Bug 56304 - Keycloak and HSTS settings
Keycloak and HSTS settings
Status: NEW
Product: UCS
Classification: Unclassified
Component: Keycloak
UCS 5.0
Other Linux
: P5 normal (vote)
: ---
Assigned To: UCS maintainers
UCS maintainers
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2023-07-11 10:22 CEST by Florian Best
Modified: 2023-07-11 10:55 CEST (History)
1 user (show)

See Also:
What kind of report is it?: Development Internal
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Florian Best univentionstaff 2023-07-11 10:22:35 CEST
Keycloak by default sends "Strict-Transport-Security: max-age=31536000; includeSubDomains".

curl https://ucs-sso-ng.$(hostname -d)/ -i

In UCS HSTS is configured via the UCR variables "apache2/hsts", "apache2/hsts/.*".
This is by default disabled.

UCS uses self-signed certificates.
When browsing once to https://ucs-sso-ng.$domainname/ every access to http:// https:// of the system is prevented until you import the root ca certificate into the browser.