System Configuration
Enabling HTTP Strict Transport Security (HSTS)
Overview
To enable HTTP Strict Transport Security (HSTS):
-
- Stop Cascade CMS.
- Edit the file
tomcat/conf/web.xml
. - Add the following just before the closing
</web-app>
tag:
<filter> <filter-name>httpHeaderSecurity</filter-name> <filter-class>org.apache.catalina.filters.HttpHeaderSecurityFilter</filter-class> <async-supported>true</async-supported> <init-param> <param-name>hstsEnabled</param-name> <param-value>true</param-value> </init-param> <init-param> <param-name>hstsMaxAgeSeconds</param-name> <param-value>31536000</param-value> </init-param> <init-param> <param-name>hstsIncludeSubDomains</param-name> <param-value>true</param-value> </init-param> <init-param> <param-name>antiClickJackingOption</param-name> <param-value>SAMEORIGIN</param-value> </init-param> </filter> <filter-mapping> <filter-name>httpHeaderSecurity</filter-name> <url-pattern>/*</url-pattern> <dispatcher>REQUEST</dispatcher> </filter-mapping>
- Save the file
- Start Cascade CMS
See the official Apache Tomcat documentation for additional information.
Tip: Be sure to document any changes you make to the
web.xml
file so that you can put them back in place after any future upgrades to the application.