Do not input private or sensitive data. View Qlik Privacy & Cookie Policy.
Skip to main content

Announcements
Qlik GA: Multivariate Time Series in Qlik Predict: Get Details
cancel
Showing results for 
Search instead for 
Did you mean: 
Dirtsa
Contributor
Contributor

Security headers to Qlikview Management Console

Hi everyone,

We had a penetration test and one finding was that our qlikview servers are vulnerable for clickjacking.

In order to do better we have to implement security headers - e.g. set X-Content-Type-Options to nosniff and  X-Frame-Options to SAMEORIGIN. 

We managed this for our qlikview accesspoint by editing the config file in the WebServer folder- but we are unable to also get these headers in the qlikview management console. Does anyone know how we can manage this? 

If additional information is needed please just ask.

Many thanks!

Labels (2)
2 Solutions

Accepted Solutions
Chip_Matejowsky
Support
Support

Hello @Dirtsa,

Have a look at the Qlik Support article QlikView Management Console : Enable Cross site scripting protection as it may help with your query.  

 

Best Regards

Principal Technical Support Engineer with Qlik Support
Help users find answers! Don't forget to mark a solution that worked for you!

View solution in original post

leneborma
Contributor
Contributor

X-Frame-Options is a header included in the response to the request to state if the domain requested will allow itself to be displayed within a frame. It has nothing to do with javascript or HTML, and cannot be changed by the originator of the request. You can't set X-Frame-Options on the iframe. That is a response header set by the domain from which you are requesting the resource . They have set the header to SAMEORIGIN in this case, which means that they have disallowed loading of the resource in an iframe outside of their domain. So you cannot embed their website into yours. Browsers when see that the response header contains X-Frame-Options: SAMEORIGIN, they check your domain and block the rendering of the <iframe>. It is a security measure to avoid clickjacking.

 

View solution in original post

3 Replies
Chip_Matejowsky
Support
Support

Hello @Dirtsa,

Have a look at the Qlik Support article QlikView Management Console : Enable Cross site scripting protection as it may help with your query.  

 

Best Regards

Principal Technical Support Engineer with Qlik Support
Help users find answers! Don't forget to mark a solution that worked for you!
Dirtsa
Contributor
Contributor
Author

Thank you for your answer.  It was definitely useful to read the article. Do you know about how we can activate/enable the specific security headers as well? We had the setting from the article enabled during the penetration test, and they were still able to clickjack our qlikview environment. Therefore we're looking specifically at fixing these 2 security headers (Also they're mentioned as a must-fix).

leneborma
Contributor
Contributor

X-Frame-Options is a header included in the response to the request to state if the domain requested will allow itself to be displayed within a frame. It has nothing to do with javascript or HTML, and cannot be changed by the originator of the request. You can't set X-Frame-Options on the iframe. That is a response header set by the domain from which you are requesting the resource . They have set the header to SAMEORIGIN in this case, which means that they have disallowed loading of the resource in an iframe outside of their domain. So you cannot embed their website into yours. Browsers when see that the response header contains X-Frame-Options: SAMEORIGIN, they check your domain and block the rendering of the <iframe>. It is a security measure to avoid clickjacking.