Last modified on February 1, 2023
A website resource in StrongDM is the combination of an IP/DNS address and authentication information used to connect to a web-based resource, such as a Redash or Grafana dashboard.
When a User or Role is assigned a Website, that entity inherits the ability to access the Website via a proxy set up on their local device.
Example: Alice wishes to access an internal website, often for a build or CI tool, which was previously set up in StrongDM as a Website. Alice sets up her StrongDM user, which is then given permission to access the Website. She installs the proxy on her laptop, then is able to quickly access the site via the StrongDM GUI.
Validation of the token is not strictly necessary since the connection will be coming through StrongDM (and thus will already be authenticated and authorized), but if you wish to manually validate it, you may do so with the
VerifyJWT method in the SDKs. Each SDK has a version of this function, which reports whether the given JWT token is valid.
|Display Name||Required||Meaningful name to display the resource throughout StrongDM; exclude special characters like quotes (") or angle brackets (< or >)|
|Auth Type||Required||Select HTTP, HTTP Basic Auth, or HTTP Custom Auth; find a description for each in the Auth Types section|
|Base URL||Required||Base address and port for the website to add as a resource (for example, |
|HTTP Subdomain||Required||Unique string to use as your local DNS address (for example, |
|Default Path||Optional||Path that serves as the starting page when accessing the resource, for example, set |
|Healthcheck Path||Optional||Change the healthcheck from the default |
|Headers exclusion||Optional||Headers to exclude from logging; by default, the logs in StrongDM include all of the headers passed to the website|
|Host Override||Optional||Value to overwrite the host header|
|Resource Tags||Optional||Datasource tags consisting of key-value pairs |
- HTTP: This type of connection does not attempt to perform any authentication via StrongDM, so it has no additional fields required. Just make sure your URL is correct and go from there!
- HTTP Basic Auth: This option uses standard HTTP authentication (username/password). Choosing this option exposes two additional fields: Digest Auth User (username) and Digest Auth Password (password).
- HTTP Custom Auth: This option sends custom authentication data using the
Authenticationheader. Once selected the field Authorization Header is exposed.
Once a user has access to a website, they also need to configure their local system proxy. Users can add the following PAC file to their system to accomplish this task:
The PAC file in the link above automatically configures your system to proxy traffic for your websites. For more detailed setup instructions, read Connecting to Websites.
If any errors occur, please copy them into an email and send them to firstname.lastname@example.org.
You can find resources and information about the following StrongDM topics in this section: