Impossible Cloud Documentation
  • Company overview
    • What is Impossible Cloud
  • Getting Started
    • Getting Started with Impossible Cloud Storage
      • Setting up
      • Next steps
      • Getting support
  • Feature Release Notes
    • 29th April 2025
  • Impossible cloud storage Guide
    • Storage Console URLs and API Endpoints
    • Storage Console
      • Accessing the console
        • Signing up for Impossible Cloud Storage
        • Signing in to Impossible Cloud Storage
        • Session lifetime limits
      • Interacting with the console
        • Navigating the menu
        • Using the panel
    • Buckets and Objects
      • Creating a bucket
      • Storing objects in a bucket
      • Interacting with objects
      • Creating folders in a bucket
      • Interacting with folders and buckets
      • Public File Sharing via URLs
      • Emptying a Bucket
      • Limitations
      • Versioning and object lock
        • Enabling versioning
        • Using versioning
        • Enabling object lock
        • Using object lock
    • Access keys
    • CLI User Guide
      • AWS CLI installation instructions
      • AWS CLI configuration
      • Using Impossible Cloud with AWS CLI
      • AWS CLI basic commands
      • AWS CLI advanced commands
        • Examples
      • AWS CLI for cloud-to-cloud migration scenarios
      • AWS CLI Credentials & Config chain
      • AWS CLI: IAM
        • Limitations
        • List of supported operations
        • Operations Descriptions and Examples
    • Usage
      • Storage Calculation
      • Fair use policy
    • Profile settings
      • Multi-Factor Authentication (MFA)
        • Enabling and Disabling MFA
        • MFA Reset
        • Organization-Wide Policies
  • Security
    • Securing Your Data
    • Identity Access Management (IAM)
      • Managing Users
      • Managing Groups
      • Managing Policies
    • CORS support
      • Limitations
      • CORS Configuration
  • Integrations with other applications
    • Backup Software Integrations Guides
    • Cloud Storage Browsers Integrations Guides
    • Media Management Software Integrations Guides
    • NAS Applications Integrations Guides
  • Other support resources
    • Impossible Cloud Management Console (ICMC)
    • Knowledge Base
    • Help Center
    • System Status
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. Security

CORS support

Cross-Origin Resource Sharing, or CORS, is a process that allows web applications from one domain to interact with resources from a different domain.

Example of using CORS

Let's illustrate CORS with a simple example.

Imagine you have a bucket full of pictures in Impossible Cloud Storage. You also have a website that lets your users browse these pictures. Essentially, your website (let's say, "mysite.com") is connected to your Impossible Cloud Storage bucket.

But there's a catch - web browsers have safety measures. They don't like it when a website tries to load content from a different domain. In this case, your website "mysite.com" is trying to fetch pictures from Impossible Cloud Storage, which is a different domain.

This is where CORS comes in. By setting up CORS on your Impossible Cloud Storage bucket, you're telling the browsers, "It's OK, mysite.com is allowed to access these pictures." With CORS, the browser will happily display your photos to your users.

Without CORS, your users would be staring at a blank screen instead of admiring your stunning pictures. That's why CORS is important for connecting your Impossible Cloud Storage with your web application.

PreviousManaging PoliciesNextLimitations

Last updated 1 month ago

Was this helpful?