mirror of
https://github.com/grafana/grafana.git
synced 2025-01-16 11:42:35 -06:00
Update _index.md (#72317)
* Update _index.md Adding popular open-source proxy options so users don't have to do further research if they don't want to * ran Prettier * Update docs/sources/setup-grafana/configure-security/_index.md Co-authored-by: Ieva <vasiljeva.ieva@gmail.com> --------- Co-authored-by: Christopher Moyer <35463610+chri2547@users.noreply.github.com> Co-authored-by: Ieva <vasiljeva.ieva@gmail.com>
This commit is contained in:
parent
2a2207db00
commit
916f3008f9
@ -39,6 +39,12 @@ There are many firewall tools available, refer to the documentation for your spe
|
||||
|
||||
Require all network requests being made by Grafana to go through a proxy server.
|
||||
|
||||
Self-hosted reverse proxy options include but are not limited to:
|
||||
|
||||
- [Pomerium](https://www.pomerium.com/docs), which has a [guide for securing Grafana](https://www.pomerium.com/docs/guides/grafana)
|
||||
- [NGINX](https://docs.nginx.com/nginx/) using their [guide on restricting access with HTTP basic authentication](https://docs.nginx.com/nginx/admin-guide/security-controls/configuring-http-basic-authentication/)
|
||||
- [OAuth2 proxy](https://github.com/oauth2-proxy/oauth2-proxy)
|
||||
|
||||
## Limit Viewer query permissions
|
||||
|
||||
Users with the Viewer role can enter _any possible query_ in _any_ of the data sources available in the **organization**, not just the queries that are defined on the dashboards for which the user has Viewer permissions.
|
||||
|
Loading…
Reference in New Issue
Block a user