Web server
The web server of Linkurious Enterprise delivers the application to end users through HTTP/S.
It is configured in the server
configuration key within the configuration
file (linkurious/data/config/production.json
):
General
Within the server
key:
listenPort
(default:3000
): The port of the web server
Some firewalls block network traffic ports other than 80
(HTTP).
Since only root
users can listen on ports lower than 1024,
you may want reroute traffic from 80
to 3000
as follows:
sudo iptables -t nat -A PREROUTING -p tcp --dport 80 -j REDIRECT --to-port 3000
If you use SSL, you can add a second rule to redirect 3443
to 443
:
sudo iptables -t nat -A PREROUTING -p tcp --dport 443 -j REDIRECT --to-port 3443
Serving Linkurious Enterprise under a custom path
Within the server
key:
baseFolder
(default:/
): The base path where Linkurious Enterprise will be found
In some cases, you may want to host Linkurious Enterprise on a path other than root for a particular domain.
For example, if you want Linkurious Enterprise to be reachable at http(s)://HOST:PORT/linkurious
you should
set baseFolder equal to linkurious
.
Link generation
Within the server
key:
domain
(default:"localhost"
): The domain or sub-domain used to access the web server. It is mandatory to edit it for publishing visualizations online. It is also used to restrict the validity of cookies to a domain or sub-domain.publicPortHttp
(default:listenPort
): The public HTTP port of the web server.publicPortHttps
(default:listenPortHttps
): The public HTTPS port of the web server.
In some cases, Linkurious Enterprise needs to generate links to itself (for example when generating a link to a widget). For that, the server needs to know its public domain and port to generate those links.
The public port can be different from the actual port if you use traffic rerouting
(using a firewall or a reverse-proxy). In the example above (traffic rerouting),
the actual HTTP port (listenPort
) is 3000
, but the public HTTP port (publicPortHttp
)
is 80
.
Cookies
Within the server
key:
cookieSecret
(optional): Set the secret used to compute the hash of you session.cookieDomain
(optional): Set this value if you need your cookie to be set for a domain different fromdomain
.cookieHttpOnly
(default:true
): Set thehttpOnly
flag of your cookies.cookieSecure
(default:false
): Set thesecure
flag of your cookies.
Cross-origin resource sharing (CORS)
Within the server
key:
allowOrigin
: Define the cross-origin resource sharing (CORS) policy. Accept cross-site HTTP/S requests by default. The value can be:- a string (
"abc.com"
): only requests from "abc.com" domain are allowed. - wildcard-prefixed string (
"*.abc.com"
): request from all sub-domains ofabc.com
are allowed. - an array of strings (
["abc.com", "*.def.com"]
): requests fromabc.com
and all sub-domains ofdef.com
are allowed. - a single wildcard (
"*"
): requests from any domain are allowed.
- a string (
Allow to render Linkurious embedded in another web page
First, to embed Linkurious in an iframe, make sure that Linkurious and your main application url have the same base domain and the same http scheme. If not, Linkurious cookie won't be sent in the HTTP request and Linkurious interface will be unavailable.
For example, you can serve the main application containing the iframe under:
And Linkurious under:
Note the usage of
https
also on the base domain. It's required in case Linkurious is also served underhttps
.
Then, in the configuration file of Linkurious, within the server
key, update allowFraming
to true
:
By default, Linkurious doesn't allow framing by returning at each request the following HTTP header:
X-Frame-Options:SAMEORIGIN
.
Setting the configuration key to true
will remove the X-Frame-Options
HTTP header.
Custom HTTP Headers
Within the server
key:
customHTTPHeaders
(optional): For compliance, custom HTTP headers can be added to configuration to be returned in the headers with each response from the server.
Example:
customHTTPHeaders:'header1': 'value1''header2': 'value2'...
Note: Some header keys are reserved for LKE and will be overwritten by the server to default values.
Image cross-origin (client-side)
Within the ogma.settings.render
key:
imgCrossOrigin
(default:"anonymous"
): Restrict the origin of images displayed in visualizations to prevent running malicious code on the graphic card of users. Display images from any origin by default. Read here to learn more.
Disabling compression for dynamic content
It is possible to disable the gzip compression for dynamic content that is returned by the Linkurious server.
Within the server
key:
disableCompression
(default:false
): Disable gzip compression for dynamic content when set to true.
SSL
Within the server
key:
listenPortHttps
(default:3443
): The port of the web server if HTTPS is enabled. See the Install section to learn why you should not set443
directly.useHttps
(default:false
): Encrypt communications through HTTPS iftrue
. Requires a valid SSL certificate.forceHttps
(default:false
): Force all traffic to use HTTPS only iftrue
.forcePublicHttps
(default:false
): Force all generated URL in Linkurious Enterprise to use HTTPS (useful when HTTPS is not enabled in Linkurious Enterprise but offered by an external reverse proxy). The server will redirect HTTPGET
requests to HTTPS and reject all other HTTP requests.certificateFile
: The relative path to the SSL certificate (must be in PEM format, located within thelinkurious/data
folder).certificateKeyFile
: The relative path to a private key of the SSL certificate (must be in PEM format, located within thelinkurious/data
folder).certificatePassphrase
: The pass-phrase protecting the SSL certificate (if any).tlsCipherList
(optional): The ciphers supported by any connection established by Linkurious Enterprise as a server or client. It expects a string in OpenSSL cipher list format. The default value is tls.DEFAULT_CIPHERS.
External communications with the Linkurious Enterprise server can be secured using SSL without installing third-party software.
If the Linkurious Enterprise server, graph database, and the search index are installed on different machines, we recommend using secure communication channels between these machines (e.g. HTTPS or WSS). Please refer to the data-source documentation and search index documentation to learn how to enable HTTPS.
To use custom Certificate Authorities (CA), please check how to use additional Certificate Authorities in Linkurious Enterprise.
The TLS protocols supported by Linkurious Enterprise server are TLSv1.0, TLSv1.1 and TLSv1.2. If for compliance reasons you want to manually disable TLSv1.0 and TLSv1.1, you can open the file
data/manager/manager.json
and add"--tls-min-v1.2",
above"server/app.js",
, save the file and restart Linkurious Enterprise.