How JSF 2.0 prevents CSRF
问题 I am researching stuff I hear regularly that when doing a webapp in JSF 2.0 you are already protected from crossite - scripting and - request forgery. The following excerpt from a SO post confirms this: In JSF 2.0 this has been improved by using a long and strong autogenerated value instead of a rather predictable sequence value and thus making it a robust CSRF prevention. Can someone provide some more detail on this? How does this autogenerated value prevent CSRF? Thanks! 回答1: How does this