Skip to content

Files

61 lines (41 loc) · 3.27 KB

front-door-security-headers.md

File metadata and controls

61 lines (41 loc) · 3.27 KB
title description services documentationcenter author editor ms.service ms.topic ms.tgt_pltfrm ms.workload ms.date ms.author
Tutorial: Add security headers with Rules Engine - Azure Front Door
This tutorial teaches you how to configure a security header via Rules Engine on Azure Front Door
frontdoor
duongau
frontdoor
tutorial
na
infrastructure-services
09/14/2020
duau

Tutorial: Add Security headers with Rules Engine

This tutorial shows how to implement security headers to prevent browser-based vulnerabilities like HTTP Strict-Transport-Security (HSTS), X-XSS-Protection, Content-Security-Policy, or X-Frame-Options. Security-based attributes can also be defined with cookies.

The following example shows you how to add a Content-Security-Policy header to all incoming requests that match the path defined in the route your Rules Engine configuration is associated with. Here, we only allow scripts from our trusted site, https://apiphany.portal.azure-api.net to run on our application.

In this tutorial, you learn how to:

[!div class="checklist"]

  • Configure a Content-Security-Policy within Rules Engine.

Prerequisites

Add a Content-Security-Policy header in Azure portal

  1. Click Add to add a new rule. Provide the rule a name and then click Add an Action > Response Header.

  2. Set the Operator to be Append to add this header as a response to all of the incoming requests to this route.

  3. Add the header name: Content-Security-Policy and define the values this header should accept. In this scenario, we choose "script-src 'self' https://apiphany.portal.azure-api.net."

    [!NOTE] Header values are limited to 640 characters.

  4. Once you've added all of the rules you'd like to your configuration, don't forget to go to your preferred route and associate your Rules Engine configuration to your Route Rule. This step is required to enable the rule to work.

portal sample

Note

In this scenario, we did not add match conditions to the rule. All incoming requests that match the path defined in the Route Rule will have this rule applied. If you would like it to only apply to a subset of those requests, be sure to add your specific match conditions to this rule.

Clean up resources

In the preceding steps, you configured Security headers with Rules Engine. If you no longer want the rule, you can remove it by clicking Delete rule.

:::image type="content" source="./media/front-door-rules-engine/rules-engine-delete-rule.png" alt-text="Delete rule":::

Next steps

To learn how to configure a Web Application Firewall for your Front Door, continue to the next tutorial.

[!div class="nextstepaction"] Web Application Firewall and Front Door