Installing Exatom with a Content Security Policy
Exatom tags can be installed on websites that have a Content Security Policy (CSP). Typically, you will need to reach out to your website server, network, or IT department to request changes for this.
Option 1: Add Exatom to the default Content Security Policy
Use the default-src as CSP directive and add *.exatom.io to the list of allowed sources.
Example of a new Content Security Policy
- Content-Security-Policy: default-src 'self' *.exatom.io
Example of an existing Content Security Policy where Exatom was added to
- Content-Security-Policy: default-src 'self' *.example.com *.example.org *.exatom.io
Option 2: Add Exatom to the granular Content Security Policy controls
When more granular controls are needed, the following directives can be used script-src, connect-src, style-src and img-src to allow our *.exatom.io domain.
- Content-Security-Policy:
- script-src 'self' *.exatom.io;
- connect-src 'self' *.exatom.io;
- style-src 'self' *.exatom.io;
- img-src 'self' *.exatom.io;
Related Articles
Will Exatom slow down my website?
Your website should be handled with care, and that is why we heavily invest in how our tags are operated and make sure they play nicely with every environment. The Exatom tags are carefully constructed and measured to ensure that it has negligible ...
Using Exatom events or signals on your website or CRM
While we provide our Motivational Widgets to make it easier to communicate with visitors on your forms, it might not be that exact moment or format to deliver a message. You might be looking for capturing form specific signals like started or ...
Install with Google Tag Manager
This article covers how to deploy the Exatom form analytics tags to Google Tag Mananger. The steps below need to be executed twice, once for our Event tag and once for our Conversion tag. ℹ️ Exatom attributes conversions to the last form that the ...
Securing your account with two-factor authentication
Two-factor authentication (2FA) adds an extra layer of security to your account by requiring a second verification step. Step-by-step guide to enable two-factor authentication You can install an authenticator app if you haven't set one up Google ...
Privacy controls
Exatom is a cookieless, privacy-first platform by design. We also took that route whilst developing our Session Replay product. Exatom's default privacy measurements for Session Recordings, all occurring locally within the user's browser before any ...