Skip to content

Commit

Permalink
Merge pull request #2407 from SwedbankPay/feature/devp-509_fix_extern…
Browse files Browse the repository at this point in the history
…al_link

DEVP-509: External links in new tabs
  • Loading branch information
arebra authored Jan 7, 2025
2 parents f0b8281 + 654bb8d commit 540ba4c
Show file tree
Hide file tree
Showing 10 changed files with 77 additions and 77 deletions.
20 changes: 10 additions & 10 deletions checkout-v3/get-started/display-payment-ui/seamless-view.md
Original file line number Diff line number Diff line change
Expand Up @@ -104,16 +104,16 @@ Once the payer has completed the purchase, you can perform a GET towards the

## Monitoring The Script URL

With the [PCI-DSS v4][pci] changes taking effect on March 31st 2025, merchants
are responsible for ensuring the integrity of the HTML script used in their
integration, including monitoring what is loaded into or over it. Specifically,
Seamless View merchants must verify that the script URL embedded in their iframe
originates from Swedbank Pay or another trusted domain. It is important to note
that Swedbank Pay’s PCI responsibility is strictly limited to the content within
the payment iframe. For further details, refer to section 4.6.3 in the linked
document.

To ensure compliance, we recommend implementing [Content Security Policy][csp]
With the [PCI-DSS v4][pci]{:target="_blank"} changes taking effect on March 31st
2025, merchants are responsible for ensuring the integrity of the HTML script
used in their integration, including monitoring what is loaded into or over it.
Specifically, Seamless View merchants must verify that the script URL embedded
in their iframe originates from Swedbank Pay or another trusted domain. It is
important to note that Swedbank Pay’s PCI responsibility is strictly limited to
the content within the payment iframe. For further details, refer to section
4.6.3 in the linked document.

To ensure compliance, we recommend implementing [Content Security Policy][csp]{:target="_blank"}
rules to monitor and authorize scripts.

Merchants must whitelist the following domains to restrict browser content

Check warning on line 119 in checkout-v3/get-started/display-payment-ui/seamless-view.md

View workflow job for this annotation

GitHub Actions / alex

[alex] checkout-v3/get-started/display-payment-ui/seamless-view.md#L119

`whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead whitelist retext-equality
Raw output
  119:16-119:25  warning  `whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead                 whitelist     retext-equality
Expand Down
12 changes: 6 additions & 6 deletions checkout-v3/get-started/display-payment-ui/ui-migration.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,11 +7,11 @@ menu_order: 7
---

As parts of the PCI-DSS best practice becomes requirements with
[PCI-DSS v4][pci] coming in April 2025, using the [Seamless View][seamless-view]
integration to display the payment UI will give merchants more responsibilities
than they currently have. This is because Seamless View is hosted by you. As the
[Redirect][redirect] integration is hosted by Swedbank Pay, we also handle these
responsibilities.
[PCI-DSS v4][pci]{:target="_blank"} coming in April 2025, using the
[Seamless View][seamless-view] integration to display the payment UI will give
merchants more responsibilities than they currently have. This is because
Seamless View is hosted by you. As the [Redirect][redirect] integration is
hosted by Swedbank Pay, we also handle these responsibilities.

The updated requirements will include stricter controls and monitoring,
particularly around the security of your checkout process. Merchants are
Expand Down Expand Up @@ -117,7 +117,7 @@ included regardless of your UI choice.
If you choose to stay with Seamless View, please take the following under
advisement.

To ensure compliance, we recommend implementing [Content Security Policy][csp]
To ensure compliance, we recommend implementing [Content Security Policy][csp]{:target="_blank"}
rules to monitor and authorize scripts.

Merchants must whitelist the following domains to restrict browser content

Check warning on line 123 in checkout-v3/get-started/display-payment-ui/ui-migration.md

View workflow job for this annotation

GitHub Actions / alex

[alex] checkout-v3/get-started/display-payment-ui/ui-migration.md#L123

`whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead whitelist retext-equality
Raw output
  123:16-123:25  warning  `whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead                 whitelist     retext-equality
Expand Down
6 changes: 3 additions & 3 deletions checkout-v3/modules-sdks/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,9 +16,9 @@ packaging that handles a lot of the logic towards our REST API, so you don't
have to.

**Modules, extensions and plugins** are typically used as a way to extend
webshop platforms such as [WooCommerce][woocommerce]{:data-proofer-ignore=''}
with functionality that isn't provided in the core platform. Such functionality
may be to allow visitors of your website to pay with a payment provider such as
webshop platforms such as [WooCommerce][woocommerce]{:target="_blank"} with
functionality that isn't provided in the core platform. Such functionality may
be to allow visitors of your website to pay with a payment provider such as
Swedbank Pay.

**Software Development Kits** allow developers to integrate with Swedbank Pay's
Expand Down
20 changes: 10 additions & 10 deletions old-implementations/checkout-v2/checkin.md
Original file line number Diff line number Diff line change
Expand Up @@ -195,16 +195,16 @@ access them with our script." %}

## Monitoring The Script URL

With the [PCI-DSS v4][pci] changes taking effect on March 31st 2025, merchants
are responsible for ensuring the integrity of the HTML script used in their
integration, including monitoring what is loaded into or over it. Specifically,
Seamless View merchants must verify that the script URL embedded in their iframe
originates from Swedbank Pay or another trusted domain. It is important to note
that Swedbank Pay’s PCI responsibility is strictly limited to the content within
the payment iframe. For further details, refer to section 4.6.3 in the linked
document.

To ensure compliance, we recommend implementing [Content Security Policy][csp]
With the [PCI-DSS v4][pci]{:target="_blank"} changes taking effect on March 31st
2025, merchants are responsible for ensuring the integrity of the HTML script
used in their integration, including monitoring what is loaded into or over it.
Specifically, Seamless View merchants must verify that the script URL embedded
in their iframe originates from Swedbank Pay or another trusted domain. It is
important to note that Swedbank Pay’s PCI responsibility is strictly limited to
the content within the payment iframe. For further details, refer to section
4.6.3 in the linked document.

To ensure compliance, we recommend implementing [Content Security Policy][csp]{:target="_blank"}
rules to monitor and authorize scripts.

Merchants must whitelist the following domains to restrict browser content

Check warning on line 210 in old-implementations/checkout-v2/checkin.md

View workflow job for this annotation

GitHub Actions / alex

[alex] old-implementations/checkout-v2/checkin.md#L210

`whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead whitelist retext-equality
Raw output
  210:16-210:25  warning  `whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead                 whitelist     retext-equality
Expand Down
20 changes: 10 additions & 10 deletions old-implementations/checkout-v2/payment-menu.md
Original file line number Diff line number Diff line change
Expand Up @@ -175,16 +175,16 @@ request.send(JSON.stringify({

## Monitoring The Script URL

With the [PCI-DSS v4][pci] changes taking effect on March 31st 2025, merchants
are responsible for ensuring the integrity of the HTML script used in their
integration, including monitoring what is loaded into or over it. Specifically,
Seamless View merchants must verify that the script URL embedded in their iframe
originates from Swedbank Pay or another trusted domain. It is important to note
that Swedbank Pay’s PCI responsibility is strictly limited to the content within
the payment iframe. For further details, refer to section 4.6.3 in the linked
document.

To ensure compliance, we recommend implementing [Content Security Policy][csp]
With the [PCI-DSS v4][pci]{:target="_blank"} changes taking effect on March 31st
2025, merchants are responsible for ensuring the integrity of the HTML script
used in their integration, including monitoring what is loaded into or over it.
Specifically, Seamless View merchants must verify that the script URL embedded
in their iframe originates from Swedbank Pay or another trusted domain. It is
important to note that Swedbank Pay’s PCI responsibility is strictly limited to
the content within the payment iframe. For further details, refer to section
4.6.3 in the linked document.

To ensure compliance, we recommend implementing [Content Security Policy][csp]{:target="_blank"}
rules to monitor and authorize scripts.

Merchants must whitelist the following domains to restrict browser content

Check warning on line 190 in old-implementations/checkout-v2/payment-menu.md

View workflow job for this annotation

GitHub Actions / alex

[alex] old-implementations/checkout-v2/payment-menu.md#L190

`whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead whitelist retext-equality
Raw output
  190:16-190:25  warning  `whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead                 whitelist     retext-equality
Expand Down
12 changes: 6 additions & 6 deletions old-implementations/checkout-v2/ui-migration.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,11 +7,11 @@ menu_order: 11
---

As parts of the PCI-DSS best practice becomes requirements with
[PCI-DSS v4][pci] coming in April 2025, using the [Seamless View][seamless-view]
integration to display the payment UI will give merchants more responsibilities
than they currently have. This is because Seamless View is hosted by you. As the
Redirect integration is hosted by Swedbank Pay, we also handle these
responsibilities.
[PCI-DSS v4][pci]{:target="_blank"} coming in April 2025, using the
[Seamless View][seamless-view] integration to display the payment UI will give
merchants more responsibilities than they currently have. This is because
Seamless View is hosted by you. As the Redirect integration is hosted by
Swedbank Pay, we also handle these responsibilities.

The updated requirements will include stricter controls and monitoring,
particularly around the security of your checkout process. Merchants are
Expand Down Expand Up @@ -46,7 +46,7 @@ help you.
If you choose to stay with Seamless View, please take the following under
advisement.

To ensure compliance, we recommend implementing [Content Security Policy][csp]
To ensure compliance, we recommend implementing [Content Security Policy][csp]{:target="_blank"}
rules to monitor and authorize scripts.

Merchants must whitelist the following domains to restrict browser content

Check warning on line 52 in old-implementations/checkout-v2/ui-migration.md

View workflow job for this annotation

GitHub Actions / alex

[alex] old-implementations/checkout-v2/ui-migration.md#L52

`whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead whitelist retext-equality
Raw output
    52:16-52:25  warning  `whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead                 whitelist     retext-equality
Expand Down
20 changes: 10 additions & 10 deletions old-implementations/payment-instruments-v1/card/seamless-view.md
Original file line number Diff line number Diff line change
Expand Up @@ -110,16 +110,16 @@ embedded on your website.

## Monitoring The Script URL

With the [PCI-DSS v4][pci] changes taking effect on March 31st 2025, merchants
are responsible for ensuring the integrity of the HTML script used in their
integration, including monitoring what is loaded into or over it. Specifically,
Seamless View merchants must verify that the script URL embedded in their iframe
originates from Swedbank Pay or another trusted domain. It is important to note
that Swedbank Pay’s PCI responsibility is strictly limited to the content within
the payment iframe. For further details, refer to section 4.6.3 in the linked
document.

To ensure compliance, we recommend implementing [Content Security Policy][csp]
With the [PCI-DSS v4][pci]{:target="_blank"} changes taking effect on March 31st
2025, merchants are responsible for ensuring the integrity of the HTML script
used in their integration, including monitoring what is loaded into or over it.
Specifically, Seamless View merchants must verify that the script URL embedded
in their iframe originates from Swedbank Pay or another trusted domain. It is
important to note that Swedbank Pay’s PCI responsibility is strictly limited to
the content within the payment iframe. For further details, refer to section
4.6.3 in the linked document.

To ensure compliance, we recommend implementing [Content Security Policy][csp]{:target="_blank"}
rules to monitor and authorize scripts.

Merchants must whitelist the following domains to restrict browser content

Check warning on line 125 in old-implementations/payment-instruments-v1/card/seamless-view.md

View workflow job for this annotation

GitHub Actions / alex

[alex] old-implementations/payment-instruments-v1/card/seamless-view.md#L125

`whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead whitelist retext-equality
Raw output
  125:16-125:25  warning  `whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead                 whitelist     retext-equality
Expand Down
12 changes: 6 additions & 6 deletions old-implementations/payment-instruments-v1/card/ui-migration.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,11 +7,11 @@ menu_order: 600
---

As parts of the PCI-DSS best practice becomes requirements with
[PCI-DSS v4][pci] coming in April 2025, using the [Seamless View][seamless-view]
integration to display the payment UI will give merchants more responsibilities
than they currently have. This is because Seamless View is hosted by you. As the
[Redirect][redirect] integration is hosted by Swedbank Pay, we also handle these
responsibilities.
[PCI-DSS v4][pci]{:target="_blank"} coming in April 2025, using the
[Seamless View][seamless-view] integration to display the payment UI will give
merchants more responsibilities than they currently have. This is because
Seamless View is hosted by you. As the [Redirect][redirect] integration is
hosted by Swedbank Pay, we also handle these responsibilities.

The updated requirements will include stricter controls and monitoring,
particularly around the security of your checkout process. Merchants are
Expand Down Expand Up @@ -117,7 +117,7 @@ included regardless of your UI choice.
If you choose to stay with Seamless View, please take the following under
advisement.

To ensure compliance, we recommend implementing [Content Security Policy][csp]
To ensure compliance, we recommend implementing [Content Security Policy][csp]{:target="_blank"}
rules to monitor and authorize scripts.

Merchants must whitelist the following domains to restrict browser content

Check warning on line 123 in old-implementations/payment-instruments-v1/card/ui-migration.md

View workflow job for this annotation

GitHub Actions / alex

[alex] old-implementations/payment-instruments-v1/card/ui-migration.md#L123

`whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead whitelist retext-equality
Raw output
  123:16-123:25  warning  `whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead                 whitelist     retext-equality
Expand Down
20 changes: 10 additions & 10 deletions old-implementations/payment-menu-v2/payment-order.md
Original file line number Diff line number Diff line change
Expand Up @@ -149,16 +149,16 @@ request.send(JSON.stringify({ amount: 1200 }));

## Monitoring The Script URL

With the [PCI-DSS v4][pci] changes taking effect on March 31st 2025, merchants
are responsible for ensuring the integrity of the HTML script used in their
integration, including monitoring what is loaded into or over it. Specifically,
Seamless View merchants must verify that the script URL embedded in their iframe
originates from Swedbank Pay or another trusted domain. It is important to note
that Swedbank Pay’s PCI responsibility is strictly limited to the content within
the payment iframe. For further details, refer to section 4.6.3 in the linked
document.

To ensure compliance, we recommend implementing [Content Security Policy][csp]
With the [PCI-DSS v4][pci]{:target="_blank"} changes taking effect on March 31st
2025, merchants are responsible for ensuring the integrity of the HTML script
used in their integration, including monitoring what is loaded into or over it.
Specifically, Seamless View merchants must verify that the script URL embedded
in their iframe originates from Swedbank Pay or another trusted domain. It is
important to note that Swedbank Pay’s PCI responsibility is strictly limited to
the content within the payment iframe. For further details, refer to section
4.6.3 in the linked document.

To ensure compliance, we recommend implementing [Content Security Policy][csp]{:target="_blank"}
rules to monitor and authorize scripts.

Merchants must whitelist the following domains to restrict browser content

Check warning on line 164 in old-implementations/payment-menu-v2/payment-order.md

View workflow job for this annotation

GitHub Actions / alex

[alex] old-implementations/payment-menu-v2/payment-order.md#L164

`whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead whitelist retext-equality
Raw output
  164:16-164:25  warning  `whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead                 whitelist     retext-equality
Expand Down
12 changes: 6 additions & 6 deletions old-implementations/payment-menu-v2/ui-migration.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,11 +7,11 @@ menu_order: 11
---

As parts of the PCI-DSS best practice becomes requirements with
[PCI-DSS v4][pci] coming in April 2025, using the [Seamless View][seamless-view]
integration to display the payment UI will give merchants more responsibilities
than they currently have. This is because Seamless View is hosted by you. As the
Redirect integration is hosted by Swedbank Pay, we also handle these
responsibilities.
[PCI-DSS v4][pci]{:target="_blank"} coming in April 2025, using the
[Seamless View][seamless-view] integration to display the payment UI will give
merchants more responsibilities than they currently have. This is because
Seamless View is hosted by you. As the Redirect integration is hosted by
Swedbank Pay, we also handle these responsibilities.

The updated requirements will include stricter controls and monitoring,
particularly around the security of your checkout process. Merchants are
Expand Down Expand Up @@ -122,7 +122,7 @@ included regardless of your UI choice.
If you choose to stay with Seamless View, please take the following under
advisement.

To ensure compliance, we recommend implementing [Content Security Policy][csp]
To ensure compliance, we recommend implementing [Content Security Policy][csp]{:target="_blank"}
rules to monitor and authorize scripts.

Merchants must whitelist the following domains to restrict browser content

Check warning on line 128 in old-implementations/payment-menu-v2/ui-migration.md

View workflow job for this annotation

GitHub Actions / alex

[alex] old-implementations/payment-menu-v2/ui-migration.md#L128

`whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead whitelist retext-equality
Raw output
  128:16-128:25  warning  `whitelist` may be insensitive, use `passlist`, `alrightlist`, `safelist`, `allow list` instead                 whitelist     retext-equality
Expand Down

0 comments on commit 540ba4c

Please sign in to comment.