You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
By default `http_method` configuration is `GET` for backwards compatibility. It's recommended
79
73
to use `POST` requests to avoid credentials logging.
@@ -87,33 +81,33 @@ against the URIs listed in the configuration file. It will add query string
87
81
88
82
### user_path
89
83
90
-
*`username` - the name of the user
91
-
*`password` - the password provided (may be missing if e.g. rabbitmq-auth-mechanism-ssl is used)
84
+
*`username`: the name of the user
85
+
*`password`: the password provided (may be missing if e.g. rabbitmq-auth-mechanism-ssl is used)
92
86
93
87
### vhost_path
94
88
95
-
*`username` - the name of the user
96
-
*`vhost` - the name of the virtual host being accessed
97
-
*`ip` - the client ip address
89
+
*`username`: the name of the user
90
+
*`vhost`: the name of the virtual host being accessed
91
+
*`ip`: the client ip address
98
92
99
93
Note that you cannot create arbitrary virtual hosts using this plugin; you can only determine whether your users can see / access the ones that exist.
100
94
101
95
### resource_path
102
96
103
-
*`username` - the name of the user
104
-
*`vhost` - the name of the virtual host containing the resource
105
-
*`resource` - the type of resource (`exchange`, `queue`, `topic`)
106
-
*`name` - the name of the resource
107
-
*`permission` - the access level to the resource (`configure`, `write`, `read`) - see [the Access Control guide](http://www.rabbitmq.com/access-control.html) for their meaning
97
+
*`username`: the name of the user
98
+
*`vhost`: the name of the virtual host containing the resource
99
+
*`resource`: the type of resource (`exchange`, `queue`, `topic`)
100
+
*`name`: the name of the resource
101
+
*`permission`:the access level to the resource (`configure`, `write`, `read`): see [the Access Control guide](http://www.rabbitmq.com/access-control.html) for their meaning
108
102
109
103
### topic_path
110
104
111
-
*`username` - the name of the user
112
-
*`vhost` - the name of the virtual host containing the resource
113
-
*`resource` - the type of resource (`topic` in this case)
114
-
*`name` - the name of the exchange
115
-
*`permission` - the access level to the resource (`write` or `read`)
116
-
*`routing_key` - the routing key of a published message (when the permission is `write`)
105
+
*`username`: the name of the user
106
+
*`vhost`: the name of the virtual host containing the resource
107
+
*`resource`: the type of resource (`topic` in this case)
108
+
*`name`: the name of the exchange
109
+
*`permission`: the access level to the resource (`write` or `read`)
110
+
*`routing_key`: the routing key of a published message (when the permission is `write`)
117
111
or routing key of the queue binding (when the permission is `read`)
118
112
119
113
See [topic authorisation](http://www.rabbitmq.com/access-control.html#topic-authorisation) for more information
@@ -122,54 +116,51 @@ about topic authorisation.
122
116
Your web server should always return HTTP 200 OK, with a body
123
117
containing:
124
118
125
-
*`deny` - deny access to the user / vhost / resource
126
-
*`allow` - allow access to the user / vhost / resource
127
-
*`allow [list of tags]`- (for `user_path` only) - allow access, and mark the user as an having the tags listed
119
+
*`deny`: deny access to the user / vhost / resource
120
+
*`allow`: allow access to the user / vhost / resource
121
+
*`allow [list of tags]` (for `user_path` only): allow access, and mark the user as an having the tags listed
128
122
129
123
## Using TLS/HTTPS
130
124
131
125
If your Web server uses HTTPS and certificate verification, you need to
132
126
configure the plugin to use a CA and client certificate/key pair using the `rabbitmq_auth_backend_http.ssl_options` config variable:
It is recommended to use TLS for authentication and enable peer verification.
151
147
152
148
### Wildcard Certificates
153
149
154
150
If the certificate of your Web Server should be matched against a wildcard certificate in your `cacertfile`, the following option must be added to the `ssl_options`:
0 commit comments