@@ -1096,17 +1096,17 @@ For a production deployment there are a few recommendations to keep your
1096
1096
application secure.
1097
1097
1098
1098
First of all, the message queue should never be listening on a public network
1099
- interface, to ensure that external clients never connect to it. The use of a
1100
- private network (VPC), where the communication between servers can happen
1101
- privately is highly recommended.
1102
-
1103
- In addition, all message queues support authentication and encryption.
1104
- Authentication ensures that only the Socket.IO servers and related processes
1105
- have access, while encryption prevents data to be collected by a third-party
1106
- listening on the network.
1107
-
1108
- Access credentials can be included in the connection URLs that are passed to the
1109
- client managers.
1099
+ interface, to ensure that external clients never connect to it. For a single
1100
+ node deployment, the queue should only listen on ` localhost `. For a multi-node
1101
+ system the use of a private network (VPC), where the communication between
1102
+ servers can happen privately is highly recommended.
1103
+
1104
+ In addition, all message queues support authentication and encryption, which
1105
+ can strenthen the security of the deployment. Authentication ensures that only
1106
+ the Socket.IO servers and related processes have access, while encryption
1107
+ prevents data from being collected by a third-party that is listening on the
1108
+ network. Access credentials can be included in the connection URLs that are
1109
+ passed to the client managers.
1110
1110
1111
1111
Horizontal Scaling
1112
1112
~~~~~~~~~~~~~~~~~~
0 commit comments