-
Notifications
You must be signed in to change notification settings - Fork 302
Document ServiceControl / ServicePulse support for authentication and SSL/TLS #7947
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
ee39943 to
576ea1b
Compare
…steps and configuration examples
175b8ea to
604ff09
Compare
- Renamed "HTTPS" to "TLS" in menu.yaml and added "CORS" section. - Enhanced configuration documentation for HTTP to HTTPS redirection in audit and monitoring instances. - Added new settings for HTTPS port in ServiceControl configuration. - Introduced CORS configuration documentation for ServiceControl instances. - Updated authentication documentation to clarify the use of Microsoft Entra ID and other OIDC providers. - Added TLS configuration documentation detailing direct HTTPS and reverse proxy setups. - Improved overall security overview and deployment scenarios in the ServiceControl documentation.
|
|
||
| ## Security Considerations | ||
|
|
||
| ### Certificate Management |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This section seems more like dev notes than public documentation?
Maybe
Restrict read access to the certificate file to only the ServiceControl service account
can be expanded upon and belong here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've cleaned up that list a bit, but have left a couple that the customer should know about.
- ServiceControl supports PFX (PKCS#12) certificate files
- Store certificate files securely with appropriate file permissions
| - HSTS can be configured at either the reverse proxy level or in ServiceControl (but not both) | ||
| - HSTS is cached by browsers, so test carefully before enabling in production | ||
| - Start with a short max-age during initial deployment | ||
| - Consider the impact on subdomains before enabling `includeSubDomains` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- HSTS should not be tested on localhost because browsers cache the policy, which could break other local development
- HSTS is disabled in Development environment (ASP.NET Core excludes localhost by default)
dev notes?
- HSTS can be configured at either the reverse proxy level or in ServiceControl (but not both)
- HSTS is cached by browsers, so test carefully before enabling in production
- Start with a short max-age during initial deployment
These should probably be documented and expanded upon
- Consider the impact on subdomains before enabling
includeSubDomains
I'm not sure what this means, maybe the considerations should be spelled out more?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've taken a different approach and have removed the points altogether. I now have a short description of what HSTS is, and then a link that goes into more detail about the options.
No description provided.