Configuring HTTP Headers for Cloudera AI
This topic explains how to customize the HTTP headers that are accepted by Cloudera AI.
Required Role: Site Administrator
These properties are available under the site administrator panel at
.Enable Cross-Origin Resource Sharing (CORS)
Most modern browsers implement the Same-Origin Policy, which restricts how a
document or a script loaded from one origin can interact with a resource
from another origin. When the Enable cross-origin resource
sharing property is enabled on Cloudera AI,
web servers will include the Access-Control-Allow-Origin:
*
HTTP header in their HTTP responses. This gives web
applications on different domains permission to access the Cloudera AI API through browsers.
This property is disabled by default .
If this property is disabled, web applications from different domains will not be able to programmatically communicate with the Cloudera AI API through browsers.
Enable HTTP security headers
- X-XSS-Protection
- X-DNS-Prefetch-Control
- X-Frame-Options
- X-Download-Options
- X-Content-Type-Options
This property is enabled by default .
Disabling this property could leave your Cloudera AI deployment vulnerable to clickjacking, cross-site scripting (XSS), or any other injection attacks.
Enable HTTP Strict Transport Security (HSTS)
When both TLS/SSL and this property (Enable HTTP Strict Transport Security (HSTS)) are enabled, Cloudera AI will inform your browser that it should never load the site using HTTP. Additionally, all attempts to access Cloudera AI using HTTP will automatically be converted to HTTPS.
This property is disabled by default .
If you ever need to downgrade to back to HTTP, use the following sequence of steps: First, deactivate this checkbox to disable HSTS and restart Cloudera AI. Then, load the Cloudera AI web application in each browser to clear the respective browser's HSTS setting. Finally, disable TLS/SSL across the cluster. Following this sequence should help avoid a situation where users get locked out of their accounts due to browser caching.