Knowledge Base | Security

Route SSH Connections with HAProxy

Route SSH Connections with HAProxy

Route SSH connections through HAProxy using the SSH ProxyCommand feature and SNI. Did you know that you can proxy SSH connections through HAProxy and route based on hostname? The advantage is that you can relay all SSH traffic through one public-facing server instead...

HAProxy and HTTP Strict Transport Security (HSTS)

HAProxy and HTTP Strict Transport Security (HSTS)

HAProxy provides an easy and straightforward way to add HTTPS to your website. As a load balancer positioned in front of your web servers, it can handle all of the encryption and decryption duties, offloading those tasks from your upstream servers. That's good because...

Redirect HTTP to HTTPS with HAProxy

Redirect HTTP to HTTPS with HAProxy

Use the HAProxy load balancer to redirect users from HTTP to HTTPS automatically. For decades, our lives have become increasingly dependent on sending and receiving data from across the Internet. Now, with more people working, studying, and hanging with friends...

HAProxy Enterprise Offers SAML-based Single Sign-on

HAProxy Enterprise Offers SAML-based Single Sign-on

HAProxy Enterprise handles SAML single sign-on for your applications and integrates with identity providers like Azure Active Directory. Single sign-on (SSO) is such a familiar convenience for companies that it's easy to forget how powerful it is. When employees...

Dynamic SSL Certificate Storage in HAProxy

Dynamic SSL Certificate Storage in HAProxy

Use the HAProxy Runtime API to update SSL certificates in HAProxy without a reload. When you route traffic through an HAProxy load balancer, you gain the ability to terminate SSL at the load balancer. HAProxy encrypts communication between the client and itself and...

Use HAProxy Response Policies to Stop Threats

Use HAProxy Response Policies to Stop Threats

HAProxy gives you an arsenal of sophisticated countermeasures including deny, tarpit, silent drop, reject, and shadowban to stop malicious users. There are two phases to stopping malicious users from abusing your website and online applications. Step one is detection,...

HAProxy Webinar
HAProxy in Kubernetes
The HAProxy Guide to Multi-Layer Security

Latest Tweets