mirror of
https://github.com/jupyterhub/jupyterhub.git
synced 2025-10-18 15:33:02 +00:00
Reflow markdown for easier editing
This commit is contained in:
@@ -90,7 +90,9 @@ By default, starting JupyterHub will write two files to disk in the current work
|
|||||||
|
|
||||||
- `jupyterhub.sqlite` is the sqlite database containing all of the state of the **Hub**.
|
- `jupyterhub.sqlite` is the sqlite database containing all of the state of the **Hub**.
|
||||||
This file allows the **Hub** to remember what users are running and where,
|
This file allows the **Hub** to remember what users are running and where,
|
||||||
as well as other information enabling you to restart parts of JupyterHub separately. It is important to note that this database contains *no* sensitive information other than **Hub** usernames.
|
as well as other information enabling you to restart parts of JupyterHub separately. It is
|
||||||
|
important to note that this database contains *no* sensitive information other than **Hub**
|
||||||
|
usernames.
|
||||||
- `jupyterhub_cookie_secret` is the encryption key used for securing cookies.
|
- `jupyterhub_cookie_secret` is the encryption key used for securing cookies.
|
||||||
This file needs to persist in order for restarting the Hub server to avoid invalidating cookies.
|
This file needs to persist in order for restarting the Hub server to avoid invalidating cookies.
|
||||||
Conversely, deleting this file and restarting the server effectively invalidates all login cookies.
|
Conversely, deleting this file and restarting the server effectively invalidates all login cookies.
|
||||||
@@ -236,7 +238,9 @@ security configuration:
|
|||||||
2. Cookie secret (a key for encrypting browser cookies)
|
2. Cookie secret (a key for encrypting browser cookies)
|
||||||
3. Proxy authentication token (used for the Hub and other services to authenticate to the Proxy)
|
3. Proxy authentication token (used for the Hub and other services to authenticate to the Proxy)
|
||||||
|
|
||||||
*Note* that the **Hub** hashes all secrets (e.g., auth tokens) before storing them in its database. A loss of control over read-access to the database should have no security impact on your deployment.
|
*Note* that the **Hub** hashes all secrets (e.g., auth tokens) before storing them in its
|
||||||
|
database. A loss of control over read-access to the database should have no security impact
|
||||||
|
on your deployment.
|
||||||
|
|
||||||
### SSL encryption
|
### SSL encryption
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user