Skip to content

Allowed Origins

Allowed Origins is a security feature that controls which domains can access your media sources and transformations through Cross-Origin Resource Sharing (CORS). This helps protect your media from unauthorized access while enabling legitimate cross-domain requests.

When a web browser makes a request to your media from a different domain (cross-origin request), the browser checks if that domain is allowed to access the resource. The Allowed Origins setting defines which domains have permission to make these requests.

For example, if your media is hosted on media.example.com but your website runs on www.example.com, you’ll need to configure allowed origins to permit cross-domain access.

Allowed origins are configured as part of your space’s media settings security configuration:

Allowed origins

By default, all origins are allowed using the wildcard "*". This provides maximum flexibility but minimal security.

Origins must be specified in full URL format including the protocol:

✅ Correct formats:

  • "https://www.example.com"
  • "https://app.*.com:3000"
  • "http://localhost:8080"
  • "*" (wildcard for all origins)

❌ Incorrect formats:

  • "www.example.com" (missing protocol)
  • "*.example.com" (subdomain wildcards not supported)
  • "example.com" (missing protocol)
  • Be specific: List only the domains that actually need access
  • Use HTTPS: Always prefer https:// origins in production
  • Include ports: Specify port numbers when using non-standard ports
  • Regular audits: Review and update your allowed origins periodically
  • Wildcard in production: Avoid using "*" for production environments
  • HTTP in production: Don’t use http:// origins for production sites
  • Overly broad permissions: Don’t include domains that don’t need access