<filter>
     <filter-name>httpHeaderSecurity</filter-name>
     
<filter-class>org.apache.catalina.filters.HttpHeaderSecurityFilter</filter-class>
     <init-param>
         <param-name>antiClickJackingOption</param-name>
         <param-value>SAMEORIGIN</param-value>
     </init-param>
</filter>

In the filter mapping section of the web.xml add the following.

<filter-mapping>
     <filter-name>httpHeaderSecurity</filter-name>
     <url-pattern>/*</url-pattern>
     <dispatcher>REQUEST</dispatcher>
</filter-mapping>

Before I installed the above filter on the customer box (which *only* serves the webapp for our product), I tested it on our own box. And seeing no immediate problems, I didn't bother to pull it out of our box.

Then I discovered that another webapp sharing the Tomcat server on our box, one that *by design* is placed in a frame, in a page residing on another server, had stopped working. With the filter in place, it works fine if you go directly to the page, but it fails if you go to the page on the other server.

That raises two questions:

1. Is there something I can set in the above code, in order to allow this webapp to appear in the aforementioned frame where it is supposed to appear, but not if it's put in a frame on some other arbitrary page, elsewhere?

2. Are there other side effects of the HTTP header security filter that I should know about? It seems that on the aforementioned customer box, something happened recently that seems to be keeping our webapp from exporting M$ Excel files to the user. We don't think it's related (and have reason to believe it isn't), but one never can tell, and it never hurts to ask.

--
James H. H. Lampert
(As my freshman woodshop teacher in high school was fond of saying, "The only dumb question is the one that doesn't get asked.")

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to