diff --git a/SAS/TMSS/frontend/tmss_webapp/src/authenticate/auth.js b/SAS/TMSS/frontend/tmss_webapp/src/authenticate/auth.js
index 1248708029c029ca3e97255c9fe83434c6bfc690..69e8224ac3df55fb12089dd4c2d124d405eb9549 100644
--- a/SAS/TMSS/frontend/tmss_webapp/src/authenticate/auth.js
+++ b/SAS/TMSS/frontend/tmss_webapp/src/authenticate/auth.js
@@ -18,7 +18,7 @@ const Auth = {
             user = JSON.parse(user);
             return Auth.getUserPermission(user);
         }   else {
-            //Keycloak authendication
+            //Keycloak authentication
             const res = await AuthService.getKeycloakAuthState();
             if (res && res.is_authenticated) {
                 localStorage.setItem("loginType", 'Keycloak');
@@ -28,7 +28,7 @@ const Auth = {
                     return prev;
                 }, {});
                 const userDetails = {'name':res.username, 'token': cookies.csrftoken};
-                axios.defaults.headers.common['Authorization'] = `Token ${cookies.csrftoken}`;
+                // axios.defaults.headers.common['Authorization'] = `Token ${cookies.csrftoken}`;
                 localStorage.setItem("user", JSON.stringify(userDetails));
                 return Auth.getUserPermission(userDetails);
             }
@@ -39,6 +39,7 @@ const Auth = {
     getUserPermission: async (user) => {
         if (user.token) {
             axios.defaults.headers.common['Authorization'] = `Token ${user.token}`;
+            axios.defaults.headers.common['X-CSRFTOKEN'] = `${user.token}`;
             const permissions = await AuthStore.getState();
             if(!permissions.userRolePermission.project) {
                 await PermissionStackUtil.getPermissions(true);