[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["必要な情報がない","missingTheInformationINeed","thumb-down"],["複雑すぎる / 手順が多すぎる","tooComplicatedTooManySteps","thumb-down"],["最新ではない","outOfDate","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["サンプル / コードに問題がある","samplesCodeIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2024-11-24 UTC。"],[[["\u003cp\u003eContent Security Policy (CSP) secures your webpage by controlling resource loading and execution, and Google Publisher Tag (GPT) supports strict CSP using nonces.\u003c/p\u003e\n"],["\u003cp\u003eStrict CSP requires setting a \u003ccode\u003eContent-Security-Policy\u003c/code\u003e header with a random nonce, applied to all script tags including GPT's \u003ccode\u003egpt.js\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003eCross-domain rendering is necessary with CSP and GPT, enabled by calling \u003ccode\u003egoogletag.pubads().setForceSafeFrame(true)\u003c/code\u003e before ad slots load.\u003c/p\u003e\n"],["\u003cp\u003eTo avoid breaking your site, it's recommended to test your CSP policies first using the \u003ccode\u003eContent-Security-Policy-Report-Only\u003c/code\u003e header for monitoring violations.\u003c/p\u003e\n"]]],["Content Security Policy (CSP) secures web pages by controlling allowed resources. For Google Publisher Tag (GPT), only strict CSP using nonces is supported due to dynamic domain usage. Implementation involves: 1) Enabling CSP on the server by adding a `Content-Security-Policy` header, applying nonces to all script tags, including `gpt.js`, and defining directives like `script-src` and 2) Enabling cross-domain rendering for all ads using `googletag.pubads().setForceSafeFrame(true)`. Testing should use the `Content-Security-Policy-Report-Only` header.\n"],null,[]]