Floating Server
Best Practices

Security

3min

Traffic Encryption

In order to encrypt traffic to Floating server, we need to add an encrypting proxy that will forward requests to the Floating server. Here is an example configuration for Nginx:

Shell


If you want a more in-depth guide on how to secure Floating server using Nginx and Certbot: Using Free Let’s Encrypt SSL/TLS Certificates with NGINX.

Floating Server Password

You can enhance the security of the Floating Server by setting up a login password for the web interface. This is done by adding a hashed password to the config.yaml file:

YAML


You can also set the Floating Server password directly through the user interface. For more details, please refer to the Change Password section.

This ensures that users must provide the correct password to access the server's UI, adding an extra layer of protection.

Redis Security

If you're using Redis, it's important to secure the Docker volumes and networks to ensure that your Redis instance isn't tampered with. This is crucial in environments where data persistence and node-locking rely on Redis.