CORS Header Generator — Cross-Origin Config Tool
Build CORS configuration headers interactively for web servers and APIs. Set allowed origins, methods, request headers, credentials, and preflight cache duration — then copy the generated Access-Control headers or ready-to-paste code snippets for nginx, Express.js, Flask, and .NET.
How to Use CORS Header Generator — Cross-Origin Config Tool
How to Use the CORS Header Generator
Step 1: Choose a Preset (optional)
Click one of the three preset buttons at the top of the configuration panel to instantly load a common CORS setup:
- Open API — allows all origins (
*) with GET/POST/OPTIONS and no credentials. Use for fully public APIs. - SPA + API — a single origin with full CRUD methods, Authorization header, and credentials enabled. The most common setup for a single-page app calling a backend API.
- Strict — one origin, GET only, minimal headers. Use for read-only, tightly controlled APIs.
Step 2: Configure Your CORS Policy
Allowed Origins
Enter a single origin URL (e.g., https://app.example.com), * to allow any origin, or a comma-separated list for multiple specific origins. Note: using * with credentials enabled is not permitted by browsers.
Allowed Methods Click the HTTP method buttons to toggle them on or off. Highlight the methods your API actually uses. Always include OPTIONS for preflight requests.
Allowed Headers
Toggle the common request headers your API expects to receive. Add any custom headers (e.g., X-Tenant-Id) in the text input below the toggles.
Exposed Headers (optional)
List response headers that the browser should expose to client-side JavaScript (e.g., X-Request-Id, X-Rate-Limit-Remaining).
Allow Credentials
Enable this if your API uses cookies, HTTP authentication, or TLS client certificates. Must be used with a specific origin — not *.
Max Age Sets how long (in seconds) browsers may cache preflight results. Use the quick presets (1h, 24h, 7d) or enter a custom value.
Step 3: Choose an Output Tab
Click the output tabs to switch between:
- HTTP Headers — the raw
Access-Control-*header lines to add to any HTTP response - nginx —
add_headerdirectives and preflight handler block - Express.js —
corsnpm package configuration object - Flask —
flask-corsCORS configuration - .NET —
AddCorsandUseCorsmiddleware setup for ASP.NET Core
Step 4: Copy and Apply
Click Copy to copy the output to your clipboard, then paste it into your server configuration or application code.
Frequently Asked Questions
Most Viewed Tools
TOTP Code Generator — 2FA Testing Tool
Generate time-based one-time passwords from a TOTP secret key. Enter your base32 secret, choose a period and digit length, and get the current and next codes with a live countdown timer. Useful for testing and debugging 2FA integrations.
Use Tool →JSON to Zod — Schema Generator
Generate Zod validation schema code from a JSON sample object. Infers z.string(), z.number(), z.boolean(), z.array(), z.object(), and z.null() types automatically. Handles nested objects, arrays of objects with optional field detection, and outputs copy-ready TypeScript with import and z.infer type alias.
Use Tool →JSONL Formatter — Line-by-Line Validator
Format, validate, and inspect JSON Lines (JSONL) and NDJSON files. Validates each line individually, reports parse errors by line number, outputs compact JSONL or a pretty-print preview, and lets you download the cleaned file.
Use Tool →TLS Cipher Suite Checker — Strength Analyzer
Check TLS protocol version compatibility and cipher suite strength ratings against current best practices. Supports IANA and OpenSSL cipher names — rates each suite as Strong, Weak, or Deprecated and explains why.
Use Tool →Password Entropy Calculator — Crack Time Estimator
Calculate the information-theoretic bit entropy of any password or API key. Detects character set pools automatically, shows the total number of possible combinations, and estimates crack time across five attack scenarios from rate-limited web logins to GPU cracking clusters.
Use Tool →Secret Scanner — API Key & Credential Detector
Scan pasted text, code, or config files for accidentally exposed API keys, tokens, passwords, and private keys. Detects 50+ secret types across AWS, GitHub, Stripe, OpenAI, and more — all client-side, nothing leaves your browser.
Use Tool →Screen Size Converter — Diagonal Dimension Tool
Calculate screen width and height from diagonal size and aspect ratio. Convert between inches and centimeters for displays, TVs, and monitors with instant dimension calculations.
Use Tool →TOML Config Validator — Syntax Error Finder
Validate TOML configuration file syntax and report errors with line numbers. Paste any TOML content — Cargo.toml, pyproject.toml, config.toml — and instantly see a green checkmark with key counts and structure stats, or a precise error message pointing to the exact line. Includes a collapsible JSON structure preview to confirm what was parsed.
Use Tool →Related API & Backend Tools
REST Endpoint Documenter — Markdown Doc Generator
Document a REST endpoint quickly by entering the URL, method, headers, and sample request/response. Generates formatted Markdown documentation and an example cURL command instantly.
Use Tool →JWT Token Validator — Signature Verifier
Decode and validate JWT tokens instantly in your browser. Inspect header and payload claims, check expiry, and verify HMAC signatures (HS256/HS384/HS512). Free and private.
Use Tool →OAuth PKCE Generator — Create Secure Code Verifiers and Challenges
Generate RFC 7636 PKCE code verifier and challenge pairs for OAuth 2.0 authorization code flow. Choose verifier length, get the SHA-256 code challenge, and see exactly where each value goes in the auth URL and token exchange request.
Use Tool →API Error Decoder — Fix Suggestion Tool
Decode HTTP status codes and OAuth 2.0 error strings with plain-English descriptions, common causes, and actionable fix suggestions. Covers every HTTP 1xx–5xx status code and all standard OAuth 2.0 error responses. Results appear instantly as you type.
Use Tool →OpenAPI Spec Validator — Swagger Compliance Checker
Validate OpenAPI 2.0 (Swagger) and OpenAPI 3.0/3.1 specification files for compliance, missing required fields, unresolved $ref paths, and schema errors. Paste JSON or YAML or upload a file — errors and warnings are listed by path with severity levels and actionable fix suggestions. All validation runs entirely in your browser.
Use Tool →API Mock Data Generator — Realistic JSON Builder
Generate structured, realistic mock data for API endpoint testing. Define fields with names and types — UUID, name, email, integer, enum, date, and more — set how many rows you need, and export as a JSON array, NDJSON, or CSV. All generation runs entirely in your browser with no data sent to any server.
Use Tool →OpenAPI Mock Generator — Turn API Specs into Live Mock Servers
Paste an OpenAPI 3.x or Swagger 2.0 spec, select any endpoint, and instantly get a realistic mock request body and response matching the defined schemas. Also generates a ready-to-run cURL command.
Use Tool →Webhook Validator — Payload & Signature Checker
Validate and inspect webhook payloads in your browser. Auto-detects GitHub, Stripe, Slack, and Shopify webhooks, extracts event details, and optionally verifies HMAC signatures. Free and private.
Use Tool →Share Your Feedback
Help us improve this tool by sharing your experience