Skip to main content
Announcements
Talend Data Catalog 8.0 End of Support: December 31, 2024 Get Details

How to determine string policy for Content Security Policy Header

No ratings
cancel
Showing results for 
Search instead for 
Did you mean: 
Filippo_Nicolussi_P

How to determine string policy for Content Security Policy Header

Last Update:

Sep 20, 2021 9:14:01 AM

Updated By:

Sonja_Bauernfeind

Created date:

Nov 26, 2018 2:12:55 PM

Customer policy adopted injection via the reverse proxy of the Content Security Policy header for security reasons. 

The policy adopted is basic: default-src 'self'

Opening the QlikView AccessPoint or Qlik Sense Hub may fail or the AccessPoint may only render partially. 

The Browser Debug tools will provide more insight:

content security errors identified in debug tools.png
 

Environment:

QlikView 
Qlik Sense Enterprise on Windows 

 

The Header Content Security Option contains a string of rules that informs the browser which resource/code is trusted to be loaded, executed rendered. 

More details on the argument could be found here: 
 https://www.w3.org/TR/CSP3/ ,
 

Resolution:


For QlikView Accesspoint a first example is to use Content-Security-Policy: "default-src 'self'  'unsafe-inline' data: ;" ; (note that using 'unsafe-inline'  option could be unsafe in a the proxy injection scenario when the client will brose a different site , you could/evaluate to use instead the  sha256-hashcode version )  
Further option could be necessary if for example you have QlikView Extension Object ( Server and Document Extensions) that are using external resources downloaded from CDN locations;
In this case the troubleshoot is the same use F12/Development Tools to check the resource that violates the policy and ad an exclusion. 

 

Related Content:


QlikView Access Point Shows "Loading Content" Indefinitely,
What is CSP (Content-Security-Policy) and How does it Relate to Qlik?


 

Comments
rohitgharat
Partner - Contributor III
Partner - Contributor III

Hi @Filippo_Nicolussi_P ,

How can we implement Content Security Policy in Qliksense Enterprise version?

 

Regards,

Rohit Gharat

Sonja_Bauernfeind
Digital Support
Digital Support

Hello @rohitgharat 

I believe I already provided you with an answer to this in a different post. Copying it in here for reference:

If you are looking to add custom response headers in Qlik Sense (Enterprise on Windows), see How to add additional response headers in Qlik Sense.

Please note that we cannot advise on what headers to add.

All the best,
Sonja 

thorsten_wolff
Contributor II
Contributor II

Hello all,

How can I create a SHA256 hashcode version as written in the solution in Qlik Sense Enterprise?

Any other solution that makes the use of 'unsafe-inline' / 'unsafe-eval' in CSP unnecessary is also welcome.

I am posting the question here because Qlik Support closed my ticket with the note:
Regarding your question about "How you can do to consider using the SHA256 hashcode version instead”, please go to this article (see below link) and post this question there. The author (owner) of this article or the content manager will provide answers/feedback

Thank you very much for your help.

Thorsten

Sonja_Bauernfeind
Digital Support
Digital Support

Hello @thorsten_wolff 

I have reached out to the support agent who has assisted you and am looking into what information we can provide you with.

All the best,
Sonja 

Filippo_Nicolussi_P

Hello, @thorsten_wolff @Sonja_Bauernfeind  

 

Regarding the sha-256 method/string to use it is proposed directly in the solution in case of the article screen-shot it correspond to the third shape highlighted: 

third-shape.png    

 

 

 

 

here above in green. 

The article was published 3 years ago; do the development tools still provide the sha-256 as above? Content Security Policy header is an integrations not provided natively by Qlik; as per introduction "Customer via reverse proxy was injecting that header".  

For updates and details possible suggestion is to give a look here https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP   involving your IT Security Team.      

 

thorsten_wolff
Contributor II
Contributor II

OK, I think I was thinking too complicatedly.
I used the F12/Development Tools and have set script-src 'self' 'sha256-AXWwKykxPuYO3+hAZ/9h0sc7xvhRQSSdNtWjehy0kcU='
It still gives me the below error

Refused to execute inline event handler because it violates the following Content Security Policy directive: "script-src 'self' 'sha256-AXWwKykxPuYO3+hAZ/9h0sc7xvhRQSSdNtWjehy0kcU='". Either the 'unsafe-inline' keyword, a hash ('sha256-...'), or a nonce ('nonce-...') is required to enable inline execution. Note that hashes do not apply to event handlers, style attributes and javascript: navigations unless the 'unsafe-hashes' keyword is present.

Thank you for help.
Thorsten

Filippo_Nicolussi_P

Hi @thorsten_wolff  

Did you checked the guide https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src  for the updated version and how to?  

 

Contributors
Version history
Last update:
‎2021-09-20 09:14 AM
Updated by: