- https://webkit.org/blog/9661/preventing-tracking-prevention-tracking/
- https://webkit.org/blog/9521/intelligent-tracking-prevention-2-3/
Header-based authentication
- Use case: Authenticating any HTTP call through code to get data from the instance
- Benefit: The header can then access the tokens required to make the programmatic filter options for private embed effective even as other browsers eventually follow Safari’s example.
- Best practice: For consistency, please ensure to maintain double underscores before and after the RYUU token as shown in the code below.
- Example: The app.js file that stores this code must be hosted in a folder called “public-assets” to be accessible by Domo.
“Public Assets” folder
- Use case: Referencing static images and documents like calls to a non-sensitive JavaScript file
- Benefit: Simplify access to resources that populate the embedded experience
- Best practice: Move files and references to a “public-assets” path. Avoid any sensitive business logic in this folder.
- Example: Public Assets
Query parameters in the URL
- Use case: Filtering non-sensitive data in apps
- Benefit: Provide users with a head start in focusing on the most relevant data. Ensure the host page and embedded content can share context with each other.
- Example:
?rptparam applies not on the iframe but actually inside the app code
Whitelisting cross-origin access in Identity Providers
When apps are embedded, the IDP (Identity Provider) of the host site will often need to whitelist the Domo domain that serves the apps as a trusted web origin. Since app hosting has a more complex subdomain structure than common cards and pages in your instance, the pattern of
{appId}.domoapps.{environment}.domo.com results in the ideal whitelist value of: ‘.domoapps..domo.com’
Cross-origin access grants can be applied in the application settings of IDPs like Okta, Microsoft Azure Active Directory, Ping Identity, SailPoint, OneLogin, ForgeRock, Centrify, and more.