How to enable HTTP Strict Transport Security in WorldServer (with Tomcat 9)? |
To enable HSTS in Tomcat 9.0, follow the below steps: 1- Stop Idiom Run service.2- Take a backup of configuration file <WS_install_dir>/tomcat/conf/web.xml 3- Open the <WS_install_dir>/tomcat/conf/web.xml file in a text editor. 4- Uncomment the httpHeaderSecurity filter definition. Here is what the commented-out httpHeaderSecurity filter definition looks like: <!-- <filter> <filter-name>httpHeaderSecurity</filter-name> <filter-class>org.apache.catalina.filters.HttpHeaderSecurityFilter</filter-class> <async-supported>true</async-supported> </filter> --> 5- After commenting it out, modify the "httpHeaderSecurity" section so it looks like this:
<filter>
<filter-name>httpHeaderSecurity</filter-name>
<filter-class>org.apache.catalina.filters.HttpHeaderSecurityFilter</filter-class>
<async-supported>true</async-supported>
<init-param>
<param-name>hstsEnabled</param-name>
<param-value>true</param-value>
</init-param>
<init-param>
<param-name>hstsMaxAgeSeconds</param-name>
<param-value>31556927</param-value>
</init-param>
<init-param>
<param-name>hstsIncludeSubDomains</param-name>
<param-value>true</param-value>
</init-param>
<init-param>
<param-name>antiClickJackingOption</param-name>
<param-value>SAMEORIGIN</param-value>
</init-param>
</filter>
<!--
<filter-mapping>
<filter-name>httpHeaderSecurity</filter-name>
<url-pattern>/*</url-pattern>
<dispatcher>REQUEST</dispatcher>
</filter-mapping>
-->
so it now looks like this:
<filter-mapping> <filter-name>httpHeaderSecurity</filter-name> <url-pattern>/*</url-pattern> <dispatcher>REQUEST</dispatcher> </filter-mapping>
hstsEnabled (true) : HTTP Strict Transport Security (HSTS) header to be added to the response. |