Skip to content

Commit b10456a

Browse files
author
Dave Syer
committed
Refactor discussion of management.security.*
Really fixes gh-595
1 parent 5077b6c commit b10456a

File tree

1 file changed

+11
-3
lines changed

1 file changed

+11
-3
lines changed

spring-boot-docs/src/main/asciidoc/production-ready-features.adoc

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -293,13 +293,21 @@ Exposing management endpoints using the default HTTP port is a sensible choice f
293293
based deployments. If, however, your application runs inside your own data center you
294294
may prefer to expose endpoints using a different HTTP port.
295295

296-
The `management.port` property can be used to change the HTTP port. Since your management
297-
port is often protected by a firewall, and not exposed to the public. If you have Spring
298-
Security on the classpath, you might also want to disable management security:
296+
The `management.port` property can be used to change the HTTP port.
299297

300298
[source,properties,indent=0]
301299
----
302300
management.port=8081
301+
----
302+
303+
Since your management
304+
port is often protected by a firewall, and not exposed to the public you might not need
305+
security on the management endpoints, even if your main application is secure. In that
306+
case you will have Spring
307+
Security on the classpath, and you can disable management security like this:
308+
309+
[source,properties,indent=0]
310+
----
303311
management.security.enabled=false
304312
----
305313

0 commit comments

Comments
 (0)