@@ -893,6 +893,14 @@ prevent any direct access to these resources from a web browser (by guessing the
893
893
ESI URL pattern), the ESI route **must ** be secured to be only visible from
894
894
the trusted reverse proxy cache.
895
895
896
+ .. caution ::
897
+
898
+ As you'll read in the explanation below the example, the ``ip `` option
899
+ does not restrict to a specific IP address. Instead, using the ``ip ``
900
+ key means that the ``access_control `` entry will only match this IP address,
901
+ and users accessing it from a different IP address will continue down
902
+ the ``acces_control `` list.
903
+
896
904
Here is an example of how you might secure all ESI routes that start with a
897
905
given prefix, ``/esi ``, from outside access:
898
906
@@ -951,11 +959,13 @@ Now, if the same request comes from ``127.0.0.1``:
951
959
952
960
.. _book-security-securing-channel :
953
961
954
- Securing by Channel
955
- ~~~~~~~~~~~~~~~~~~~
962
+ Forcing a Channel (http, https)
963
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
956
964
957
965
You can also require a user to access a URL via SSL; just use the
958
- ``requires_channel `` argument in any ``access_control `` entries:
966
+ ``requires_channel `` argument in any ``access_control `` entries. If this
967
+ ``access_control `` is matched and the request is using the ``http `` channel,
968
+ the user will be redirected to ``https ``:
959
969
960
970
.. configuration-block ::
961
971
0 commit comments