dashboard-with-https.conf.example 2.9 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586
  1. ##--------------------------------------------------------------------
  2. ## Dashboard with HTTPS Listener
  3. ##
  4. ## Configuration for EMQX dashboard
  5. ##--------------------------------------------------------------------
  6. ## Note: This is an example of how to configure this feature
  7. ## you should copy and paste the below data into the emqx.conf for working
  8. dashboard {
  9. ## JWT token expiration time
  10. token_expired_time = 60m
  11. ## Support Cross-Origin Resource Sharing (CORS)
  12. cors = false
  13. listeners.https {
  14. ## Port or Address to listen on, 0 means disable
  15. bind = "0.0.0.0:18084" ## or just a port number, e.g. 18084
  16. ## Socket acceptor pool size for TCP protocols
  17. num_acceptors = 8
  18. ## Maximum number of simultaneous connections
  19. max_connections = 512
  20. ## Defines the maximum length that the queue of pending connections can grow to
  21. backlog = 1024
  22. ## Send timeout for the socket
  23. send_timeout = 10s
  24. ## Enable IPv6 support, default is false, which means IPv4 only
  25. inet6 = false
  26. ## Disable IPv4-to-IPv6 mapping for the listener
  27. ipv6_v6only = false
  28. ## Enable support for `HAProxy` header
  29. proxy_header = false
  30. ## Trusted PEM format CA certificates bundle file
  31. cacertfile = "data/certs/cacert.pem"
  32. ## PEM format certificates chain file
  33. certfile = "data/certs/cert.pem"
  34. ## PEM format private key file
  35. keyfile = "data/certs/key.pem"
  36. ## Enable or disable peer verification
  37. verify = verify_none ## use verify_peer to enable
  38. ## Enable TLS session reuse
  39. reuse_sessions = true
  40. ## Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path
  41. depth = 10
  42. ## Which versions are to be supported
  43. versions = [tlsv1.3, tlsv1.2]
  44. ## TLS cipher suite names
  45. ## Note: By default, all available suites are supported, you do not need to set this
  46. ciphers = ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"]
  47. ## Allows a client and a server to renegotiate the parameters of the SSL connection on the fly
  48. secure_renegotiate = true
  49. ## Log level for SSL communication
  50. ## Type: emergency | alert | critical | error | warning | notice | info | debug | none | all
  51. log_level = notice
  52. ## Hibernate the SSL process after idling for amount of time reducing its memory footprint
  53. hibernate_after = 5s
  54. ## Forces the cipher to be set based on the server-specified order instead of the client-specified order
  55. honor_cipher_order = true
  56. ## Setting this to false to disable client-initiated renegotiation
  57. client_renegotiation = true
  58. ## Maximum time duration allowed for the handshake to complete
  59. handshake_timeout = 15s
  60. }
  61. }