Replies: 5 comments
-
control access to it with your nginx config. if you're using https, basic auth could do the trick. you could also only allow your ip to access that location. if you were bored or paranoid you could even require a client certificate to be furnished by your browser. it's up to you. |
Beta Was this translation helpful? Give feedback.
-
Great answer @ITwrx, thanks! This is one of the reasons I didn't put any auth in there... Some people will be using nginx, some apache, some will want something simple like HTTP Auth, others more complicated. Can't get one-size-fits-all, so it's very much a Bring Your Own Auth party. ;-) |
Beta Was this translation helpful? Give feedback.
-
Because there is no setting of the (yes the following config is httpd, but you can do similar things in nginx) So, if you do put in some kind of access restriction to this, ensure you also set
If you control and sanitise
Noting that by default X-Forwarded-For is appended to by AWS ELBs and that the client can manipulate it before it hits your servers; hence the need to sanitise it yourself. I would like to see the |
Beta Was this translation helpful? Give feedback.
-
I secure it by adding some extra authentication stuff before the main code. Like this:
|
Beta Was this translation helpful? Give feedback.
-
In apache conf restrict access to internal ip: <Location /opcache.php> |
Beta Was this translation helpful? Give feedback.
-
How would I securely deploy this to a production server running on nginx?
Beta Was this translation helpful? Give feedback.
All reactions