mirror of
https://github.com/hasura/graphql-engine.git
synced 2024-12-21 22:41:43 +03:00
31 lines
913 B
ReStructuredText
31 lines
913 B
ReStructuredText
.. meta::
|
|
:description: Secure the Hasura GraphQL endpoint
|
|
:keywords: hasura, docs, deployment, secure
|
|
|
|
.. _securing_graphql_endpoint:
|
|
|
|
Securing the GraphQL endpoint
|
|
=============================
|
|
|
|
.. contents:: Table of contents
|
|
:backlinks: none
|
|
:depth: 1
|
|
:local:
|
|
|
|
To make sure that your GraphQL endpoint and the Hasura console are not publicly accessible, you need to
|
|
configure an admin secret key.
|
|
|
|
Depending on your deployment method, follow one of these guides to configure an admin secret key, and prevent public
|
|
access to your GraphQL endpoint and the Hasura console:
|
|
|
|
- :ref:`For Heroku <heroku_secure>`
|
|
- :ref:`For Docker <docker_secure>`
|
|
- :ref:`For Kubernetes <kubernetes_secure>`
|
|
- :ref:`For Digital Ocean <digital_ocean_secure>`
|
|
|
|
.. note::
|
|
|
|
If you're looking at adding access control rules for your data to your GraphQL API then head
|
|
to :ref:`Authentication / access control <auth>`.
|
|
|