Skip to content

Commit 760a888

Browse files
committed
move UploadMethods note per review
1 parent a8c460b commit 760a888

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

doc/sphinx-guides/source/installation/config.rst

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,6 @@ Nginx Configuration Rule:
5555
return 403;
5656
}
5757
58-
It's also possible to prevent file uploads via API by adjusting the :ref:`:UploadMethods` database setting.
59-
6058
If you are using a load balancer or a reverse proxy, there are some additional considerations. If no additional configurations are made and the upstream is configured to redirect to localhost, the API will be accessible from the outside, as your installation will register as origin the localhost for any requests to the endpoints "admin" and "builtin-users". To prevent this, you have two options:
6159

6260
- If your upstream is configured to redirect to localhost, you will need to set the :ref:`JVM option <useripaddresssourceheader>` to one of the following values ``%client.name% %datetime% %request% %status% %response.length% %header.referer% %header.x-forwarded-for%`` and configure from the load balancer side the chosen header to populate with the client IP address.
@@ -65,6 +63,9 @@ If you are using a load balancer or a reverse proxy, there are some additional c
6563

6664
For more information on configuring blocked API endpoints, see :ref:`dataverse.api.blocked.endpoints` and :ref:`dataverse.api.blocked.policy` in the JvmSettings documentation.
6765

66+
.. note::
67+
It's also possible to prevent file uploads via API by adjusting the :ref:`:UploadMethods` database setting.
68+
6869
Forcing HTTPS
6970
+++++++++++++
7071

0 commit comments

Comments
 (0)