You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: en/identity-server/7.1.0/docs/deploy/security/enable-hsts.md
+28-29Lines changed: 28 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,55 +5,54 @@ Enable HTTP Strict Transport Security (HSTS) headers for the applications deploy
5
5
!!! note
6
6
HSTS should not be enabled in development environments because transport security validations can interrupt the development processes by validating signatures of self-signed certificates.
7
7
8
-
## Enable for Console
8
+
## Enable for console
9
9
10
-
If the `HttpHeaderSecurityFilter` element is available in the `<IS_HOME>/repository/conf/tomcat/console/WEB-INF/web.xml` file as shown below, it implies that security headers are by default configured for the WSO2 Identity Server Consoles of all of your profiles.
11
-
However, in a production deployment, Strict-Transport-Security needs to be explicitly enabled by replacing the default <init-param> values of the `HttpHeaderSecurityFilter`filter.
10
+
To enable HSTS for the WSO2 Identity Server Console, update the `web.xml` file located at
11
+
`<IS_HOME>/repository/deployment/server/webapps/console/WEB-INF` and add the following filter configuration:
Similar to the WSO2 Identity Server Console, check whether the `HttpHeaderSecurityFilter` stored in the `<IS_HOME>/repository/deployment/server/webapps/` directory is available in the `web.xml` file of that particular web application. If the filter is available, enable HSTS as shown below.
37
+
Add the same filter configuration used for the Console:
Copy file name to clipboardExpand all lines: en/identity-server/next/docs/deploy/security/enable-hsts.md
+28-29Lines changed: 28 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,55 +5,54 @@ Enable HTTP Strict Transport Security (HSTS) headers for the applications deploy
5
5
!!! note
6
6
HSTS should not be enabled in development environments because transport security validations can interrupt the development processes by validating signatures of self-signed certificates.
7
7
8
-
## Enable for Console
8
+
## Enable for console
9
9
10
-
If the `HttpHeaderSecurityFilter` element is available in the `<IS_HOME>/repository/conf/tomcat/console/WEB-INF/web.xml` file as shown below, it implies that security headers are by default configured for the WSO2 Identity Server Consoles of all of your profiles.
11
-
However, in a production deployment, Strict-Transport-Security needs to be explicitly enabled by replacing the default <init-param> values of the `HttpHeaderSecurityFilter`filter.
10
+
To enable HSTS for the WSO2 Identity Server Console, update the `web.xml` file located at
11
+
`<IS_HOME>/repository/deployment/server/webapps/console/WEB-INF` and add the following filter configuration:
Similar to the WSO2 Identity Server Console, check whether the `HttpHeaderSecurityFilter` stored in the `<IS_HOME>/repository/deployment/server/webapps/` directory is available in the `web.xml` file of that particular web application. If the filter is available, enable HSTS as shown below.
37
+
Add the same filter configuration used for the Console:
0 commit comments