- 08 Aug 2023
- 4 Minutes to read
- Print
- DarkLight
Securing an Installation
- Updated on 08 Aug 2023
- 4 Minutes to read
- Print
- DarkLight
It is important to consider security risks and potential attacks on a user's the environment/system. Such threats that may afflict a system may include things such as Cross Frame Scripting or Clickjacking.
Fortunately, users can secure their installation via the following methods:
- Windows Integrated Security
- Securing Cookies: HTTPS Installations Only
- Configuring Same Site Cookies
- Displaying Exception Details
- Excluding specific File Extensions This tag makes the necessary changes to the Content-Security-Policy by adding custom headers that will embed Decisions with the domain in [BasePortalURL]
- Securing TLS
If assistance is required to secure a Decisions installation, contact support@decisions.com.
Installing Using Windows Integrated Security
If a user previously set up MSSQL Server with their Windows Authentication credentials, they may use these credentials to use Windows Integrated Security for their Database Connection.
- Run the installer and continue until reaching the Settings window. Define the desired Directory. Then, check the Show Service Settings box and click Next.
- From the Service Settings window, under Service Account, select Specify Account, then input the corresponding Windows Username and Password. Then click Next.
Note that these Account credentials should match the login for the computer installing Decisions. - Establish a database connection. Then under Connection Settings, select Windows Integrated Security. Then click Next.
- Proceed with the rest of the installation as demonstrated in the previous example.
Secure Cookies: HTTPS Installations Only
- Secure Cookies is a feature that no longer requires configuration in v7.
- If an installation is using HTTPS for web traffic communication, Decisions will by use Secure Cookies by default.
Same Site Cookies
- From the Decisions Server Folder within the default Decisions installation location (typically C:\Program Files\Decisions), add the following XML value to the Settings.xml file.
<DefaultSameSiteCookieMode></DefaultSameSiteCookieMode>
Enter one of the following text values between the DefaultSameSiteCookieMode tags according to the desired cookie settings.
Text Value Cookie Properties None Indicates the client should disable same site restrictions Lax Indicates the client should send the cookie with "same-site requests, and with "cross-site" top-level navigations. Strict Indicates the client should only send the cookie with "same-site" requests. The following screenshot provides an example of the DefaultSameSiteCookieMode configuration in the Settings.xml file of a Decisions App Server.
Enabling Show Exception Details
- From the Decisions Studio, navigate to System > Settings. Open Portal Settings.
- Under PORTAL SETTINGS, enable the Show Exception Details setting, then click SAVE.
This setting enables Exception Details to display within the Portal. This is enabled by default.
Protecting Against Cross-Frame Scripting (XFS) Attacks and Clickjacking
- Navigate to C:\Program Files\Decisions\Decisions Server and open the Settings.xml as an Administrator.
- Add the following code before the closing </Settings> tags in the xml.
This tag makes the necessary changes to the Content-Security-Policy by adding custom headers that will embed Decisions with the domain in [BasePortalURL].<CustomHeaders> <CustomHeader> <Name>Content-Security-Policy</Name> <Value>frame-ancestors 'self'; default-src 'self'; script-src https://[BasePortalURL] 'unsafe-inline' 'unsafe-eval'; img-src 'self' 'unsafe-inline' data:; style-src 'self' 'unsafe-inline' 'unsafe-eval'; font-src 'self' data:; worker-src 'self' 'unsafe-inline' blob:</Value> </CustomHeader> <CustomHeader> <Name>X-Content-Type-Options</Name> <Value>nosniff</Value> </CustomHeader> </CustomHeaders>
- Restart the server. If applied correctly, the tags as shown for requests in the Chrome Dev Tools.
Enabling Transport Layer Security (TLS)
The following section demonstrates how to enable Decisions to run with the most secure TLS Setting. Refer to Microsoft's documentation for more information on TLS settings. Decisions supports versions 1.0, 1.1, 1.2, and 1.3.
- From Decisions Studio, navigate to System > Settings. Open Integration Settings.
- Under SETTINGS > Security Option, select Secure. Save and exit.
v7.12+ - Enabling HTTP Strict Transport Security (HSTS)
By using HSTS, via response header, a web app can set up in in a way that prevents any communications from being conducted via HTTP. This can be used to prevent access to any untrusted or invalid certificates.
- From from DecisionsServerInstaller.exe, click EDIT SETTINGS.
- Locate and set EnableHttp to False.
- Set EnableHttps to True, then Set EnableHsts to True.
- Click Save to save the Settings and exit the window.
- Restart Decisions via RESTART SERVICE.
Excluding File Extensions
Excluding File Extensions, helps to limit the type of files that can be added to a Decisions environment, thus protecting users from the threat of potentially harmful files. To do so:
- From Decisions Studio, navigate to System > Settings > Portal Settings. Navigate to the GLOBALIZATION SETTINGS category.
- Under Extensions Not Allowed, define the desired extensions within the text box, to exclude them.
Excluded Extensions List
The following list represents the type of extensions (executable/scripts) that can be restricted via the Extensions Not Allowed box.
Excluded Extensions
File Extension | File Type |
---|---|
.asa | ASP Declarations file |
.ashx | ASP.NET Web handler file. Web handlers are software modules that handle Raw HTTP requests received by ASP.NET. |
.asmx | ASP.NET Web Services source file |
.asp/,aspx | Active Server Page files |
.bat | Batch file |
.chm | Compiled HTML Help file |
.cmd | Microsoft Windows NT command script |
.com | Microsoft MS-DOS program |
.dll | Windows dynamic-link library |
.exe | Executable file |
.gadget | Windows Gadget |
.hlp | Help file |
.hta | HTML program |
.htr | Script file |
.htw | HTML document |
.msc | Microsoft Common Console document |
.msh | Microsoft Agent Script helper |
.msh1 | Microsoft Agent Script helper |
.msh1xml | Microsoft Agent Script helper |
.msh2 | Microsoft Agent Script helper |
.msh2xml | Microsoft Agent Script helper |
.mshxml | Microsoft Agent Script helper |
.msi | Microsoft Windows Installer package file |
.msp | Windows Installer Update package file |
.pif | Shortcut to MS-DOS program |
.pl | Perl script |
.prf | System file |
.prg | Program Source file |
.ps1 | Windows PowerShell cmdlet file |
.ps1xml | Windows PowerShell Display configuration file |
.ps2 | Windows PowerShell cmdlet file |
.ps2xml | Windows PowerShell Display configuration file |
.psc1 | Windows PowerShell Console file |
.psc2 | Windows PowerShell Console file |
.rar | Compressed file |
.reg | Registration entries |
.rem | ACT! Database maintenance file |
.scf | Windows Explorer command file |
.scr | Screensaver |
.sfx | Compressed file |
.shb | Windows shortcut |
.shtm | HTML file that contains Server-Side directives |
.shtml | HTML file that contains Server-Side directives |
.stm | HTML file that contains Server-Side directives |
.svc | Windows Communication Foundation (WCF) Service file |
.url | Uniform Resource Locator (Internet shortcut) |
.vbe | VBScript Encoded Script file |
.vbs | VBScript file |
.zip | Compressed file |
Expand the above to tag to view the list of extensions available for exclusion.