# CORS Spring Framework provides [first class support for CORS](https://docs.spring.io/spring/docs/current/spring-framework-reference/web-reactive.html#webflux-cors-intro). CORS must be processed before Spring Security because the pre-flight request will not contain any cookies (i.e. the `JSESSIONID`). If the request does not contain any cookies and Spring Security is first, the request will determine the user is not authenticated (since there are no cookies in the request) and reject it. The easiest way to ensure that CORS is handled first is to use the `CorsWebFilter`. Users can integrate the `CorsWebFilter` with Spring Security by providing a `CorsConfigurationSource`. For example, the following will integrate CORS support within Spring Security: Java ``` @Bean CorsConfigurationSource corsConfigurationSource() { CorsConfiguration configuration = new CorsConfiguration(); configuration.setAllowedOrigins(Arrays.asList("https://example.com")); configuration.setAllowedMethods(Arrays.asList("GET","POST")); UrlBasedCorsConfigurationSource source = new UrlBasedCorsConfigurationSource(); source.registerCorsConfiguration("/**", configuration); return source; } ``` Kotlin ``` @Bean fun corsConfigurationSource(): CorsConfigurationSource { val configuration = CorsConfiguration() configuration.allowedOrigins = listOf("https://example.com") configuration.allowedMethods = listOf("GET", "POST") val source = UrlBasedCorsConfigurationSource() source.registerCorsConfiguration("/**", configuration) return source } ``` The following will disable the CORS integration within Spring Security: Java ``` @Bean SecurityWebFilterChain springSecurityFilterChain(ServerHttpSecurity http) { http // ... .cors(cors -> cors.disable()); return http.build(); } ``` Kotlin ``` @Bean fun springSecurityFilterChain(http: ServerHttpSecurity): SecurityWebFilterChain { return http { // ... cors { disable() } } } ``` [HTTP Requests](../exploits/http.html)[RSocket](rsocket.html)