[ 
https://issues.apache.org/jira/browse/MYFACES-4417?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17425665#comment-17425665
 ] 

Volodymyr Siedlecki commented on MYFACES-4417:
----------------------------------------------

Since you're using 8.5.5.18, it should be configurable based on my findings. 

Same Site: [https://www.ibm.com/support/pages/apar/PH22157]

 HSTS: 
[https://www.ibm.com/docs/en/was-nd/8.5.5?topic=sate-securing-application-server-by-using-http-strict-transport-security-hsts]
 

Additionally, HSTS is a header. So it should only allow access through HTTPS -- 
[https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security]
 


Hope this helps!

> Support for Same Site and HSTS
> ------------------------------
>
>                 Key: MYFACES-4417
>                 URL: https://issues.apache.org/jira/browse/MYFACES-4417
>             Project: MyFaces Core
>          Issue Type: Bug
>          Components: General
>    Affects Versions: 2.3.9
>         Environment: Redhat Linux
>            Reporter: Andrew Charles Cilia
>            Priority: Major
>
> Security Auditors have identified that Session Cookies 
> oam.Flash.RENDERMAP.TOKEN and other Myfaces cookies are not handling Same 
> Site and HTTP Strict Transport Security. I am unfortunately not knowledgeable 
> enough to respond to this athough I have browsed and cannot see any 
> references to these security measures in the context of myfaces. 
> Is this handled by some version of myfaces?
> If not, is it something that is in the pipeline?
> If not in the pipeline, can I find some explanation somewhere that states 
> that it is unnecessary?
>  
> Regards
>  
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to