Securing a Decisions Installation
  • 27 Mar 2023
  • 2 Minutes to read
  • Dark
    Light
  This documentation version is deprecated, please click here for the latest version.

Securing a Decisions Installation

  • Dark
    Light

Article summary

When installing, it is important to consider possible security risks and potential attacks on an instance or environment.

Fortunately, there are a number of ways to secure an installation including:


Securing Cookies for HTTPS Installs

There are two locations where the web.config will need to be modified to secure cookies.

  • C:\Program Files\Decisions\Decisions Web Host - web.config
  • C:\Program Files\Decisions\Decisions Web Host\HUI - web.config

  1. For both of the web.config files, add the following line under the <system.web> section.
    <httpCookies requireSSL="true" ></httpCookies>
  2. Then, update the <forms> tag as follows:
    <forms loginUrl=”Login.aspx" timeout=”20160″ slidingExpiration=”true” path=”/” name=”WFAuthCookie” requireSSL=”true”/>

  3. Open the instance as an Administrator then navigate to System > Settings and open Portal Settings.


Show Exception Details

Within the Edit Portal Settings dialog, scroll to the Portal catalog and enable the Secure Cookies and Show Exception Details settings. This enables exception details to display.


From here, view the details of the error or contact support for additional assistance.
2019-07-31_17h05_45.png


Protecting against Cross-frame Scripting (XFS) attacks and clickjacking

Open the C:\Program Files\Decisions\Decisions Web Host\web.config file and add the following: 

Markup
<httpProtocol>
           <customHeaders>
               <add name="X-Frame-Options" value="SAMEORIGIN" />
           </customHeaders>
			<customHeaders>
               <add name="Content-Security-Policy" value="default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; img-src 'self' 'unsafe-inline' data:; style-src 'self' 'unsafe-inline' 'unsafe-eval'; font-src 'self' data:; worker-src 'self' 'unsafe-inline' blob:" />
               <add name="X-Content-Type-Options" value="nosniff" />
           </customHeaders>
</httpProtocol>



Protecting against header injection attacks

Ensure that you have the Host address set up in your IIS Binding. Note you can set multiple host headers here.



How to secure TLS

Refer to Microsoft's Transport Layer Security (TLS) registry settings article to learn about TLS.

Navigate to System > Settings > Integration Settings. In the Security Options drop-down choose Secure to have Decisions run on the most secure TLS setting.



Excluding File Extensions

Excluding file extensions limit the allowed file types within an instance, thus protecting users from the threat of potentially harmful, unknown files.

  • Navigate to System > Settings > Portal Settings 
  • Under the  Globalization Settings category, locate the Extensions Not Allowed text box and enter the extension to exclude in the instance. 

Excluded Extensions List

The following list represents the type of extensions (executable/scripts) that can be restricted via the Extensions Not Allowed box.

Excluded Extensions

File ExtensionFile Type 
.asaASP Declarations file
.ashxASP.NET Web handler file. Web handlers are software modules that handle Raw HTTP requests received by ASP.NET.
.asmxASP.NET Web Services source file
.asp/,aspxActive Server Page files 
.bat Batch file
.chmCompiled HTML Help file 
.cmdMicrosoft Windows NT command script
.comMicrosoft MS-DOS program
.dllWindows dynamic-link library
.exeExecutable file 
.gadgetWindows Gadget
.hlpHelp file
.htaHTML program 
.htr Script file
.htwHTML document
.msc Microsoft Common Console document 
.mshMicrosoft Agent Script helper
.msh1 Microsoft Agent Script helper
.msh1xmlMicrosoft Agent Script helper
.msh2Microsoft Agent Script helper 
.msh2xmlMicrosoft Agent Script helper
.mshxmlMicrosoft Agent Script helper
.msiMicrosoft Windows Installer package file 
.mspWindows Installer Update package file 
.pifShortcut to MS-DOS program
.plPerl script
.prfSystem file
.prgProgram Source file
.ps1 Windows PowerShell cmdlet file
.ps1xmlWindows PowerShell Display configuration file
.ps2 Windows PowerShell cmdlet file 
.ps2xmlWindows PowerShell Display configuration file
.psc1Windows PowerShell Console file
.psc2 Windows PowerShell Console file
.rarCompressed file
.regRegistration entries 
.remACT! Database maintenance file
.scfWindows Explorer command file
.scrScreensaver 
.sfxCompressed file 
.shbWindows shortcut 
.shtmHTML file that contains Server-Side directives
.shtmlHTML file that contains Server-Side directives 
.stmHTML file that contains Server-Side directives 
.svc Windows Communication Foundation (WCF) Service file
.urlUniform Resource Locator (Internet shortcut) 
.vbeVBScript Encoded Script file
.vbs VBScript file
.zipCompressed file






Was this article helpful?