Forum Moderators: open
Following is what we have tried for debugging:
1. Check the urls of included files (e.g. gif, js, jpg). They are all from [,...] not http:// . To check that, we go to IE -> Tools -> Internet Options -> Settings -> View Files ... then check the "Internet Accress"
2. Check the source attribute in every js files.
3. Open the page in FireFox, check the HttpLiveHeaders for http://
I know you said you looked but go into the code source and make sure that you are calling images and files from the https:// and not http://
Also your SSL cert could be specific to a single directory... if so make sure all files called into the page live in the secure directory.
The solution: give your iframe a src value of 'javascript:false;'
Alternatively, you could use a src that points to a real HTML file containing "<html></html>", but the javascript:false; method should be more efficient (no additional request to the server).
Hope that helps.
Regarding iframe, we are using div tag instead, as we have some issues with BEA portlet communication using iframe.
Regarding secure directory, we put the static contents (image and js)in a subdirectory in IIS web server, the dynamic contents (jsp, forms, etc) in an BEA app server. All requests go through the IIS, then to BEA.
In the source code, we use relative path. That is how we ensure static contents are from https:// and not http://
So far, I am thinking about that let the app server serves all the content, including static content, and see where I can get from there.
Thanks for the helps.
Also, you could try installing Ethereal [ethereal.com] to sniff the packets and examine all of the http and https requests to see what, if anything, is being requested that is not secure.
[edited by: Fotiman at 2:36 pm (utc) on Oct. 4, 2007]
In a javascript function, the src for an iframe (which is a temporary place holer as we don't use iframe in our jsp) is an empty string (i.e. ""). It should referred to certain physically existed file.
Before, we have a zero-byte html file, and make it as the src of an iframe. After we remove the file as we thought we don't it, we update the src of iframe. And the "nonsecure item" message starts to show up.