Skip to content

Commit 865da68

Browse files
docs update
1 parent 333349c commit 865da68

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

docs/server.rst

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1096,17 +1096,17 @@ For a production deployment there are a few recommendations to keep your
10961096
application secure.
10971097

10981098
First of all, the message queue should never be listening on a public network
1099-
interface, to ensure that external clients never connect to it. The use of a
1100-
private network (VPC), where the communication between servers can happen
1101-
privately is highly recommended.
1102-
1103-
In addition, all message queues support authentication and encryption.
1104-
Authentication ensures that only the Socket.IO servers and related processes
1105-
have access, while encryption prevents data to be collected by a third-party
1106-
listening on the network.
1107-
1108-
Access credentials can be included in the connection URLs that are passed to the
1109-
client managers.
1099+
interface, to ensure that external clients never connect to it. For a single
1100+
node deployment, the queue should only listen on `localhost`. For a multi-node
1101+
system the use of a private network (VPC), where the communication between
1102+
servers can happen privately is highly recommended.
1103+
1104+
In addition, all message queues support authentication and encryption, which
1105+
can strenthen the security of the deployment. Authentication ensures that only
1106+
the Socket.IO servers and related processes have access, while encryption
1107+
prevents data from being collected by a third-party that is listening on the
1108+
network. Access credentials can be included in the connection URLs that are
1109+
passed to the client managers.
11101110

11111111
Horizontal Scaling
11121112
~~~~~~~~~~~~~~~~~~

0 commit comments

Comments
 (0)