This statement infers that HTTP and HTTPS have different header definitions/semantics. They do not. “HTTPS” is simply shorthand for “HTTP over SSL” or “HTTP over TLS”. The headers are the same mechanism in both HTTP and HTTPS.
Likely you mean TLS header instead of HTTPS header.
The headers in TLS would not carry any “application” level information. Or shouldn’t. The only thing would be to confirm the identify of the client or streamline the handshake to establish the secure channel – this is where the “request client certificate” or “require client certificate” settings in wM IS along with certificate ID to username mapping to make sure the client is who they say they are.
If the expectation is the data in the TLS extension is to be part of the payload that IS FLOW services process, I think this is problematic.
The question remains – what specifically is IS expected to do with that data? So far the answer has been “capture”. What is the data and what will it be used for in the IS components? With that info, we may be able to suggest alternatives. Placing data in HTTP headers is fine as long as the communication is over TLS (commonly referred to as HTTPS).
Lastly, keep in mind that ClientHello, with its extensions, may still be sent in the clear depending upon the TLS version and extensions supported by both sides. Good-bye ESNI, hello ECH! has a great description of the evolution of TLS and the behaviors. Encrypted Client Hello - the last puzzle piece to privacy has additional info.
The assumption that sending TLS extensions in the clienthello message is “more secure” may be inaccurate. And I’m not sure TLS extensions are intended for “customers” to add arbitrary data elements to it.
#TLSSSL#webMethods-io-Integration#webMethods-cloud#webMethods#https