My security scan detected issue of type "Missing AntiForgeryToken implementation". My application has a layer of .netCore WebApi services, a .netCore WebApi with RazorPages service and a Angular front-end application. Reading online all CSRF Token implementation refers to RazorPages or similar but not front-end applications. The question is: is the token require in three tier architecture? Do I have to implement the policy with my fe? Is it a real issue the tool is detecting?
Thanks.
The underlying architecture does not matter. The real question is how your Angular client authenticates to whatever it talks to.
If it uses a method that is sent by the browser automatically (like cookies typically, but also for example Windows auth / SPNEGO, which might be relevant in your stack), then yes, you do need to implement protection against CSRF.
However, if your authentication is based on tokens sent as something like a request header (or even in request bodies, but the point is, not automatically by the browser), then no, your application is inherently not vulnerable to typical CSRF, and you don't need further protection.