Jump to: navigation, search

http-proxy Section

Configures Co-browse Server's HTTP proxy functionality.

allowedExternalDomains

Default value: No value
Valid Values: List of any valid domains or wild cards, without specifying the port. For example, *.mydomain.com,*.net, mydomain-*.com.

Important
This option does not have a default value. In order for Co-browse to work properly, you must enter a value before starting Co-browse.

Changes take effect: Immediately

List of domains from which resources are allowed to be proxied through Co-browse server. This option enforces an additional level of control of what can be included on the web page during a Co-browse session.

clientTlsProtocols

Default value: No value
Valid Values: A comma separated list of values from the following: TLSv1, TLSv1.1, TLSv1.2
Changes take effect: After Co-browse server restart

Explicitly lists TLS protocol versions Co-browse server should use when using HTTPS to communicate with proxied resource target servers. Co-browse server does not work with SSL protocol due to its security vulnerabilities. If a target server supports only a specific protocol (for example, TLSv1), specify only this protocol.

allowedCipherSuites

Default value: No value
Valid Values: A comma separated list of cipher suites and/or their wildcard in a Regular Expression (RegExp) form (which enables coverage of all similar cipher suites in one value). For example: TLS_RSA_WITH_RC4_128_MD, TLS_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, .*RC4.*
Changes take effect: After Co-browse server restart

List of included cipher suites that will be used by SSL/TLS.

unallowedCipherSuites

Default value: No value
Valid Values: A comma separated list of cipher suites and/or their wildcard in a Regular Expression (RegExp) form (which enables coverage of all similar cipher suites in one value). For example: TLS_RSA_WITH_RC4_128_MD, TLS_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, .*RC4.*
Changes take effect: After Co-browse server restart

List of excluded cipher suites that will not be used by SSL/TLS.

Important
The excluded cipher suites will always take precedence.

allowCookies

Default value: false
Valid Values: true or false
Changes take effect: After Co-browse server restart

Boolean value. Defines behavior on how to pass or block cookie headers that come from the customer website to the browser or from the browser to the customer website via url-proxy and css-proxy requests. Cookies are blocked by default (false value).

This page was last edited on July 31, 2020, at 14:44.

Feedback

Comment on this article:

blog comments powered by Disqus