In case you missed the announcement: Alteryx One is here, and so is the Spring Release! Learn more about these new and exciting releases here!

Alteryx Server Discussions

Find answers, ask questions, and share expertise about Alteryx Server.

alteryx.config file httpHeaders parameter

jzamora
7 - Meteor

Can the  following configuration be implemented in the httpHeaders parameter in the config file of Alteryx Server?:

  • Secure Mode in the header "Content-Security-Policy".

  • Cookies samesite header with value strict or lax.

  • Referrer-Policy Header withe reasonable values for “same-origin”, “strict- origin” and “no-referrer”.

  • Secure mode of the header X-Powered-By, X-Runtime, X-Version or X-AspNet-Version with the objective of not showing values.

4 REPLIES 4
carlosteixeira
15 - Aurora
15 - Aurora

Hi @jzamora how are you?

 

Yes, you can.

 

Take a look at this post:

https://community.alteryx.com/t5/Engine-Works/How-to-Cancel-Manual-Jobs-in-Alteryx-Server/ba-p/90192...

 

I'm using something about it in the last part of the workflow when I send commands to the page to cancel the job.

 

I hope this help you.

 

 

Carlos A Teixeira
jzamora
7 - Meteor

Answer provided by:

Becca Katzmann | Sr. Customer Support Engineer
support@alteryx.com | community.alteryx.com

The ability to add custom headers to lies within the 'alteryx.config' file located by default under%ProgramFiles%\Alteryx\bin\config\:
 

  1. Open the 'alteryx.config' in text editor
  2. Search the lines showing "OPTIONAL: httpHeaders"
    By default, it will be like below:

  <!--

      OPTIONAL: httpHeaders

 

      This lets you add additional/custom headers to be returned with all responses.

 <httpHeaders>

     <!--<header name="Strict-Transport-Security" value="max-age=31536000; includeSubDomains" />-->

  </httpHeaders>

 

Add Headers depending on your needs.
In this case, they added the about 4 lines to httpHeaders:

 

<!-- 

    OPTIONAL: httpHeaders

This lets you add additional/custom headers to be returned with all responses.

   <httpHeaders>

     <!--<header name="Strict-Transport-Security" value="max-age=31536000; includeSubDomains" />-->

<header name="Strict-Transport-Security" value="max-age=31536000; includeSubDomains" />21.     <header name="X-XSS-Protection" value="1; mode=block" />

<header name="Content-Security-Policy" value="default-src 'self'; img-src 'self' data:; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; frame-ancestors 'self'" />

<header name="X-Content-Type-Options" value="nosniff"/>

</httpHeaders>

 

Additional Resources
 

  • You will need to be on 2018.3 or later version in order to utilize this feature
  • When upgrading in the future, this file will likely be wiped out and replaced, you will need to enter the changes back in again.
  • Please note the X-XSS-Protection header is deprecated and should no longer be used. The Content-Security-Policy header should be used in its place. Also the policy for this header is pretty site specific and can break Server if not configured properly. 

·         ·        <httpHeaders>·            <header name="Cache-Control" value="no-store; max-age=0" />·            <header name="Strict-Transport-Security" value="max-age=31536000; includeSubDomains" />·            <header name="X-Content-Type-Options" value="nosniff" />·            <header name="Content-Security-Policy" value="default-src 'self'; img-src 'self' data:; script-src 'self' 'unsafe-eval' 'unsafe-inline'; style-src 'self' 'unsafe-inline'; frame-ancestors 'self'; form-action 'self'" />·            <header name="Access-Control-Allow-Origin" value="https://{hostnameOrFQDN}" />·            <header name="Vary" value="Origin" />·            <header name="Referrer-Policy" value="no-referrer; strict-origin-when-cross-origin" />·        </httpHeaders>

 

These headers should address most (if not all) of customer concerns reported via the last few security audit and penetration testing results I have seen. The Content-Security-Policy listed here is the strictest policy we could apply without breaking something. We do have an action item for the team to make a change so the 'data:' parameter for the img-src option will no longer be required in the future. There is also a item to remove the dependence on a remote CDN loaded style sheet that should allow for the 'unsafe inline' option to be removed in the future as well. I don't have an ETA for these changes though. 

Please let me know if that goes through successfully and if you have any questions. 

With kindness,

Becca Katzmann | Sr. Customer Support Engineer
support@alteryx.com | community.alteryx.com

jzamora
7 - Meteor

Hi Carlos,

 

Thanks for the response. Please look at the answer I got from Alteryx.

 

Best regards,

JP

carlosteixeira
15 - Aurora
15 - Aurora

Thank's @jzamora for sharing it.

Awesome.

Carlos A Teixeira