dashboard-with-https.conf.example 2.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182
  1. ## Dashboard on HTTPS
  2. ##
  3. ## Configure HTTPS for EMQX dashboard
  4. dashboard {
  5. ## JWT token expiration time
  6. token_expired_time = 60m
  7. ## Support Cross-Origin Resource Sharing (CORS)
  8. cors = false
  9. listeners.https {
  10. ## Port or Address to listen on, 0 means disable
  11. bind = "0.0.0.0:18084" ## or just a port number, e.g. 18084
  12. ## Socket acceptor pool size for TCP protocols
  13. num_acceptors = 8
  14. ## Maximum number of simultaneous connections
  15. max_connections = 512
  16. ## Defines the maximum length that the queue of pending connections can grow to
  17. backlog = 1024
  18. ## Send timeout for the socket
  19. send_timeout = 10s
  20. ## Enable IPv6 support, default is false, which means IPv4 only
  21. inet6 = false
  22. ## Disable IPv4-to-IPv6 mapping for the listener
  23. ipv6_v6only = false
  24. ## Enable support for `HAProxy` header
  25. proxy_header = false
  26. ## Trusted PEM format CA certificates bundle file
  27. cacertfile = "data/certs/cacert.pem"
  28. ## PEM format certificates chain file
  29. certfile = "data/certs/cert.pem"
  30. ## PEM format private key file
  31. keyfile = "data/certs/key.pem"
  32. ## Enable or disable peer verification
  33. verify = verify_none ## use verify_peer to enable
  34. ## Enable TLS session reuse
  35. reuse_sessions = true
  36. ## Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path
  37. depth = 10
  38. ## Which versions are to be supported
  39. versions = [tlsv1.3, tlsv1.2]
  40. ## TLS cipher suite names
  41. ## Note: By default, all available suites are supported, you do not need to set this
  42. ciphers = ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"]
  43. ## Allows a client and a server to renegotiate the parameters of the SSL connection on the fly
  44. secure_renegotiate = true
  45. ## Log level for SSL communication
  46. ## Type: emergency | alert | critical | error | warning | notice | info | debug | none | all
  47. log_level = notice
  48. ## Hibernate the SSL process after idling for amount of time reducing its memory footprint
  49. hibernate_after = 5s
  50. ## Forces the cipher to be set based on the server-specified order instead of the client-specified order
  51. honor_cipher_order = true
  52. ## Setting this to false to disable client-initiated renegotiation
  53. client_renegotiation = true
  54. ## Maximum time duration allowed for the handshake to complete
  55. handshake_timeout = 15s
  56. }
  57. }