Csp Header Provider (web-CspHeaderProvider)

this header configures a typical HTML5 HX profile.You may add additional sources to these directives, but removing any of the default sources may cause your views to stop working.

https://content-security-policy.com/ provides additional information on the Content-Security-Policy HTTP response header.

The Security Dashboard provides information about the HTTP Header configuration and whether there is any performance degradation. It provides notification for any non-secure headers and explains why the settings are not secure. To secure the header's settings, set the values as described in the properties table of the “WebService (web-WebService)” topic.

Figure 1. Content-Security-Policy properties

To access this Property Sheet, expand Config > Services > WebService > Http Header Providers and double-click Content-Security-Policy.

The term ‘self’ in the various –src (source) properties instructs the software to load resources from the same origin, that is, the same scheme, host and part.

Note: The host workbench in the properties above allows HTML views, such as Web Chart to correctly function in Workbench and should not be removed under normal circumstances.

In addition to the standard properties (Enabled and Status), these properties are unique to this component.

PropertyDefault valueDescription
Violation TexttextCreates the text to display when a browser reports a Content-Security-Policy violation to a station, which logs it in the web.reporting.csp log.

The station logs the first violation with SEVERE priority, and subsequent violations as FINE.

Note: A Content-Security-Policy violation should not typically occur during normal usage of the system. If you receive one, consider whether your Content-Security-Policy configuration should be changed to match browser behavior or if the violation represents an attempted XSS attack.
child-srctextDefines the valid sources for web workers and nested browsing contexts loaded using elements, such as <frame> or <iframe>.
connect-srctext (defaults to 'self' workbench ws://%hostname%:%port% wss://%hostname%:%port%)Restricts the URLs that can be loaded using script interfaces.
You can set up a template so that all Content-Security-Policy directives reference the %scheme%, %hostname%, and %port% from the originating HTTP request.
Note: When viewing HTML views in Workbench, this request is made to Workbench. Content-Security-Policy headers include this by default. Removing it may cause HTML views to stop working in Workbench.
default-srctext (defaults to 'self' workbench)Serves as a fallback for the other fetch directives.
frame-srctextSpecifies valid sources for nested browsing contexts loading using elements such as <frame> or <iframe>.
font-srctextSpecifies valid sources for fonts loaded using @font face.
img-srctext (defaults to 'self' workbench data:)Specifies valid sources of images and favicons.
manifest-srctextSpecifies valid sources of application manifest files.
media-srctextSpecifies valid sources for loading media using the <audio>, <video> and <track> elements.
object-srctextSpecifies valid sources for the <object>, <embed>, and <applet> elements.
report-uritext (defaults to /csp-reports)Instructs the user agent to report attempts to violate the Content Security Policy. These violation reports consist of JSON documents sent via an HTTP POST request to the specified URI.
script-srctext (defaults to 'self' workbench 'unsafe-inline' 'unsafe-eval')Specifies valid sources for JavaScript.
style-srctext (defaults to 'self' workbench 'unsafe-inline')Specifies valid sources for stylesheets.
Additional DirectivestextProvides a location to enter any Content-Security-Policy directives not covered by the other properties on this component.