Security Report Summary
R
Redirect: | Click here to follow the redirect to https://keycloak.project-hobbit.eu/auth/realms/Hobbit/protocol/saml?SAMLRequest=fZJRT8MgFIX%2FSt94YnSVupWsTZotxiXTmE198MVQylwdhcoFdf9e2mVxJuojJ%2Bd%2B53JgBrxVHSu92%2Bm1fPMSXFQCSOsao%2BdGg2%2Bl3Uj73gj5sF7laOdcB4yQl8aNOmtepXB4Z6oqHKUnPkwC4YFGejARXKmKiz2KFoHcaN5jvyF7eRDK8P0vpIFhJVctkOtBJcHkjDBqQKNoucjRc5qKbCq2HNdxRjGdJAnOsonAFzSuaiqm2WVFgxXAy6UGx7XLURInFMcpjul9PGZpwmj6hKLHsPmwXDKKUfTZKg2sD8qRt5oZDg0wzVsJzAm2KW9WLBgZP3V1PtL9P3O6BypmvZsN29kiNKp4NSPn2uz4PLeBsVzcGdWIQ1QqZT7moRonc%2BSslyi6Mrbl7u%2FU8Wg8KE2Nt4OVyZY3qqxrKwEQKY6pP%2F9B8QU%3D. | ||
---|---|---|---|
Site: | https://git.project-hobbit.eu/users/auth/saml | ||
IP Address: | 131.234.28.26 | ||
Report Time: | 04 May 2024 01:52:45 UTC | ||
Headers: |
|
||
Advanced: |
|
Missing Headers
Content-Security-Policy | Content Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets. |
---|---|
X-Frame-Options | X-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking. Recommended value "X-Frame-Options: SAMEORIGIN". |
X-Content-Type-Options | X-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff". |
Permissions-Policy | Permissions Policy is a new header that allows a site to control which features and APIs can be used in the browser. |
Warnings
Response is not HTML | The content-type of the response does not indicate HTML. Not all headers, and therefore the score, may be appropriate. |
---|
Raw Headers
HTTP/2 | 302 |
---|---|
cache-control | no-cache |
content-type | text/plain; charset=utf-8 |
date | Sat, 04 May 2024 01:52:45 GMT |
location | https://keycloak.project-hobbit.eu/auth/realms/Hobbit/protocol/saml?SAMLRequest=fZJRT8MgFIX%2FSt94YnSVupWsTZotxiXTmE198MVQylwdhcoFdf9e2mVxJuojJ%2Bd%2B53JgBrxVHSu92%2Bm1fPMSXFQCSOsao%2BdGg2%2Bl3Uj73gj5sF7laOdcB4yQl8aNOmtepXB4Z6oqHKUnPkwC4YFGejARXKmKiz2KFoHcaN5jvyF7eRDK8P0vpIFhJVctkOtBJcHkjDBqQKNoucjRc5qKbCq2HNdxRjGdJAnOsonAFzSuaiqm2WVFgxXAy6UGx7XLURInFMcpjul9PGZpwmj6hKLHsPmwXDKKUfTZKg2sD8qRt5oZDg0wzVsJzAm2KW9WLBgZP3V1PtL9P3O6BypmvZsN29kiNKp4NSPn2uz4PLeBsVzcGdWIQ1QqZT7moRonc%2BSslyi6Mrbl7u%2FU8Wg8KE2Nt4OVyZY3qqxrKwEQKY6pP%2F9B8QU%3D |
referrer-policy | strict-origin-when-cross-origin |
server | nginx |
set-cookie | _gitlab_session=21a1ec1eb51e29ad6dc5df3603795107; path=/; secure; HttpOnly; SameSite=None |
strict-transport-security | max-age=63072000 |
x-request-id | 01HX0MVG8WZMSGD90RX62Y4YHE |
x-runtime | 0.004208 |
content-length | 554 |
Upcoming Headers
Cross-Origin-Embedder-Policy | Cross-Origin Embedder Policy allows a site to prevent assets being loaded that do not grant permission to load them via CORS or CORP. |
---|---|
Cross-Origin-Opener-Policy | Cross-Origin Opener Policy allows a site to opt-in to Cross-Origin Isolation in the browser. |
Cross-Origin-Resource-Policy | Cross-Origin Resource Policy allows a resource owner to specify who can load the resource. |
Additional Information
referrer-policy | Referrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites. |
---|---|
server | This Server header seems to advertise the software being run on the server but you can remove or change this value. |
set-cookie | There is no Cookie Prefix on this cookie. This is not a SameSite Cookie. |
strict-transport-security | HTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS. |