Hi Jim. I was just reading up on HSTS at
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security.
For information's sake, I will include the following from this article:
Note: The Strict-Transport-Security header is ignored by the browser when your site is accessed using HTTP; this is because an attacker may intercept HTTP connections and inject the header or remove it. When your site is accessed over HTTPS with no certificate errors, the browser knows your site is HTTPS capable and will honor the Strict-Transport-Security header.
The first time your site is accessed using HTTPS and it returns the Strict-Transport-Security header, the browser records this information, so that future attempts to load the site using HTTP will automatically use HTTPS instead.
When the expiration time specified by the Strict-Transport-Security header elapses, the next attempt to load the site via HTTP will proceed as normal instead of automatically using HTTPS.
To enable this in Abyss, you want to force any HTTP connections to redirect to HTTPS. (Note: Obviously, the protocol for the host must be HTTP+HTTPS.)
To make that happen, go to your host --> General --> Advanced Parameters --> Exclusively Serve On HTTPS --> Add.
Virtual Path: /*
To enable the HSTS header, go to your host --> General --> Advanced Parameters --> Custom HTTP Headers --> Add.
Try adding the following:
Virtual Path: /*
HTTP Header Name: Strict-Transport-Security
HTTP Header Value: max-age=31536000; includeSubDomains
This should put the header on every webpage/resource your host transfers out. It will be ignored by the user's browser on HTTP connections, so that is why you want to do the HTTP --> HTTPS redirect.
Be careful with HSTS. If your certificate expires or the browser detects issues with your certificate, your website will potentially be entirely inaccessible. (This can even happen if the user's clock is outside of your cert's valid from and to dates.)