Setup
Security
Web Security Configuration and Defaults
5 min
activate implements a layered security model to protect all data, sessions, and communication channels this document details the default web security configuration applied across all activate installations https enforcement all communication with activate must occur over a secure https connection any http request is automatically redirected to https to maintain confidentiality and integrity cookie security all cookies used by activate include the following protections samesite restriction to prevent cross site data leakage secure flag to enforce https only transmission httponly flag to block client side access content security policy (csp) a strict content security policy prevents unauthorised scripts and content injection it also blocks the site from being embedded in iframes, mitigating clickjacking attacks the configuration file is located at //resources/configuration/web/contentsecuritypolicy for guidance on adjusting csp settings, refer to the https //cheatsheetseries owasp org/cheatsheets/content security policy cheat sheet html altering default directives may cause functionality issues cross site scripting (xss) all dynamic content and user input are validated and encoded by the net framework to prevent xss attacks activate sanitises and encodes user supplied data before rendering it in the web interface cross site request forgery (csrf) activate includes a built in anti forgery framework based on {{dotnetversion}} this protection applies to both forms and windows authentication logons, ensuring that requests cannot be forged from an untrusted origin for further information, see https //learn microsoft com/en us/aspnet/core/security/anti request forgery secure headers the following http headers are included in all installations to enforce modern browser security standards \<add name="x content type options" value="nosniff" /> \<add name="x frame options" value="deny" /> \<add name="x permitted cross domain policies" value="master only" /> \<add name="x xss protection" value="0" />