Replies: 3 comments 2 replies
-
Try add the following location directive to your NGINX configuration:
|
Beta Was this translation helpful? Give feedback.
-
Short answer, no. Longer answer: That file is needed by the clients, including the web-vault to determine features available. Also, it can't be behind a login or something similar, since the clients request that file before you even did a login at all. |
Beta Was this translation helpful? Give feedback.
-
In regards to the security concerns.
|
Beta Was this translation helpful? Give feedback.
-
Hello everyone,
I'm currently using Vaultwarden and have noticed that the
api/config
endpoint is accessible by default. I have some concerns regarding the security and potential methods to restrict access to this endpoint and would appreciate any insights from the community.My main question is regarding the security implications of this endpoint being publicly accessible. Does exposing this endpoint pose any security risks, considering it reveals configuration details like software version, server name, and URL?
Additionally, I'm curious if it's possible to hide or restrict access to this endpoint, specifically using Nginx.
Thanks in advance for your time and assistance!
Beta Was this translation helpful? Give feedback.
All reactions