The HTTP Security configuration category includes the following configurable options:
Two-Factor Authentication (2FA) Required
Block HTTP HEAD
Block HTTP OPTIONS
Custom Headers
Frame Options (Allow From)
Pin Host
Suppress Error Details
Suppress Platform Information
|
Two-Factor Authentication (2FA) Required |
|
|
BOOLEAN | |
Specifies whether Two-Factor Authentication (2FA) is required at login for all users. | |
|
|
false
|
|
|
|
Block HTTP HEAD |
|
|
BOOLEAN | |
If set, the server will reject the HTTP HEAD verb. This verb is considered insecure in some environments.
|
|
|
|
false
|
|
|
|
Block HTTP OPTIONS |
|
|
BOOLEAN | |
If set, the server will reject the HTTP OPTIONS verb. This verb is considered insecure in some environments.
|
|
|
|
false
|
|
|
|
Custom Headers |
|
|
STRING_MULTILINE | |
Specify custom headers that will be added to every response. Each new header must be specified on a new line. Each line must be in the format HeaderName:HeaderValue (with a colon after the name). | |
|
|
(no default) | |
|
|
Frame Options (Allow From) |
|
|
STRING | |
This setting can be used to set the X-Frame-Options header. Leave this setting blank (the default) in order to set a value of DENY . See Frame Options for more information.
|
|
|
|
(no default) | |
|
|
Pin Host |
|
|
STRING | |
If set, the server will always use the given host name instead of respecting the Host header. This can be useful to mitigate host poisoning attacks. The value for this setting is a comma-separated list in the form: hosta.com:8888, hostb.org . Any request that does not request one of the hosts in the list will be treated as though it had requested the first entry in the list.
|
|
|
|
(no default) | |
|
|
Suppress Error Details |
|
|
BOOLEAN | |
If enabled, the server suppresses most details about errors from being released in HTTP responses. For example, invalid paths will not be echoed in 404 messages and details about invalid OAuth2 scopes will be suppressed. This setting is useful for production environments, as it minimizes the risk of malicious users gaining insights into the running system via error messages. | |
|
|
false
|
|
|
|
Suppress Platform Information |
|
|
BOOLEAN | |
Suppress Platform Information | |
|
|
false
|
|
|