Enabled property to false.

To access these properties navigate to .
| Property | Value | Description |
|---|---|---|
| Enabled | check box (defaults to false)
|
Turns on (true) and off (false) the use of Http Header Providers.
Disable the check box ( |
| Content-Security-Policy | additional properties | Notifies the browser what restrictions should be put on images, JavaScript, or CSS, in response to a request for resources.
Refer to Content-Security-Policy. |
| X-Content-Type-Options | drop-down list (defaults to nosniff)
|
Indicates to browsers that they should apply additional restrictions to auto-detect content types in downloaded files.
For best security, |
| X Frame Options | drop-down list (defaults to Sameorigin)
|
Indicates if a browser should be allowed to render pages served by your station in a <frame> or <iframe> of another site.
Use it to avoid click-jacking attacks.
NOTE:
Deny inhibits the display of some typical HTML5 Hx Profile views.
|
| X-XSS-Protection | text (defaults to 1; mode=block) | Ensures that, if an XSS attack is detected, the browser prevents the page from loading. 1; mode=block is the recommended value. |
The default values for this header have been customized for typical usage with HTML5 Hx Profiles. Additional sources may be added to these directives, but removing any of the default sources may cause your views to stop working.

The screen capture shows a
To view the same properties in the web UI, navigate to and expand Content-Secuirty-Policy.
In addition to the standard properties (Enabled and Status), these properties are unique to this component.
| Property | Value | Description |
|---|---|---|
| Violation Text | text | Creates the text to display when a browser reports a Content-Security-Policy violation to a station, which logs it in the web.reporting.csp log.
The station logs the first violation with SEVERE priority, and subsequent violations as FINE. NOTE: A Content-Security-Policy violation should not typically occur during normal usage of the system. If you receive one, consider whether your Content-Security-Policy configuration should be changed to match browser behavior or if the violation represents an attempted XSS attack.
|
| child-src | text | Defines the valid sources for web workers and nested browsing contexts loaded using elements, such as <frame> or <iframe>. |
| connect-src | text (defaults to 'self' workbench ws://%hostname%:%port% wss://%hostname%:%port%) | Restricts the URLs that can be loaded using script interfaces.
You can set up a template so that all Content-Security-Policy directives reference the %scheme%, %hostname%, and %port% from the originating HTTP request. NOTE: When viewing HTML views in
|
| default-src | text (defaults to 'self' workbench) | Serves as a fallback for the other fetch directives. |
| frame-src | text | Specifies valid sources for nested browsing contexts loading using elements such as <frame> or <iframe>. |
| font-src | text | Specifies valid sources for fonts loaded using @font face. |
| img-src | text (defaults to 'self' workbench data:) | Specifies valid sources of images and favicons. |
| manifest-src | text | Specifies valid sources of application manifest files. |
| media-src | text | Specifies valid sources for loading media using the <audio>, <video> and <track> elements. |
| object-src | text | Specifies valid sources for the <object>, <embed>, and <applet> elements. |
| report-uri | text (defaults to /csp-reports) | Instructs the user agent to report attempts to violate the Content Security Policy. These violation reports consist of JSON documents sent via an HTTP POST request to the specified URI. |
| script-src | text (defaults to 'self' workbench 'unsafe-inline' 'unsafe-eval') | Specifies valid sources for JavaScript.
To perform various functions with Asure ID, such as template discovery, template data discovery and badge printing, you must add the Asure ID port number in this property. The syntax for the port number is: http://localhost:number where number is the Asure ID port number. For example: 'self' workbench 'unsafe-inline' http://localhost:3001 |
| style-src | text (defaults to 'self' workbench 'unsafe-inline') | Specifies valid sources for stylesheets. |
| Additional Directives | text | Provides a location to enter any Content-Security-Policy directives not covered by the other properties on this component. |