Skip to main content

This article applies to version 6.

Available in:

Small Business
Code42 Support

Enforce HTTPS access

This article applies to version 6.

Available in:

Small Business


This article describes how to configure an HTTPS Strict Transport Security (HSTS) response header for your Code42 environment. Once a browser receives an HSTS header, the browser prevents communications over HTTP to the specified domain and instead sends communications over HTTPS. Restricting access to your Code42 environment to HTTPS makes your Code42 environment more secure. 


  • This article applies to on-premises authority servers only on version 6.5 or later.
  • The HTTPS enforcement period is set to one year (31536000 seconds) by default. Set it to a shorter time if you plan to downgrade to HTTP access in the future. For example, to set the period to 90 days, set the maximum value of the c42.strictTransportSecurityHeader property to 7776000 seconds.
  • Before configuring the response header, you must first change security settings to require SSL to access the console and update the server settings to use HTTPS for the website protocol.

Configure the response header

  1. Sign in to the administration console.

  2. Double-click the logo in the upper-left corner of the administration console.
    The command-line interface appears in the administration console.
  3. Enter the followingprop.setcommand at the top of the command-line interface to configure the response header for your Code42 domain:
prop.set c42.strictTransportSecurityHeader.value max-value=<value in seconds> save all

For example, to set the enforcement period to 90 days (7776000 seconds), enter the following:

prop.set c42.strictTransportSecurityHeader.value max-value=7776000 save all
Overwriting values
Setting a new value with a prop.set command overwrites any existing value.
  1. (Optional) To apply the setting to all subdomains, add the includeSubDomains argument, for example:
prop.set c42.strictTransportSecurityHeader.value max-value=7776000;includeSubDomains save all
  1. To verify the new setting in your Code42 environment, enter the following command: c42.strictTransportSecurityHeader.value

  • Was this article helpful?