This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Knowledge Base

Find answers to your questions and identify resolutions for known issues with knowledge base articles written by SecurID experts.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Knowledge Base
  • :
  • HSTS (Strict-Transport-Security) Header Explanation for RSA Authentication Manager 8.x
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content

HSTS (Strict-Transport-Security) Header Explanation for RSA Authentication Manager 8.x

Article Number

000038074

Applies To

RSA Product Set: SecurID
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x

Issue

This article explains the HSTS header and how to troubleshoot HSTS cases and explains that a Scan could find no HSTS if the Help on a Security Console of Self-Service console page is accessed. The static help pages do not have HSTS enabled, but neither can they be changed, they accept no input or post commands.

RSA has enabled HSTS on our console pages for a couple of years now, since AM ver. 8.2 P6.  We no longer allow the initial redirect from http to https, i.e. http://am82p.vcloud.local:7004/console-ims used to work in that it redirected to https://am82p.vcloud.local:7004/console-ims, but that is no longer true, e.g.

http://am82p.vcloud.local:7004/    -    ERR_EMPTY_RESPONSE
http://am82p.vcloud.local:7004/console-ims  -    ERR_EMPTY_RESPONSE
Image descriptionImage description
Port 7002 for AM replication behaves the same way because it does not process any http or https, only internal Authentication Manager processes communicate over the 7002 port.
http://am82p.vcloud.local:7002/  -    ERR_EMPTY_RESPONSE


While default port 7004 has no http or https pages on them.
https://am82p.vcloud.local:7004/   -    Error 404--Not Found

 

Task

  • In your browser, point to any RSA Authentication Manager Security console or Self-Service Console page, and right-click to "inspect".  Select Network. then look at Header Response. See details in Resolution.

Resolution

What is HSTS?

It is a Strict-Transport-Security header which is received in the first response from the Web-server and it is managed by the browser.  Once it is received the browser will always use HTTPS for this specific domain for a certain amount of seconds, known as max-age which will be set in the header itself as highlighted below:
 
Image descriptionImage description

The includeSubDomains field is used to force the HTTP traffic to any of the subdomains to get redirected to HTTPS instead.


How can we delete the HSTS settings?

  1. Navigate to chrome://net-internals/#hsts. This is Chrome’s UI for managing your browser’s local HSTS settings.
  2. First confirm the domain’s HSTS settings are recorded by Chrome by typing the hostname into the Query HSTS/PKP domain section at the bottom of the page.
  3. Click Query. If the query box returns Found with settings information below, the domain’s HSTS settings are saved in your browser. Note that this is a very sensitive search. Only enter the hostname, such as www.example.com or example.com without a protocol or path.
  4. Type the same hostname into the Delete domain security policies section and click Delete, Your browser will no longer force an HTTPS connection for that site!

 


What is HSTS Preloading?

There is still a window where a user who has a fresh install, or who wipes out their local state, is vulnerable. Because of that, Chrome maintains an HSTS Preload List (and other browsers maintain lists based on the Chrome list). These domains will be configured with HSTS out of the box. 

If, for example, the customer owns a site or has a Self-Service Console that they would like to see included in the preloaded HSTS list you can submit the request to HSTS Preload.  The header should look like the example below:

Image descriptionImage description

Notes

RSA Support has heard of a Scan finding a console help page that did not have HSTS set, which is why you should ask about specific URL details from any Scan finding. RSA Engineering's response here is that this is not exploitable and has no inherent risk because;
  1. Authentication Manager has already sent the browser the HSTS setting for 2 years, so the browser should honor that setting, and
  2. These help pages are static with no option to do anything involving an upload or post.
Tags (39)
  • 8.x
  • AM
  • Appliance
  • Auth Manager
  • Authentication Manager
  • Best Practice
  • Best Practices
  • Customer Support Article
  • Helpful Hints
  • How To
  • Informational
  • Instructions
  • KB Article
  • Knowledge Article
  • Knowledge Base
  • Process Steps
  • Recommendations
  • Recommended
  • Recommended Practice
  • RSA AM
  • RSA Auth Manager
  • RSA Authentication Manager
  • RSA SecurID
  • RSA SecurID Access
  • RSA SecurID Suite
  • SecurID
  • SecurID Access
  • SecurID Appliance
  • SecurID Suite
  • Security
  • Security Configuration
  • Security Recommendations
  • Tip &amp Tricks
  • Tips and Tricks
  • Tutorial
  • Version 8
  • Version 8.x
  • Walk Through
  • Walkthrough
0 Likes
Was this article helpful? Yes No
Share
No ratings

In this article

Version history
Last update:
‎2021-11-12 07:43 AM
Updated by:
Administrator RSA-KB-Sync Administrator

Related Content

Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.