@@ -1096,17 +1096,17 @@ For a production deployment there are a few recommendations to keep your
10961096application secure.
10971097
10981098First of all, the message queue should never be listening on a public network
1099- interface, to ensure that external clients never connect to it. The use of a
1100- private network (VPC), where the communication between servers can happen
1101- privately is highly recommended.
1102-
1103- In addition, all message queues support authentication and encryption.
1104- Authentication ensures that only the Socket.IO servers and related processes
1105- have access, while encryption prevents data to be collected by a third-party
1106- listening on the network.
1107-
1108- Access credentials can be included in the connection URLs that are passed to the
1109- client managers.
1099+ interface, to ensure that external clients never connect to it. For a single
1100+ node deployment, the queue should only listen on ` localhost `. For a multi-node
1101+ system the use of a private network (VPC), where the communication between
1102+ servers can happen privately is highly recommended.
1103+
1104+ In addition, all message queues support authentication and encryption, which
1105+ can strenthen the security of the deployment. Authentication ensures that only
1106+ the Socket.IO servers and related processes have access, while encryption
1107+ prevents data from being collected by a third-party that is listening on the
1108+ network. Access credentials can be included in the connection URLs that are
1109+ passed to the client managers.
11101110
11111111Horizontal Scaling
11121112~~~~~~~~~~~~~~~~~~
0 commit comments