Jump to: navigation, search

http-proxy Section

Configures Co-browse Server's HTTP proxy functionality.

allowedExternalDomains

Default value: None
Valid Values: List of any valid domains or wild cards, without specifying the port. For example, *.mydomain.com,*.net, mydomain-*.com.

Important
This option does not have a default value. In order for Co-browse to work properly, you must enter a value before starting Co-browse.

Changes take effect: Immediately

List of domains from which resources are allowed to be proxied through Co-browse server. This option enforces an additional level of control of what can be included on the web page during a Co-browse session.

clientTlsProtocols

Default value: No value
Valid Values: A comma separated list of values from the following: TLSv1, TLSv1.1, TLSv1.2
Changes take effect: After Co-browse server restart

Explicitly lists TLS protocol versions Co-browse server should use when using HTTPS to communicate with proxied resource target servers. Co-browse server does not work with SSL protocol due to its security vulnerabilities. If a target server supports only a specific protocol (for example, TLSv1), specify only this protocol.

allowedCipherSuites

Default value: no value
Valid Values: A comma separated list of cipher suites and/or their wildcard in a Regular Expression (RegExp) form (which enables coverage of all similar cipher suites in one value). For example: TLS_RSA_WITH_RC4_128_MD, TLS_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, .*RC4.*
Changes take effect: After Co-browse server restart

List of included cipher suites that will be used by SSL/TLS.

unallowedCipherSuites

Default value: no value
Valid Values: A comma separated list of cipher suites and/or their wildcard in a Regular Expression (RegExp) form (which enables coverage of all similar cipher suites in one value). For example: TLS_RSA_WITH_RC4_128_MD, TLS_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, .*RC4.*
Changes take effect: After Co-browse server restart

List of excluded cipher suites that will not be used by SSL/TLS.

Important
The excluded cipher suites will always take precedence.
This page was last edited on May 12, 2020, at 14:40.

Feedback

Comment on this article:

blog comments powered by Disqus