mirror of
https://github.com/spring-projects/spring-security.git
synced 2025-05-31 01:02:14 +00:00
SEC-2269: Fix additional links
This commit is contained in:
parent
3b2156969d
commit
a3a432f7b6
@ -420,13 +420,13 @@
|
||||
</section>
|
||||
<section xml:id="nsa-xss-protection">
|
||||
<title><literal><xss-protection></literal></title>
|
||||
<para>Adds the <a href="http://blogs.msdn.com/b/ie/archive/2008/07/02/ie8-security-part-iv-the-xss-filter.aspx">X-XSS-Protection header</a>
|
||||
to the response to assist in protecting against <a href="http://en.wikipedia.org/wiki/Cross-site_scripting#Non-Persistent">reflected / “Type-1” Cross-Site Scripting (XSS)</a>
|
||||
<para>Adds the <link xlink:href="http://blogs.msdn.com/b/ie/archive/2008/07/02/ie8-security-part-iv-the-xss-filter.aspx">X-XSS-Protection header</link>
|
||||
to the response to assist in protecting against <link xlink:href="http://en.wikipedia.org/wiki/Cross-site_scripting#Non-Persistent">reflected / “Type-1” Cross-Site Scripting (XSS)</link>
|
||||
attacks. This is in no-way a full protection to XSS attacks!</para>
|
||||
<section xml:id="nsa-xss-protection-attributes">
|
||||
<section xml:id="nsa-xss-protection-enabled">
|
||||
<title><literal>xss-protection-enabled</literal></title>
|
||||
<para>Enable or Disable <a href="http://en.wikipedia.org/wiki/Cross-site_scripting#Non-Persistent">reflected / “Type-1” Cross-Site Scripting (XSS)</a> protection.</para>
|
||||
<para>Enable or Disable <link xlink:href="http://en.wikipedia.org/wiki/Cross-site_scripting#Non-Persistent">reflected / “Type-1” Cross-Site Scripting (XSS)</link> protection.</para>
|
||||
</section>
|
||||
<section xml:id="nsa-xss-protection-block">
|
||||
<title><literal>xss-protection-block</literal></title>
|
||||
@ -446,7 +446,7 @@
|
||||
<section xml:id="nsa-content-type-options">
|
||||
<title><literal><content-type-options></literal></title>
|
||||
<para>Add the X-Content-Type-Options header with the value of nosniff to the response. This
|
||||
<a href="http://blogs.msdn.com/b/ie/archive/2008/09/02/ie8-security-part-vi-beta-2-update.aspx">disables MIME-sniffing</a>
|
||||
<link xlink:href="http://blogs.msdn.com/b/ie/archive/2008/09/02/ie8-security-part-vi-beta-2-update.aspx">disables MIME-sniffing</link>
|
||||
for IE8+ and Chrome extensions.</para>
|
||||
<section xml:id="nsa-content-type-options-parents">
|
||||
<title>Parent Elements of <literal><content-type-options></literal></title>
|
||||
|
@ -629,32 +629,34 @@ List<OpenIDAttribute> attributes = token.getAttributes();</programlisting>The
|
||||
<para>A lot of different attacks to hijack content, sessions or connections are available and lately
|
||||
browsers (optionally) can help to prevent those attacks. To enable these features we need to send some
|
||||
additional headers to the client. Spring Security allows for easy configuration for several headers.
|
||||
<programlisting language="xml">
|
||||
<![CDATA[
|
||||
<headers/>
|
||||
]]>
|
||||
<programlisting language="xml"><![CDATA[
|
||||
<http ...>
|
||||
...
|
||||
<headers/>
|
||||
</http>]]>
|
||||
</programlisting>
|
||||
</para>
|
||||
<para>Specifying the single headers element adds all the explicitly supported headers
|
||||
with their default settings. If you only want select headers to be added,
|
||||
you can add one or more of the child elements as shown below.
|
||||
<programlisting language="xml">
|
||||
<![CDATA[
|
||||
<headers>
|
||||
<!-- Add Cache-Control and Pragma headers -->
|
||||
<cache-control/>
|
||||
<!-- Add X-Content-Type-Options with value of nosniff -->
|
||||
<content-type-options/>
|
||||
<!-- Add custom headers -->
|
||||
<header name="foo" value="bar"/>
|
||||
<-- Adds HTTP Strict Transport Security (HSTS) for secure requests -->
|
||||
<hsts/>
|
||||
<!-- Add X-Frame-Options with a value of DENY -->
|
||||
<frame-options/>
|
||||
<!-- Adds X-XSS-Protection with value of 1; mode=block-->
|
||||
<xss-protection/>
|
||||
</headers>
|
||||
]]>
|
||||
<programlisting language="xml"><![CDATA[
|
||||
<http ...>
|
||||
...
|
||||
<headers>
|
||||
<!-- Add Cache-Control and Pragma headers -->
|
||||
<cache-control/>
|
||||
<!-- Add X-Content-Type-Options with value of nosniff -->
|
||||
<content-type-options/>
|
||||
<!-- Add custom headers -->
|
||||
<header name="foo" value="bar"/>
|
||||
<-- Adds HTTP Strict Transport Security (HSTS) for secure requests -->
|
||||
<hsts/>
|
||||
<!-- Add X-Frame-Options with a value of DENY -->
|
||||
<frame-options/>
|
||||
<!-- Adds X-XSS-Protection with value of 1; mode=block-->
|
||||
<xss-protection/>
|
||||
</headers>
|
||||
</http>]]>
|
||||
</programlisting>
|
||||
</para>
|
||||
<para>For additional information on how to customize the headers element refer to the <link xlink:href="#nsa-headers">headers</link>
|
||||
|
Loading…
x
Reference in New Issue
Block a user