Skip to main content
Version: 3.8.0-beta.91 (Latest)

Cross-Origin Information for OHIF

This document describes various security configurations, settings and environments/contexts needed to fully leverage OHIF’s capabilities. One may need some configurations while others might need ALL of them - it all depends on the environment OHIF is expected to run in.

In particular, three of OHIF’s features depend on these configurations:

SharedArrayBuffer

A SharedArrayBuffer is a JavaScript object that is similar to an ArrayBuffer but can be shared between web workers and the window that spawned them via the postMessage API. See SharedArrayBuffer in MDN for more information.

tip

To turn off Shared Array Buffer completely, just set useSharedArrayBuffer to false in the OHIF configuration. But keep in mind that you will not get the performance boost that Shared Array Buffer offers for decoding and rendering big volumes where web workers write to the same memory space.

Security Requirements

In order to use SharedArrayBuffer objects in the browser, the following security conditions must be met:

SharedArrayBuffer in OHIF

OHIF uses SharedArrayBuffer in its volume loader (from Cornerstone3D). It comes with the benefit of improved performance and optimization at the cost of some configuration to use it.

As such, if the following popup is shown when launching OHIF then the OHIF server will have to be configured to permit the loading of volumetric images and data. Note that stack viewports are still available and functional even when this error is present.

OHIF in non-secure context

To better determine which (if not all) of the security requirements are lacking, have a look at the browser console.

Output in the console similar to the following indicates that OHIF is not running in a secure context.

browser console for non-secure context

Absence of the above error in the console together with the presence of the Cross Origin Isolation popup warning, likely indicates that either or both of the COOP and/or COEP headers are not set for OHIF.

Embedding OHIF in an iframe

As described here, there are cases where OHIF will be embedded in an iframe. The following links provide more information for setting up and configuring OHIF to work in an iframe:

Secure Context

MDN defines a secure context as “a Window or Worker for which certain minimum standards of authentication and confidentiality are met.“

Any local URL is considered secure. The following are some examples of local URLs that are considered secure…

URLs that are NOT local must be delivered over https:// or wss:// (i.e. TLS) to be considered secure. See When is a context considered secure in MDN for more information.

iframes

A page embedded in an iframe is considered secure if it itself and every one of its embedding ancestors are delivered securely. Otherwise it is deemed insecure.

Why does OHIF require a secure context?

Beyond all of the inherent benefits of a secure connection, OHIF requires a secure context so that it can utilize SharedArrayBuffer objects for volume rendering.

Configuring/setting up a secure context

Local URLs are considered secure, and as such whenever OHIF is accessed via a local URL (e.g. http://localhost:3000) it is running in a secure context. For example, in a development environment using the default webpack setup, OHIF can be deployed and accessed in a secure context at http://localhost:3000.

The best alternative is to host OHIF over HTTPS.

tip

OHIF can be served over HTTPS in a variety of ways (these are just some examples).

  • Website hosting services that offer HTTPS deployment (e.g,. Netlify) or offer HTTPS load balancers (AWS, Google Cloud etc.)
  • Setting up a reverse proxy (e.g. nginx) with a self-signed certificate that forwards requests to the OHIF server

Origin Definition

According to MDN, a Web content’s origin is defined by the scheme (protocol), hostname (domain), and port of the URL used to access it. Two objects have the same origin only when the scheme, hostname, and port all match.

CORS - Cross-Origin Resource Sharing

A cross-origin resource is a resource (e.g. image, JSON, etc) that is served by one origin and used/referenced by a different origin.

CORS is the protocol utilized by web servers and browsers whereby a server of one origin identifies and/or restricts which of its resources that other origins (i.e. other than its own) a browser should allow access to. By default a browser does not permit cross-origin resource sharing.

The CORS mechanism relies on the HTTP response headers from the server to indicate if a resource can be shared with a different origin.

See the MDN CORS article for more information.

CORS HTTP Headers

The header that mostly concerns OHIF is listed below and should be configured accordingly on the DICOMweb server or any data source that OHIF would make XMLHttpRequests to for its data.

Access-Control-Allow-Origin: `<origin>` | *
tip

The Access-Control-Allow-Origin header specifies which origins can access the served resource embedded in the response.

Either a single, specific origin (i.e. <origin>) can be specified or ALL origins (i.e. *)

See MDN for more information.

CORS in OHIF

OHIF fetches and displays data and images from data sources. It invokes XMLHttpRequests to some data sources such as DICOMweb data sources to fetch the information to render. Typically, a DICOMweb server is hosted on a completely different origin than the one serving OHIF. As such, those XMLHttpRequests use CORS.

Troubleshooting CORS in OHIF

The following is an example screenshot of the browser console when one of OHIF’s DICOMweb data source servers is not configured for CORS.

CORS browser console errors

And the following is what is in the accompanying network tab.

CORS browser network panel errors

info

Setting the appropriate CORS header varies per server or service that is hosting the data source. What follows below is just one example to remedy the problem.

tip

If Orthanc is the data source running in a Docker container composed with/behind nginx. And OHIF is being served at localhost:3000. The issue can be remedied by adding either of the following to Orthanc’s Docker container nginx.conf file.

add_header 'Access-Control-Allow-Origin' 'http://localhost:3000' always;

Or

add_header 'Access-Control-Allow-Origin' '*' always;

COOP - Cross-Origin Opener Policy

The COOP HTTP response header restricts the global, root document of the page from being referenced and accessed by another cross-origin document that might open the page in a window. See MDN for more information.

Header Values Pertinent to OHIF (see MDN for more information)

ValueDescription
same-originRestricts the document to be referenced by openers of the same origin only.

COOP in OHIF

COOP is required for SharedArrayBuffer usage in OHIF. See also Troubleshooting Cross-origin Isolation in OHIF.

COEP - Cross-Origin Embedder Policy

The COEP HTTP response header restricts cross-origin documents from being embedded into a document (e.g. in an iframe, video, image, etc). See MDN for more information.

Header Values Pertinent to OHIF (see MDN for more information)

ValueDescription
require-corpPermits the document to load either of the following embedded resources:
credentiallessSee MDN for more information

COEP in OHIF

COEP is required for SharedArrayBuffer usage in OHIF. See also Troubleshooting Cross-origin Isolation in OHIF.

Cross-origin Isolation

Cross-origin isolation is enabled for a web page when the following COOP and COEP headers are set.

  • COOP with same-origin
  • COEP with require-corp or credentialless

iframe

An iframe is considered to have cross-origin isolation enabled if it itself has the appropriate COOP and COEP headers set as well as every one of its embedding ancestors.

Troubleshooting Cross-origin Isolation in OHIF

The SharedArrayBuffer in OHIF section describes how to determine if there are problems with cross-origin isolation in OHIF. If it is determined that COOP and/or COEP is indeed an issue, then the COOP and COEP headers must be set for OHIF. How to accomplish this varies per server or service that is hosting OHIF. The following are just a few examples.

tip

In the default dev environment, the following can be set in the webpack.pwa.js file…

devServer: {
headers: {
"Cross-Origin-Opener-Policy": "same-origin",
"Cross-Origin-Embedder-Policy": "require-corp"
}
}
tip

If deploying OHIF using Netlify, the Netlify configuration file can be used to configure the headers as such…

[[headers]]
# Define which paths this specific [[headers]] block will cover.
for = "/*"

[headers.values]
Cross-Origin-Opener-Policy = "same-origin"
Cross-Origin-Embedder-Policy = "require-corp"
tip

If OHIF is served behind nginx, then the headers can be set in the nginx.conf file as follows. The template nginx configuration file for creating a OHIF Docker image has an example of this too.

server {
location / {
add_header Cross-Origin-Opener-Policy same-origin;
add_header Cross-Origin-Embedder-Policy require-corp;
}
}

CORP - Cross-Origin Resource Policy

The CORP HTTP response header indicates which origins can read and use a resource. See MDN for more information.

Header Values (see MDN for more information)

ValueDescription
same-siteOnly requests from the same site can read the resource.
same-originOnly requests from the same origin can read the resource.
cross-originRequests from any origin can read the resource. The value is useful and exists primarily for letting documents with the COEP require-corp value know that the resource is ok to be embedded

OHIF and CORP

There are two scenarios where the CORP header is relevant to OHIF:

Both these scenarios stem from the fact that OHIF has to be served with the COEP header to support SharedArrayBuffer.

PDF from a Cross Origin DICOMweb Data Source

There are some DICOMweb data sources (e.g. dcm4chee) whereby OHIF uses the data source’s /rendered endpoint to embed a DICOM PDF document in the OHIF DOM using an <object> tag.

As specified for the COEP require-corp value, a page like OHIF with COEP header require-corp can embed cross-origin resources in DOM elements that have the crossorigin attribute OR the resource is delivered with an appropriate CORP header. The <object> tag does NOT support the crossorigin attribute. As such, the PDF must be delivered with a CORP header.

tip

Setting the CORP header varies per server or service that is hosting the data source. The following is just one example.

For a dcm4chee DICOMweb data source composed in Docker behind nginx, the CORP header can be configured in the nginx.conf file as such:

add_header 'Cross-Origin-Resource-Policy' 'cross-origin' always;

If the dcm4chee server and the OHIF server are hosted on the same site, then the following would also work:

add_header 'Cross-Origin-Resource-Policy' 'same-site' always;

OHIF as a Cross-origin Resource in an iframe

There are cases where OHIF is embedded in an iframe and the embedding page is from a different origin. Again due to the security requirements for SharedArrayBuffer, both OHIF and the embedding page must have the appropriate COEP header. In this scenario, OHIF is the cross-origin resource and since the <iframe> tag does not support the crossorigin attribute, OHIF must be served with the appropriate CORP header.

info

Setting the CORP header such that OHIF can be embedded in an iframe varies per server or service hosting OHIF. What follows are just a few examples. Note that whenever the embedding page is hosted on the same site as OHIF, consider using the same-site value instead of cross-origin.

tip

In the default dev environment, the following can be set in the webpack.pwa.js file…

devServer: {
headers: {
"Cross-Origin-Resource-Policy": "cross-origin",
}
}
tip

If deploying OHIF using Netlify, the Netlify configuration file can be used to configure the header as such…

[[headers]]
# Define which paths this specific [[headers]] block will cover.
for = "/*"

[headers.values]
Cross-Origin-Resource-Policy = "cross-origin"
tip

If OHIF is served behind nginx, then the header can be set in the nginx.conf file as follows.

server {
location / {
add_header Cross-Origin-Resource-Policy cross-origin;
}
}