Abstract: A computer implemented method can include receiving a request from a user on an untrusted domain and forwarding the request to an application on a trusted domain. A response can be received from the application and modified based on rules. The modified response can then be provided to the user.