cafconfig.xml.sample 3.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576
  1. <?xml version="1.0" encoding="UTF-8"?>
  2. <!--
  3. Licensed Materials - Property of IBM
  4. IBM Cognos Products: CAFCommon
  5. © Copyright IBM Corp. 2005, 2019
  6. US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
  7. -->
  8. <!--
  9. Copyright (C) 2008 IBM Cognos Incorporated. All Rights Reserved.
  10. IBM Cognos (R) is a trademark of Cognos Incorporated.
  11. -->
  12. <crn:parameters xmlns:crn="http://developer.cognos.com/schemas/crconfig/1/" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" version="2">
  13. <crn:parameter name="CAF" opaque="true">
  14. <crn:value>
  15. <!--
  16. Should we reject unsigned requests for /gd/ urls. (e.g. multipage excel reports)
  17. Default: true
  18. -->
  19. <crn:parameter name="caf_signedReportUrls">
  20. <crn:value xsi:type="xsd:boolean">true</crn:value>
  21. </crn:parameter>
  22. <!--
  23. Require a valid cafcontextid parameter for Portal form commands affecting CM data.
  24. Default: true
  25. -->
  26. <!-- crn:parameter name="caf_extendedContextId">
  27. <crn:value xsi:type="xsd:boolean">false</crn:value>
  28. </crn:parameter -->
  29. <!--
  30. Shadows a third party authentication session value to synchronize the termination of the third party session with the Cognos session.
  31. Set the value of caf_tpSessionHeader to your third party header name to enable the feature. For example: REMOTE_USER.
  32. Empty value disables the feature.
  33. Default: <empty>
  34. -->
  35. <crn:parameter name="caf_tpSessionHeader">
  36. <crn:value xsi:type="xsd:string"></crn:value>
  37. </crn:parameter>
  38. <!--
  39. A pattern defined using Perl regular expression syntax to reject well-known malicious values. The pattern is checked
  40. against all query string and form parameter values. A match results in the request being rejected.
  41. IMPORTANT: As the pattern is checked against all parameter values it can reject valid requests.
  42. For example, a regular expression matching "javascript" by itself would cause valid requests to be rejected.
  43. Sample case insensitive pattern to reject attackkeyword1 and attackkeyword2: (?i)(attackkeyword1|attackkeyword2)
  44. Sample case insensitive pattern to reject expression and fromcharcode invocations: (?i)(\bexpression\(|\bfromcharcode\s*\()
  45. To reduce the risk of upgrade issues arising from Perl regular expression incompatibilities, usage of a simple
  46. pattern is recommended. A long or complex pattern could result in performance degradation.
  47. Empty value disables the feature.
  48. <crn:parameter name="caf_globalRejectionPattern">
  49. <crn:value xsi:type="xsd:string"></crn:value>
  50. </crn:parameter>
  51. -->
  52. <!--
  53. Enable/Disable the spoofing fix. When the spoofing fix is enabled SDK users may get different return codes on some failures.
  54. 0 - no change in behaviour (Spoofed messages will be unchanged) (This is the default value)
  55. 1 - users lacking the DetailError Capabiity will see new CAF error/warning
  56. 2 - all users will see the new CAF error/warning
  57. -->
  58. <!--
  59. <crn:parameter name="caf_spoofFixEnabled">
  60. <crn:value xsi:type="xsd:int">0</crn:value>
  61. </crn:parameter>
  62. -->
  63. </crn:value>
  64. </crn:parameter>
  65. </crn:parameters>