⚠ This page is served via a proxy. Original site: https://github.com
This service does not collect credentials or authentication data.
Skip to content

Conversation

@jasontaylordev
Copy link
Contributor

No description provided.

@jasontaylordev jasontaylordev force-pushed the genxp-3600-add-authentication branch from 175b8ea to 604ff09 Compare January 8, 2026 06:42
- Renamed "HTTPS" to "TLS" in menu.yaml and added "CORS" section.
- Enhanced configuration documentation for HTTP to HTTPS redirection in audit and monitoring instances.
- Added new settings for HTTPS port in ServiceControl configuration.
- Introduced CORS configuration documentation for ServiceControl instances.
- Updated authentication documentation to clarify the use of Microsoft Entra ID and other OIDC providers.
- Added TLS configuration documentation detailing direct HTTPS and reverse proxy setups.
- Improved overall security overview and deployment scenarios in the ServiceControl documentation.

## Security Considerations

### Certificate Management
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This section seems more like dev notes than public documentation?

Maybe

Restrict read access to the certificate file to only the ServiceControl service account
can be expanded upon and belong here?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've cleaned up that list a bit, but have left a couple that the customer should know about.

  • ServiceControl supports PFX (PKCS#12) certificate files
  • Store certificate files securely with appropriate file permissions

- HSTS can be configured at either the reverse proxy level or in ServiceControl (but not both)
- HSTS is cached by browsers, so test carefully before enabling in production
- Start with a short max-age during initial deployment
- Consider the impact on subdomains before enabling `includeSubDomains`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • HSTS should not be tested on localhost because browsers cache the policy, which could break other local development
  • HSTS is disabled in Development environment (ASP.NET Core excludes localhost by default)

dev notes?

  • HSTS can be configured at either the reverse proxy level or in ServiceControl (but not both)
  • HSTS is cached by browsers, so test carefully before enabling in production
  • Start with a short max-age during initial deployment

These should probably be documented and expanded upon

  • Consider the impact on subdomains before enabling includeSubDomains

I'm not sure what this means, maybe the considerations should be spelled out more?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've taken a different approach and have removed the points altogether. I now have a short description of what HSTS is, and then a link that goes into more detail about the options.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants