Last modified on February 1, 2023

A website resource in StrongDM is the combination of an IP/DNS address and authentication information used to connect to a web-based resource, such as a Redash or Grafana dashboard.

When a User or Role is assigned a Website, that entity inherits the ability to access the Website via a proxy set up on their local device.

Example: Alice wishes to access an internal website, often for a build or CI tool, which was previously set up in StrongDM as a Website. Alice sets up her StrongDM user, which is then given permission to access the Website. She installs the proxy on her laptop, then is able to quickly access the site via the StrongDM GUI.

Validation of the token is not strictly necessary since the connection will be coming through StrongDM (and thus will already be authenticated and authorized), but if you wish to manually validate it, you may do so with the VerifyJWT method in the SDKs. Each SDK has a version of this function, which reports whether the given JWT token is valid.

Resource Properties

Display NameRequiredMeaningful name to display the resource throughout StrongDM; exclude special characters like quotes (") or angle brackets (< or >)
Auth TypeRequiredSelect HTTP, HTTP Basic Auth, or HTTP Custom Auth; find a description for each in the Auth Types section
Base URLRequiredBase address and port for the website to add as a resource (for example,
HTTP SubdomainRequiredUnique string to use as your local DNS address (for example, app-prod1 turns into; be sure to input URL-safe characters
Default PathOptionalPath that serves as the starting page when accessing the resource, for example, set /_plugins/kibana
Healthcheck PathOptionalChange the healthcheck from the default / to a more specific URL; the path provided should return a healthy status code, such as 200
Headers exclusionOptionalHeaders to exclude from logging; by default, the logs in StrongDM include all of the headers passed to the website
Host OverrideOptionalValue to overwrite the host header
Resource TagsOptionalDatasource tags consisting of key-value pairs <KEY>=<VALUE> (for example, env=dev)

Auth Types

  • HTTP: This type of connection does not attempt to perform any authentication via StrongDM, so it has no additional fields required. Just make sure your URL is correct and go from there!
  • HTTP Basic Auth: This option uses standard HTTP authentication (username/password). Choosing this option exposes two additional fields: Digest Auth User (username) and Digest Auth Password (password).
  • HTTP Custom Auth: This option sends custom authentication data using the Authentication header. Once selected the field Authorization Header is exposed.

Proxy Configuration

Once a user has access to a website, they also need to configure their local system proxy. Users can add the following PAC file to their system to accomplish this task:

The PAC file in the link above automatically configures your system to proxy traffic for your websites. For more detailed setup instructions, read Connecting to Websites.

If any errors occur, please copy them into an email and send them to

You can find resources and information about the following StrongDM topics in this section: