(Optional) Hosting CryoSPARC Through a Reverse Proxy
As discussed in Accessing the CryoSPARC User Interface, there are various ways in which users can access the CryoSPARC web interface such as through a VPN connection or SSH tunnel. If you would like to host the CryoSPARC interface in a secure manner at a predictable URL, this can be done through a reverse proxy server.
Reverse proxy servers allow for more control over how a user accesses a web application interface over other methods. By controlling incoming network traffic it is able to host the application at a static URL (for example https://cryosparc.institution.edu
) and ensure all correspondence is secured via HTTPS.
The method in which you host CryoSPARC through a reverse proxy is similar to hosting any other web application. However, the following serve as our recommended minimum requirements:
All incoming traffic should be served through HTTPS (via a SSL certificate)
HTTPS traffic requires a valid SSL certificate provided by a certificate authority (CA) for the domain in which you are hosting the interface.
If the server listens for incoming HTTP traffic, forward all connections to a more secure protocol (HTTPS)
Ensure traffic is also mediated by an organization-level authentication barrier (for example single sign-on). CryoSPARC should not be served via the public internet without any additional authentication checks.
There are many ways to generate a SSL certificate for your domain, however, this will most likely be specific to your institution or organization. If you're unsure of how to generate a SSL certificate for your private network, please consult with your system or network administrator for guidance.
Each institution or private network can have a specific setup requiring custom rules and/or proxy configuration considerations. Generally the example configurations below should be compatible with common reverse proxy installations. Please consult with your system or network administrator for guidance regarding institution-specific protocols for reverse proxy hosting.
The following section will provide example configuration files for common reverse proxy servers given CryoSPARC is running on base port 39000
.
NGINX
This NGINX configuration takes advantage of authenticated origin pulls for an added layer of security between the reverse-proxy and a downstream proxy/load balancer.
An alternative configuration from our Discussion Forum that serves the application over HTTPS and redirects incoming HTTP requests.
Apache
The following is a simplified Apache HTTP Server configuration that illustrates the RewriteRule
. For production use, we recommend HTTPS instead of HTTP. Additional configuration, not shown here, is required to enable HTTPS.
Last updated