QuickStart Guide
Add Security Headers
2min
complete the following steps to add new security headers to litmus edge manager security header directives refer to the following directives when completing the steps below add header content security policy "default src 'self' https //static zdassets com https //ekr zdassets com https //ekr zendesk com https //litmus zendesk com https // zopim com https //zendesk eu my sentry io wss\ //litmus zendesk com wss\ // zopim com; img src 'self' https //litmus zendesk com https //media smooch io https //v2assets zopim io https //static zdassets com data ; font src 'self' data ; script src 'self' 'unsafe inline' 'unsafe eval' https //api smooch io https //cdn segment com/ https //www googletagmanager com https //static zdassets com; style src blob 'unsafe inline'; connect src 'self' https //api segment io/ https //ekr zdassets com https //litmus zendesk com wss\ //widget mediator zopim com https //api smooch io https // config smooch io wss\ //api smooch io;"; add header x frame options sameorigin; add header x xss protection "1; mode=block"; add header x content type options nosniff; add header strict transport security "max age=31536000; includesubdomains; preload; always;"; add header referrer policy "strict origin when cross origin"; add new security headers connect to litmus edge manager through ssh refer to access to litmus edge manager docid\ w3uhzq4tsrh7oljhult0a for default login credentials open or create the following file /etc/nginx/snippets/sec hdrs conf if the file exists, run the following command to create a backup by running the copy command cp /etc/nginx/snippets/sec hdrs conf /etc/nginx/snippets/sec hdrs conf bak add or modify the file by using the directives above in security header directives use the add header directive to add your header ensure that each add header statement ends with a semicolon (;) if a header has components separated by semicolons, use double quotation marks ("") to enclose the text after editing the file, validate the nginx configuration with the following command sudo nginx t if the validation passes without errors, reload nginx to apply the changes with the following command sudo systemctl reload nginx