returned for Tags:"HSTS"
ASP.NET Core basic middleware for supporting HTTPS Redirection and HTTP Strict-Transport-Security.
This package was built from the source code at https://github.com/aspnet/BasicMiddleware/tree/2d3ad1cb0f9872da40c6d143ce4554563971ae04
Middleware for adding security headers to an ASP.NET Core application. Allows you to easily add Content Security Policy, Strict Transport Security, and Public Key Pins to an app.
2,604 total downloads
OWIN middleware to place HSTS headers
Lib.AspNetCore.Security is a library which provides security features like Content Security Policy, Strict Transport Security or Expect-CT for ASP.NET Core
Adds the Strict-Transport-Security header to all secure responses.
2,804 total downloads
HTTP Strict Transport Security (HSTS) describes a method for a web site to tell client browsers that they should only interact with it over secure transport, i.e. TLS Whilst there have been browser plugins which support this draft specification, support for HSTS was announced for v4 of Google Chrome...
Middleware used to add an HTTP Strict Transport Security header to ASP.NET Core responses.
HTTP Strict Transport Security (HSTS) support for System.Net.HttpClient, enforcing HTTPS when required by the remote host or preload list.
Adds extra security measures for PEN tests:
- Set all timeouts to 20 minutes
- Forces SSL on all requests
- Enforces HTTPOnly and SSL cookies
- Clears unneeded HTTP header information
- Disables iFraming and adds Strict-Transport-Security to HTTP header
ASP.NET Core middleware that enforce that https scheme is used and that adds the HTTP Strict Transport (HSTS) header for all HTTP responses to request made using https scheme.
Adds/removes conservative set of security minded HTTP headers and redirects HTTP requests to HTTPS while maintaining keep alive functionality. Now supports Application Insights. For full details see readme.md on project site.