I place Apache Solr behind Apache httpd with a pure HTTP reverse proxy, since 
most of the time it will be used as an API.   I use mod_auth_cas to protect the 
general /solr URL, requiring a login that refers to our common Jasiq CAS 
server, which in turns connects to our Microsoft Active Directory.

For each core, I reverse proxy the select update handler, and any others that 
are needed under what are somewhat self-descriptive URLs.   In the sample 
<Location ...> configuration below, please understand that I've hidden the 
actual allowed IP address and mask appropriately.

<Location /search/learningresources>
    ProxyPass http://127.0.0.1:8983/solr/learningresources/select
    ProxyPassReverse http://127.0.0.1:8983/solr/learningresources/select
    Options -MultiViews
    Order allow,deny
    Allow from 999.999.999.999/24 127.0.0.1
</Location>

I believe you can do all this within Jetty, but I and my system administrators 
know and trust Apache httpd. 

-----Original Message-----
From: Scott Derrick [mailto:sc...@tnstaafl.net] 
Sent: Saturday, August 15, 2015 7:16 PM
To: solr-user@lucene.apache.org
Subject: Admin Login

I'm somewhat puzzled there is no built in security.  I can't image anybody is 
running a public facing solr server with the admin page wide open?

I've searched and haven't found any solutions that work out of the box.

I've tried the solutions here to no avail. 
https://wiki.apache.org/solr/SolrSecurity

and here.  http://wiki.eclipse.org/Jetty/Tutorial/Realms

The Solr security docs say to use the application server and if I could run it 
on my tomcat server I would already be done.  But I'm told I can't do that?

What solutions are people using?

Scott

--
Leave no stone unturned.
Euripides

Reply via email to