Security Headers
Generate HTTP security headers for your web server
Presets
Security Headers
Forces HTTPS connections for secure communication
Prevents clickjacking attacks by controlling iframe embedding
Prevents MIME type sniffing attacks
Legacy XSS filter (deprecated, use CSP instead)
Controls how much referrer information is sent
Controls browser features and APIs
Prevents loading cross-origin resources without permission
Isolates browsing context from cross-origin documents
Protects resources from being loaded by other origins
Generated Output
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload X-Frame-Options: DENY X-Content-Type-Options: nosniff Referrer-Policy: strict-origin-when-cross-origin Permissions-Policy: geolocation=(), microphone=(), camera=()
5 headers enabled
Implementation Note
Add these headers to your web server configuration. For Nginx, add to the server block. For Apache, add to .htaccess or httpd.conf. Test thoroughly before deploying to production.
Security Headers Guide
Learn how to protect your web application with HTTP security headers
What are Security Headers?
HTTP security headers are directives sent by web servers to browsers that help protect against common web vulnerabilities. They control how browsers handle your site's content, preventing attacks like XSS, clickjacking, and data injection.
How to Use
- Choose a preset (Basic, Recommended, or Strict) based on your security needs
- Toggle individual headers on/off and customize their values
- Select your output format (Raw, Nginx, or Apache)
- Copy the generated configuration and add it to your web server