You can reproduce it by cloning my repo: Client-SSL-Authentication-With-Docker and running docker-compose up. It is a tool that creates several Docker containers with one command.Ĭreate a docker-compose.yml file containing: How to setup my containers using docker-compose? In contrast, Docker is a convenient tool to run several containers (which take a small computing ressource) and simulate a network of independent servers. The second solution is better but virtual machines are not easy to configure as a local network, and they take a lot of computing ressources, as the whole OS is running. The cluster solution is very bad because it won't work locally, and it costs money. To solve this problem, I want to simulate the Proxy and the NGINX servers. I want to restrict access to my NGINX server so that the client can't access the NGINX server directly. If you're trying to make a change directly on the production environment, it probably won't work and will break the application. When the issue was discovered, we tried to fix it directly on the production environment and we failed. It included changing NGINX and Apache configurations. Introductionĭuring a mission I did at Theodo, I worked on a security issue about controlling the access to an application. You can follow this article with the related Github repository.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |