keycloak-scim/server_admin/topics/threat/host.adoc
Brian Dooley 2a82132ff5 KEYCLOAK-15790 Security Threats rewrite (#57)
* KEYCLOAK-15790 Security Threats rewrite

* KEYCLOAK-15790 Post feedback changes
2021-09-21 08:58:46 +02:00

8 lines
724 B
Text

=== Host
{project_name} uses the public hostname in several ways, such as within token issuer fields and URLs in password reset emails.
By default, the hostname derives from request headers. No validation exists to ensure a hostname is valid. If you are not using a load balancer, or proxy, with {project_name} to prevent invalid host headers, configure the acceptable hostnames.
The hostname's Service Provider Interface (SPI) provides a way to configure the hostname for requests. You can use this built-in provider to set a fixed URL for frontend requests while allowing backend requests based on the request URI. If the built-in provider does not have the required capability, you can develop a customized provider.