Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
22 changes: 22 additions & 0 deletions src/administration-guide/security/caddy.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
<div class="breadcrumbs">
Administration Guide
→ <a href="/administration-guide/security/">Security</a>
→ Caddy config
</div>


# Caddy config

Caddy supports websockets and will by default only enable secure TLS ciphers (TLS1.2 + TLS1.3), so minimal config is needed.

Example `/etc/caddy/Caddyfile` config:

```
example.com {
reverse_proxy 127.0.0.1:3000 {
header_up X-Real-IP {client_ip}
}
}
```

If Caddy can't request a TLS cert using ACME (e.g. due to firewall or using internal domains), then add `tls internal` to the config.
5 changes: 3 additions & 2 deletions src/administration-guide/security/network.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,15 +13,15 @@ Why use encrypted connections? See: [Article from Cloudflare](https://www.cloudf
Options you have:

* [VPN](#vpn)
* [SSL](#ssl)
* [TLS](#tls)

---

## VPN

You can use a Client-to-Site VPN, that terminates on the Semaphore server, to encrypt & secure the connection.

## SSL
## TLS

Semaphore supports SSL/TLS starting from v2.12.

Expand Down Expand Up @@ -50,6 +50,7 @@ Alternatively, you can use a reverse proxy in front of Semaphore to handle secur

* [NGINX](./nginx.md)
* [Apache](./apache.md)
* [Caddy](./caddy.md)


### Self-signed SSL certificate
Expand Down