[ 
https://issues.apache.org/jira/browse/NIFI-2437?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15617295#comment-15617295
 ] 

Andy LoPresto commented on NIFI-2437:
-------------------------------------

In the previous comment, it should be noted that I set up a custom LDAP 
identity provider in order to determine if it was just a client certificate 
issue. Even with LDAP authentication offered, I could only perform the HSTS 
redirect from {{http://}} to {{https://}} in Chrome. 

> Enforce HSTS to require HTTPS connections if available
> ------------------------------------------------------
>
>                 Key: NIFI-2437
>                 URL: https://issues.apache.org/jira/browse/NIFI-2437
>             Project: Apache NiFi
>          Issue Type: New Feature
>          Components: Core Framework
>    Affects Versions: 1.0.0
>            Reporter: Andy LoPresto
>              Labels: security
>         Attachments: Screen Shot 2016-10-28 at 7.45.01 PM.png, Screen Shot 
> 2016-10-28 at 7.45.53 PM.png, Screen Shot 2016-10-28 at 7.46.37 PM.png, 
> Screen Shot 2016-10-28 at 7.46.46 PM.png, Screen Shot 2016-10-28 at 7.47.00 
> PM.png, Screen Shot 2016-10-28 at 7.50.04 PM.png, Screen Shot 2016-10-28 at 
> 7.51.07 PM.png, Screen Shot 2016-10-28 at 7.51.47 PM.png, Screen Shot 
> 2016-10-28 at 7.53.51 PM.png, Screen Shot 2016-10-28 at 7.54.30 PM.png
>
>
> HTTP Strict Transport Security (HSTS) [1] [2] is a feature of HTTP which 
> instructs browsers/clients to only communicate with a resource over HTTPS. It 
> is implemented via a header sent in the response and future connections will 
> require HTTPS. 
> [1] https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security
> [2] https://www.owasp.org/index.php/HTTP_Strict_Transport_Security_Cheat_Sheet



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to