HTTP Strict Transport Security (HSTS) is a web security policy mechanism. By default, HSTS is now enabled to protect web application users against some passive (eavesdropping) and active network attacks.
To disable HSTS, perform the following steps:
Go to %ZENSERVER_HOME%\bin (example: C:\Program Files (x86)\Micro Focus\ZENworks\bin).
Open the ZENworksAdminMgmtw.exe file.
In the Java tab, add the -DEnableHSTS=false at the end of the Java Options section as a new line.
By default, -DEnableHSTS= is set to true.
On a Linux Primary Server:
Open the /etc/opt/microfocus/zenworks/settings/zenserversettings.sh file.
Set -DEnableHSTS property to false in the following line:
JAVA_EXTRA_OPTION="$HEAP_DUMP_OPTIONS $ZEN_PROBE_OPTS $ZEN_JVM_TRUSTSTORE_OPTS $ZEN_JMX_OPTS -DEnableHSTS=false"
By default, -DEnableHSTS= is set to true.
NOTE:ZENworks no longer supports Windows Server as a Primary Server from version 24.2 onwards. For more information, see End of Windows Primary Server Support.
In Tomcat:
Open the <Tomcat>/conf/web.xml file from the following path:
On Linux Server: /opt/microfocus/zenworks/share/tomcat/conf/
On Windows Server: <ZENSERVER_HOME>\services\zenserver\conf\
Comment the httpHeaderSecurity filter definition and the <filter-mapping> section.
<filter>
<filter-name>httpHeaderSecurity</filter-name>
<filter-class>org.apache.catalina.filters.HttpHeaderSecurityFilter</filter-class>
<init-param>
<param-name>hstsMaxAgeSeconds</param-name>
<param-value>31536000</param-value>
</init-param>
<init-param>
<param-name>hstsIncludeSubDomains</param-name>
<param-value>true</param-value>
</init-param>
<init-param>
<param-name>antiClickJackingOption</param-name>
<param-value>SAMEORIGIN</param-value>
</init-param>
<async-supported>true</async-supported>
</filter>
<filter-mapping>
<filter-name>httpHeaderSecurity</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>Save the file and restart Tomcat.