Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    primarykey
    data
    text
    singulars
    1. This table or related slice is empty.
    plurals
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. COActually when I break at the CreateServiceHost() method I check the endpoint Behaviors and it does have a WebScripEnablingBehavior object as one of the behaviors. I might be able to set or enable this property for it, but I don't know and can't find how to access the enableWebScript property on it.
      singulars
    2. COThe only reason why I think I need it is because before I added my behaviors programmatically and used the config settings, I used to get my data off the ".d" param in the result object returned from the Ajax call. Now I get the data directly off of the result object. Reading more into it I found that enableWebScript adds the ".d" param for security purposes (cross-site scripting risk) [here](http://www.asp.net/ajaxlibrary/Using%20JSON%20Syntax%20with%20Ajax.ashx). So I do get my data, but I'm missing the added security of the .d param, making me wonder if I have to set it programmatically.
      singulars
    3. CO@Ben Honestly, unless I'm misunderstanding something, I find the argument that returning data in `d` is more secure to be pretty weak. Sure, it won't be parseable as a JSON construct using a default AJAX library, but how would it stop someone from using custom parsing (just like I'm sure you're having to do)? For cross-site scripting to work, the attacker would already have to know about your script service to make the request, isn't it reasonable to assume they'd be capable of rolling their own object parser?
      singulars
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload