliant
● Loading Images or JS libraries from CDN or an
external website.
cloud.analogy info@cloudanalogy.com +1(415)830-3899
You need to check with Javascript strict mode
rules from:
https://developer.mozilla.org/en-
US/docs/Web/JavaScript/Reference/Strict_mod
e
ESS Strict Mode Compliance Of
Javascript
cloud.analogy info@cloudanalogy.com +1(415)830-3899
Third-party libraries not locker-
compliant
One must ensure that any third-party
libraries must be checked for working
in Locker Service.
cloud.analogy info@cloudanalogy.com +1(415)830-3899
Loading Images or JS libraries from
CDN or an external website
The assets and images must be ensured
to be loaded by loading from Salesforce
Strict Resources only.
cloud.analogy info@cloudanalogy.com +1(415)830-3899
THANK
YOU

More Related Content

Similar to Locker services and lightning components

WordPress London Meetup January 2012
WordPress London Meetup January 2012WordPress London Meetup January 2012
WordPress London Meetup January 2012
Cloudflare
 
Flex security
Flex securityFlex security
Flex security
chengalva
 
W3 conf hill-html5-security-realities
W3 conf hill-html5-security-realitiesW3 conf hill-html5-security-realities
W3 conf hill-html5-security-realities
Brad Hill
 

Similar to Locker services and lightning components (20)

6 reasons developers should consider salesforce lightning web components
6 reasons developers should consider salesforce lightning web components6 reasons developers should consider salesforce lightning web components
6 reasons developers should consider salesforce lightning web components
 
WordPress London Meetup January 2012
WordPress London Meetup January 2012WordPress London Meetup January 2012
WordPress London Meetup January 2012
 
Flex security
Flex securityFlex security
Flex security
 
W3 conf hill-html5-security-realities
W3 conf hill-html5-security-realitiesW3 conf hill-html5-security-realities
W3 conf hill-html5-security-realities
 
Blackhat11 shreeraj reverse_engineering_browser
Blackhat11 shreeraj reverse_engineering_browserBlackhat11 shreeraj reverse_engineering_browser
Blackhat11 shreeraj reverse_engineering_browser
 
CamelOne 2013 Karaf A-MQ Camel CXF Security
CamelOne 2013 Karaf A-MQ Camel CXF SecurityCamelOne 2013 Karaf A-MQ Camel CXF Security
CamelOne 2013 Karaf A-MQ Camel CXF Security
 
WebSocket Perspectives and Vision for the Future - HTML5DevConf Oct 2013 SF
WebSocket Perspectives and Vision for the Future - HTML5DevConf Oct 2013 SFWebSocket Perspectives and Vision for the Future - HTML5DevConf Oct 2013 SF
WebSocket Perspectives and Vision for the Future - HTML5DevConf Oct 2013 SF
 
Introduction to lightning Web Component
Introduction to lightning Web ComponentIntroduction to lightning Web Component
Introduction to lightning Web Component
 
Introduction to lightning web component
Introduction to lightning web component Introduction to lightning web component
Introduction to lightning web component
 
Top security threats to Flash/Flex applications and how to avoid them
Top security threats to Flash/Flex applications and how to avoid themTop security threats to Flash/Flex applications and how to avoid them
Top security threats to Flash/Flex applications and how to avoid them
 
Browser Hacking For Fun and Profit | Null Bangalore Meetup 2019 | Divyanshu S...
Browser Hacking For Fun and Profit | Null Bangalore Meetup 2019 | Divyanshu S...Browser Hacking For Fun and Profit | Null Bangalore Meetup 2019 | Divyanshu S...
Browser Hacking For Fun and Profit | Null Bangalore Meetup 2019 | Divyanshu S...
 
Connecting All Abstractions with Istio
Connecting All Abstractions with IstioConnecting All Abstractions with Istio
Connecting All Abstractions with Istio
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
Java script and web cryptography (cf.objective)
Java script and web cryptography (cf.objective)Java script and web cryptography (cf.objective)
Java script and web cryptography (cf.objective)
 
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
 
Barracuda in Microsoft Azure
Barracuda in Microsoft AzureBarracuda in Microsoft Azure
Barracuda in Microsoft Azure
 
Dreamforce 2018 Locker Service
Dreamforce 2018 Locker ServiceDreamforce 2018 Locker Service
Dreamforce 2018 Locker Service
 
Python Web Framework – A Detailed List of Web Frameworks in Python
Python Web Framework – A Detailed List of Web Frameworks in PythonPython Web Framework – A Detailed List of Web Frameworks in Python
Python Web Framework – A Detailed List of Web Frameworks in Python
 
On demand video_streaming_apps_and_its_server_side_cloud_infrastructure_at_aws
On demand video_streaming_apps_and_its_server_side_cloud_infrastructure_at_awsOn demand video_streaming_apps_and_its_server_side_cloud_infrastructure_at_aws
On demand video_streaming_apps_and_its_server_side_cloud_infrastructure_at_aws
 
Sam2
Sam2Sam2
Sam2
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Locker services and lightning components

  • 2. cloud.analogy info@cloudanalogy.com +1(415)830-3899 LockerService brings multi-tenancy to the browsers. This is done by sandboxing of code and isolation of elements, thereby setting them apart from the rest of the system. Locker acts as a Virtual iframe that helps to bring all the security benefits - minus the drawbacks of UI for an iframe. LockerService for businesses are enabled for components with API version 39.0 and lower. Consequently, the Locker issues may simply stop the components or the Lightning page - with Locker services enforced by Salesforce. Here is an use case on enforcement of LockerService on Lightning component. What is LockerService ?
  • 3. cloud.analogy info@cloudanalogy.com +1(415)830-3899 What are the security benefits of Locker Services? ● Locker source is open-source Javascript files maintained by Salesforce. ● When Single Page Applications (SPAs) are built using Lightning components, then Security can be enforced by LockerServices. ● Locker makes use of Content Security Policy (CSP) of the browser. Next, we speak about Locker Compliance and reworking of LCs.
  • 4. cloud.analogy info@cloudanalogy.com +1(415)830-3899 Locker Compliance and reworking of LCs. The Salesforce admin or the developer can enable the Locker services with critical updates and test the component/application - whether it is functional. Next we move to CSP Policy, that is implemented in the modern applications.
  • 5. How to implement CSP in the modern applications ? CSP is supported by all the modern browsers - Firefox, Chrome, Safari and others. CSP can be enforced by an HTTP header, rule pattern and a name. A ruleset defined browser can be used for prevention webpage downloading of malicious content from unknown sources. The LC code can be broken under Locker, let us now find the causes for that. cloud.analogy info@cloudanalogy.com +1(415)830-3899 CSP is supported by all the modern browsers - Firefox, Chrome, Safari and others. CSP can be enforced by an HTTP header, rule pattern and a name. A ruleset defined browser can be used for prevention webpage downloading of malicious content from unknown sources. How to implement CSP in the modern applications ? The LC code can be broken under Locker, let us now find the causes for that.
  • 6. cloud.analogy info@cloudanalogy.com +1(415)830-3899 What are the Causes for broken LC Code in Locker ? The causes for broken LC code are as follows: ● ESS Strict Mode Compliance of Javascript ● Third-party libraries not locker-compliant ● Loading Images or JS libraries from CDN or an external website.
  • 7. cloud.analogy info@cloudanalogy.com +1(415)830-3899 You need to check with Javascript strict mode rules from: https://developer.mozilla.org/en- US/docs/Web/JavaScript/Reference/Strict_mod e ESS Strict Mode Compliance Of Javascript
  • 8. cloud.analogy info@cloudanalogy.com +1(415)830-3899 Third-party libraries not locker- compliant One must ensure that any third-party libraries must be checked for working in Locker Service.
  • 9. cloud.analogy info@cloudanalogy.com +1(415)830-3899 Loading Images or JS libraries from CDN or an external website The assets and images must be ensured to be loaded by loading from Salesforce Strict Resources only.