File tree Expand file tree Collapse file tree 31 files changed +31
-220
lines changed
v2/TokenExchange/TokenExchange.IdentityServer/Pages
TokenExchange/TokenExchange.IdentityServer/Pages
docker/ContainerizedIdentityServer/Pages
v4/MultiFrontendSSO/MultiFrontendSSO.IdentityServer/Pages
AspNetIdentityPasskeys/IdentityServerAspNetIdentityPasskeys/Pages
Permissions/IdentityServer/Pages
PipelineRegistration/IdentityServer/Pages
SimpleDcr/IdentityServer/Pages
SoftwareStatement/IdentityServer/Pages
Aspire/IdentityServer/Pages
IdentityServerHost/src/Pages
MTLS/IdentityServerHost/Pages
McpDemo/McpDemo.IdentityServer/Pages
PAT/IdentityServerHost/Pages
2_InteractiveAspNetCore/src/IdentityServer/Pages
3_AspNetCoreAndApis/src/IdentityServer/Pages
3a_TokenManagement/src/IdentityServer/Pages
4_EntityFramework/src/IdentityServer/Pages
5_AspNetIdentity/src/IdentityServerAspNetIdentity/Pages
6_JS_with_backend/src/IdentityServer/Pages
6_JS_without_backend/src/IdentityServer/Pages
SessionManagement/IdentityServerHost/Pages
Ciba/IdentityServerHost/Pages
DynamicProviders/IdentityServerHost/Pages
ProfileService/IdentityServerHost/Pages
StepUp/IdentityServerHost/Pages
WindowsAuthentication/IdentityServerHost/Pages
WsFederationDynamicProviders/IdentityServerHost/Pages
various/clients/Owin/IdentityServerHost/Pages Expand file tree Collapse file tree 31 files changed +31
-220
lines changed Original file line number Diff line number Diff line change @@ -29,20 +29,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
2929 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3030 var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';" ;
3131 // also consider adding upgrade-insecure-requests once you have HTTPS in place for production
32- //csp += "upgrade-insecure-requests;";
32+ // csp += "upgrade-insecure-requests;";
3333 // also an example if you need client images to be displayed from twitter
3434 // csp += "img-src 'self' https://pbs.twimg.com;";
3535
36- // once for standards compliant browsers
3736 if ( ! context . HttpContext . Response . Headers . ContainsKey ( "Content-Security-Policy" ) )
3837 {
3938 context . HttpContext . Response . Headers . Append ( "Content-Security-Policy" , csp ) ;
4039 }
41- // and once again for IE
42- if ( ! context . HttpContext . Response . Headers . ContainsKey ( "X-Content-Security-Policy" ) )
43- {
44- context . HttpContext . Response . Headers . Append ( "X-Content-Security-Policy" , csp ) ;
45- }
4640
4741 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
4842 var referrer_policy = "no-referrer" ;
Original file line number Diff line number Diff line change @@ -29,20 +29,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
2929 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3030 var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';" ;
3131 // also consider adding upgrade-insecure-requests once you have HTTPS in place for production
32- //csp += "upgrade-insecure-requests;";
32+ // csp += "upgrade-insecure-requests;";
3333 // also an example if you need client images to be displayed from twitter
3434 // csp += "img-src 'self' https://pbs.twimg.com;";
3535
36- // once for standards compliant browsers
3736 if ( ! context . HttpContext . Response . Headers . ContainsKey ( "Content-Security-Policy" ) )
3837 {
3938 context . HttpContext . Response . Headers [ "Content-Security-Policy" ] = csp ;
4039 }
41- // and once again for IE
42- if ( ! context . HttpContext . Response . Headers . ContainsKey ( "X-Content-Security-Policy" ) )
43- {
44- context . HttpContext . Response . Headers [ "X-Content-Security-Policy" ] = csp ;
45- }
4640
4741 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
4842 var referrer_policy = "no-referrer" ;
Original file line number Diff line number Diff line change @@ -30,20 +30,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
3030 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3131 var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';" ;
3232 // also consider adding upgrade-insecure-requests once you have HTTPS in place for production
33- //csp += "upgrade-insecure-requests;";
33+ // csp += "upgrade-insecure-requests;";
3434 // also an example if you need client images to be displayed from twitter
3535 // csp += "img-src 'self' https://pbs.twimg.com;";
3636
37- // once for standards compliant browsers
3837 if ( ! context . HttpContext . Response . Headers . ContainsKey ( "Content-Security-Policy" ) )
3938 {
4039 context . HttpContext . Response . Headers . Append ( "Content-Security-Policy" , csp ) ;
4140 }
42- // and once again for IE
43- if ( ! context . HttpContext . Response . Headers . ContainsKey ( "X-Content-Security-Policy" ) )
44- {
45- context . HttpContext . Response . Headers . Append ( "X-Content-Security-Policy" , csp ) ;
46- }
4741
4842 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
4943 var referrer_policy = "no-referrer" ;
Original file line number Diff line number Diff line change @@ -31,22 +31,15 @@ public override void OnResultExecuting(ResultExecutingContext context)
3131 var csp =
3232 "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';" ;
3333 // also consider adding upgrade-insecure-requests once you have HTTPS in place for production
34- //csp += "upgrade-insecure-requests;";
34+ // csp += "upgrade-insecure-requests;";
3535 // also an example if you need client images to be displayed from twitter
3636 // csp += "img-src 'self' https://pbs.twimg.com;";
3737
38- // once for standards compliant browsers
3938 if ( ! context . HttpContext . Response . Headers . ContainsKey ( "Content-Security-Policy" ) )
4039 {
4140 context . HttpContext . Response . Headers . Append ( "Content-Security-Policy" , csp ) ;
4241 }
4342
44- // and once again for IE
45- if ( ! context . HttpContext . Response . Headers . ContainsKey ( "X-Content-Security-Policy" ) )
46- {
47- context . HttpContext . Response . Headers . Append ( "X-Content-Security-Policy" , csp ) ;
48- }
49-
5043 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
5144 var referrer_policy = "no-referrer" ;
5245 if ( ! context . HttpContext . Response . Headers . ContainsKey ( "Referrer-Policy" ) )
Original file line number Diff line number Diff line change @@ -31,22 +31,15 @@ public override void OnResultExecuting(ResultExecutingContext context)
3131 var csp =
3232 "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';" ;
3333 // also consider adding upgrade-insecure-requests once you have HTTPS in place for production
34- //csp += "upgrade-insecure-requests;";
34+ // csp += "upgrade-insecure-requests;";
3535 // also an example if you need client images to be displayed from twitter
3636 // csp += "img-src 'self' https://pbs.twimg.com;";
3737
38- // once for standards compliant browsers
3938 if ( ! context . HttpContext . Response . Headers . ContainsKey ( "Content-Security-Policy" ) )
4039 {
4140 context . HttpContext . Response . Headers . Append ( "Content-Security-Policy" , csp ) ;
4241 }
4342
44- // and once again for IE
45- if ( ! context . HttpContext . Response . Headers . ContainsKey ( "X-Content-Security-Policy" ) )
46- {
47- context . HttpContext . Response . Headers . Append ( "X-Content-Security-Policy" , csp ) ;
48- }
49-
5043 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
5144 var referrer_policy = "no-referrer" ;
5245 if ( ! context . HttpContext . Response . Headers . ContainsKey ( "Referrer-Policy" ) )
Original file line number Diff line number Diff line change @@ -34,20 +34,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
3434 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3535 var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';" ;
3636 // also consider adding upgrade-insecure-requests once you have HTTPS in place for production
37- //csp += "upgrade-insecure-requests;";
37+ // csp += "upgrade-insecure-requests;";
3838 // also an example if you need client images to be displayed from twitter
3939 // csp += "img-src 'self' https://pbs.twimg.com;";
4040
41- // once for standards compliant browsers
4241 if ( ! context . HttpContext . Response . Headers . ContainsKey ( "Content-Security-Policy" ) )
4342 {
4443 context . HttpContext . Response . Headers . Append ( "Content-Security-Policy" , csp ) ;
4544 }
46- // and once again for IE
47- if ( ! context . HttpContext . Response . Headers . ContainsKey ( "X-Content-Security-Policy" ) )
48- {
49- context . HttpContext . Response . Headers . Append ( "X-Content-Security-Policy" , csp ) ;
50- }
5145
5246 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
5347 var referrer_policy = "no-referrer" ;
Original file line number Diff line number Diff line change @@ -34,20 +34,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
3434 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3535 var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';" ;
3636 // also consider adding upgrade-insecure-requests once you have HTTPS in place for production
37- //csp += "upgrade-insecure-requests;";
37+ // csp += "upgrade-insecure-requests;";
3838 // also an example if you need client images to be displayed from twitter
3939 // csp += "img-src 'self' https://pbs.twimg.com;";
4040
41- // once for standards compliant browsers
4241 if ( ! context . HttpContext . Response . Headers . ContainsKey ( "Content-Security-Policy" ) )
4342 {
4443 context . HttpContext . Response . Headers . Append ( "Content-Security-Policy" , csp ) ;
4544 }
46- // and once again for IE
47- if ( ! context . HttpContext . Response . Headers . ContainsKey ( "X-Content-Security-Policy" ) )
48- {
49- context . HttpContext . Response . Headers . Append ( "X-Content-Security-Policy" , csp ) ;
50- }
5145
5246 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
5347 var referrer_policy = "no-referrer" ;
Original file line number Diff line number Diff line change @@ -34,20 +34,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
3434 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3535 var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';" ;
3636 // also consider adding upgrade-insecure-requests once you have HTTPS in place for production
37- //csp += "upgrade-insecure-requests;";
37+ // csp += "upgrade-insecure-requests;";
3838 // also an example if you need client images to be displayed from twitter
3939 // csp += "img-src 'self' https://pbs.twimg.com;";
4040
41- // once for standards compliant browsers
4241 if ( ! context . HttpContext . Response . Headers . ContainsKey ( "Content-Security-Policy" ) )
4342 {
4443 context . HttpContext . Response . Headers . Append ( "Content-Security-Policy" , csp ) ;
4544 }
46- // and once again for IE
47- if ( ! context . HttpContext . Response . Headers . ContainsKey ( "X-Content-Security-Policy" ) )
48- {
49- context . HttpContext . Response . Headers . Append ( "X-Content-Security-Policy" , csp ) ;
50- }
5145
5246 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
5347 var referrer_policy = "no-referrer" ;
Original file line number Diff line number Diff line change @@ -34,20 +34,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
3434 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3535 var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';" ;
3636 // also consider adding upgrade-insecure-requests once you have HTTPS in place for production
37- //csp += "upgrade-insecure-requests;";
37+ // csp += "upgrade-insecure-requests;";
3838 // also an example if you need client images to be displayed from twitter
3939 // csp += "img-src 'self' https://pbs.twimg.com;";
4040
41- // once for standards compliant browsers
4241 if ( ! context . HttpContext . Response . Headers . ContainsKey ( "Content-Security-Policy" ) )
4342 {
4443 context . HttpContext . Response . Headers . Append ( "Content-Security-Policy" , csp ) ;
4544 }
46- // and once again for IE
47- if ( ! context . HttpContext . Response . Headers . ContainsKey ( "X-Content-Security-Policy" ) )
48- {
49- context . HttpContext . Response . Headers . Append ( "X-Content-Security-Policy" , csp ) ;
50- }
5145
5246 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
5347 var referrer_policy = "no-referrer" ;
Original file line number Diff line number Diff line change @@ -30,20 +30,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
3030 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3131 var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';" ;
3232 // also consider adding upgrade-insecure-requests once you have HTTPS in place for production
33- //csp += "upgrade-insecure-requests;";
33+ // csp += "upgrade-insecure-requests;";
3434 // also an example if you need client images to be displayed from twitter
3535 // csp += "img-src 'self' https://pbs.twimg.com;";
3636
37- // once for standards compliant browsers
3837 if ( ! context . HttpContext . Response . Headers . ContainsKey ( "Content-Security-Policy" ) )
3938 {
4039 context . HttpContext . Response . Headers . Append ( "Content-Security-Policy" , csp ) ;
4140 }
42- // and once again for IE
43- if ( ! context . HttpContext . Response . Headers . ContainsKey ( "X-Content-Security-Policy" ) )
44- {
45- context . HttpContext . Response . Headers . Append ( "X-Content-Security-Policy" , csp ) ;
46- }
4741
4842 // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
4943 var referrer_policy = "no-referrer" ;
You can’t perform that action at this time.
0 commit comments