http-proxy Section
Contents
Configures Co-browse Server's HTTP proxy functionality.
allowedExternalDomains
Default value: None
Valid Values: List of any valid domains or wild cards, without specifying the port. For example, *.mydomain.com,*.net, mydomain-*.com.
Changes take effect: Immediately
List of domains from which resources are allowed to be proxied through Co-browse server. This option enforces an additional level of control of what can be included on the web page during a Co-browse session.
clientTlsProtocols
Default value: No value
Valid Values: A comma separated list of values from the following: TLSv1, TLSv1.1, TLSv1.2
Changes take effect: After Co-browse server restart
Explicitly lists TLS protocol versions Co-browse server should use when using HTTPS to communicate with proxied resource target servers. Co-browse server does not work with SSL protocol due to its security vulnerabilities. If a target server supports only a specific protocol (for example, TLSv1), specify only this protocol.
allowedCipherSuites
Default value: no value
Valid Values: A comma separated list of cipher suites and/or their wildcard in a Regular Expression (RegExp) form (which enables coverage of all similar cipher suites in one value). For example: TLS_RSA_WITH_RC4_128_MD, TLS_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, .*RC4.*
Changes take effect: After Co-browse server restart
List of included cipher suites that will be used by SSL/TLS.
unallowedCipherSuites
Default value: no value
Valid Values: A comma separated list of cipher suites and/or their wildcard in a Regular Expression (RegExp) form (which enables coverage of all similar cipher suites in one value). For example: TLS_RSA_WITH_RC4_128_MD, TLS_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, .*RC4.*
Changes take effect: After Co-browse server restart
List of excluded cipher suites that will not be used by SSL/TLS.
