Security Warnings¶
We strongly recommend securing your 3forge instances, especially for production environments. For in-depth guides on securing your applications, please see the 'Authentication' and 'Encryption' sections of our documentation, otherwise to quickly secure your 3forge applications, see this guide.
Some options may require additional configuration or will throw errors. The most commonly encountered security warnings and how to resolve them are listed below.
Common Security Warnings¶
AES Strength Too Low¶
-
Reason: Occurs when using a bit depth lower than 256 for encrypting information.
Resolve: Set the AES strength for encryption to 256 by updating yourlocal.properties
with the following:More applications of this encryption setting can be found here.
AES-Strength Mismatch¶
-
Reason: Occurs when there is a discrepancy between the expected and actual key strengths used in encryption or decryption operations. The AES key file must match the bit depth configured in
local.properties
.
Resolve: Updatelocal.properties
to match the bit depth of the AES key file. Alternatively, use an AES key file with matching bit depth. For example, for a 256 bit AES key:
Do Not Call Peek and Clear¶
- Reason: This warning is logged when
peekAndClear
is called on a password field. This method is meant to only be called for debugging, and should be avoided in production use cases. Resolve: Remove or comment outpeekAndClear
when not debugging.
Non-Encrypted Passwords Stored in access.txt¶
- Reason: Occurs when non-encrypted passwords are stored in
access.txt
, such as the defaultdemo|demo123
. Resolve: Follow the user encryption guide to encrypt user passwords. These values are then stored in the password fields in theaccess.txt
file.
RSA Strength for SAML Configuration¶
-
Reason: Either no identity provider certificate has been configured for the user, or the key strength of the SAML certificate is too low.
Resolve: If no identity provider certificate has been configured for the user, create one, then inlocal.properties
set the RSA key strength appropriately:
HTTP/HTTPS Whitelist¶
- Reason: HTTP/HTTPS configurations have not been correctly configured.
Resolve: Check the web configuration guide for
local.properties
configuration options enabling HTTP/HTTPS connection.
Update CORS Policy¶
-
Reason: All origins are allowed as part of the CORS policy -- your
local.properties
file likely has the following property:ami.web.permitted.cors.origins=*
Resolve: Modify the approved list of CORS origins from*
to a delimited list of approved origins, such as:
CORS Origin is Blocked¶
-
Reason: The accessed resource does not have the request's origin in its CORS policy (e.g, accessing multiple AMI dashboards with different users within the same domain).
Resolve: Ensure the request's origin host is in the CORS Policy for the accessed resource in thelocal.properties
of that center: