Robert Levas created AMBARI-13351:
-------------------------------------

             Summary: Security-related HTTP headers should be set separately 
for Ambari Views then for Ambari server UI
                 Key: AMBARI-13351
                 URL: https://issues.apache.org/jira/browse/AMBARI-13351
             Project: Ambari
          Issue Type: Bug
          Components: ambari-server
    Affects Versions: 2.1.3
            Reporter: Robert Levas
            Assignee: Robert Levas
             Fix For: 2.1.3


The security-related HTTP headers should be set separately for the Ambari Views 
then for the Ambari server UI. This is because they have different 
requirements.  For example the Ambari server UI should not be allowed to 
execute in an iframe (by default) where Ambari View must be able to execute in 
an iframe invoked from the same origin.

The relevant headers are:
* Strict-Transport-Security
* X-Frame-Options
* X-XSS-Protection

These headers should be configurable via the ambari.properties such that they 
may be turned on or off - and set to some custom value.

The default value for this headers should be as follows:
* Strict-Transport-Security: max-age=31536000
* X-Frame-Options: SAMEORIGIN
* X-XSS-Protection: 1; mode=block

Strict-Transport-Security should only be turned on if SSL is enabled.

The relevant Ambari properties should be:
* Strict-Transport-Security: views.http.strict-transport-security
* X-Frame-Options: views.http.x-frame-options
* X-XSS-Protection: views.http.x-xss-protection

By setting any of these to be empty, the header is to be turned off (or not 
set).

For example:
{code:title=Sets Strict-Transport-Security to a custom value}
views.http.strict-transport-security=max-age=31536000; includeSubDomains
{code}

{code:title=Turns Strict-Transport-Security off}
views.http.strict-transport-security=
{code}




--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to