In case your website requires strict CSP policies, you may allow the following domains.
Note that CSP stands for Content Security Policy. Some websites implement a CSP policy to restrict which domain names scripts on the website can access.
Service | Full URL |
---|---|
JS, CSS, fonts, images, settings, Web Workers | https://client.crisp.chat |
Avatars, images | https://image.crisp.chat |
File downloads & uploads | https://storage.crisp.chat |
Frames | https://game.crisp.chat |
WebSocket (messaging) | wss://client.relay.crisp.chat |
WebSocket (calls, MagicBrowse) | wss://stream.relay.crisp.chat |
Chatbox CSP policy
Considerations
- Chatbox customization features require some custom CSS to be inlined in your page, so that we can adjust the chatbox color to your settings. Make sure to include
'unsafe-inline'
in yourstyle-src
CSP rule. - The Chatbox widget uses Web Workers to perform some on-demand short-lived background operations, such as "Are you a bot?" verifications whenever a message gets sent. Since it is currently not possible to load Web Workers in cross-domain environments, such Web Workers are fetched from a
crisp.chat
sub-domain and then executed in a localblob:
URL. Make sure to includeblob:
in yourworker-src
CSP rule. - Some images are included as Base64 data URIs. It is therefore required to include
data:
in yourimg-src
CSP rule.
Example
This is a sample CSP policy you can copy and paste in your website HTML. Make sure to adjust it to include all your other domains.
<meta
http-equiv="Content-Security-Policy"
content="img-src data: https://*.crisp.chat; font-src https://*.crisp.chat; media-src https://*.crisp.chat; style-src 'unsafe-inline' https://*.crisp.chat; frame-src https://*.crisp.chat; script-src https://*.crisp.chat; worker-src blob: https://*.crisp.chat; connect-src https://*.crisp.chat wss://*.relay.crisp.chat"
>
You may also define the same CSP policy as an HTTP header, using the Content-Security-Policy
header.