Setting security headers
You can optionally add a Content-Security-Policy header or other security headers on each HTTP response for increased security.
This option is only available if using Internet Site documents. Note that using a more restrictive Content-Security-Policy setting than what is listed below may limit some functionality on the Traveler server home page. It will not impact Traveler synchronization functionality.
- Under , open the Internet Site for web protocol for this server.
- Select
- Type of rule: HTTP response headers
- Incoming URL pattern: /traveler*
- HTTP response codes: 200, 206
- Expires header: Add header only if application did not
- Expires header: Specify as number of days (your choice on the number of days)
- Custom headers:
Custom header 1:
- Name: Content-Security-Policy
- Value: default-src 'none'; img-src 'self'; script-src 'self'; style-src 'self';
- Override: unchecked
- Applies to: All
Custom header 2:
- Name: X-Content-Type-Options
- Value: nosniff
- Override: unchecked
- Applies to: All
and enter the following: - Select
- Type of rule: HTTP response headers
- Incoming URL pattern: /LotusTraveler.nsf*
- HTTP response codes: 200, 206
- Expires header: Add header only if application did not
- Expires header: Specify as number of days (your choice on the number of days)
- Custom headers:
Custom header 1:
- Name: Content-Security-Policy
- Value: default-src 'none'; connect-src 'self'; img-src 'self'; script-src 'unsafe-inline' 'unsafe-eval'; script-src-elem 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline';
- Override: unchecked
- Applies to: All
Custom header 2:
- Name: X-Content-Type-Options
- Value: nosniff
- Override: unchecked
- Applies to: All
and enter the following: - Restart the HTTP server.