
RStudio Connect: Admin Guide Version 1.7.2.1-12 Abstract This guide will help an administrator install and configure RStudio Connect on a managed server. You will learn how to install the product on different operating systems, configure authentication, and monitor system resources. Contents 1 Introduction 4 1.1 System Requirements . .5 2 Getting Started 5 2.1 Need Help? . .5 2.2 Installation . .6 2.3 Initial Configuration . .9 3 License Management 13 3.1 Capabilities . 13 3.2 Notification of Expiration . 13 3.3 Product Activation . 13 3.4 Connectivity Requirements . 14 3.5 Evaluations . 15 3.6 Licensing Errors . 16 3.7 Floating Licenses . 16 4 Files & Directories 19 4.1 Program Files . 19 4.2 Configuration . 19 4.3 Server Log . 19 4.4 Access Logs . 19 4.5 Application Logs . 20 4.6 Variable Data . 20 4.7 Backups . 22 4.8 Server Migrations . 22 5 Server Management 23 5.1 Stopping and Starting . 23 5.2 System Messages . 25 5.3 Health-Check . 25 5.4 Upgrading . 25 5.5 Purging RStudio Connect . 26 5.6 Docker................................................. 26 6 High Availability and Load Balancing 30 6.1 HA Checklist . 30 6.2 HA Limitations . 30 6.3 Updating HA Nodes . 32 6.4 Downgrading . 32 6.5 Backups, Snapshots, and Data Integrity . 32 6.6 HA Details . 33 1 7 Running with a Proxy 34 7.1 Nginx Configuration . 35 7.2 Apache Configuration . 36 8 Security & Auditing 37 8.1 API Security . 37 8.2 Browser Security . 38 8.3 Audit Logs . 41 8.4 Application Environment Variables . 42 9 Database 42 9.1 SQLite . 42 9.2 PostgreSQL . 44 9.3 Changing Database Provider . 45 9.4 Authentication Provider . 46 10 Authentication 46 10.1 Changing Authentication Provider . 46 10.2 Session Management . 49 10.3 Username requirements . 49 10.4 User Attribute Editability . 50 10.5 Password . 52 10.6 LDAP and Active Directory . 53 10.7 SAML (Beta) ............................................ 61 10.8 OAuth2 (Google) . 65 10.9PAM.................................................. 67 10.10Proxied Authentication . 69 11 User Management 81 11.1 User Roles . 81 11.2 User Provisioning . 82 11.3 User Permissions . 84 11.4 Administrator Capabilities . 85 11.5 Locked Accounts . 85 11.6 Username Requirements . 86 11.7 User Renaming . 86 11.8 Changing Authentication Provider . 86 11.9 Removing Accounts . 86 11.10Command-Line Interface . 87 12 Group Management 87 12.1 Remote Group Management . 87 12.2 Group Ownership . 87 12.3 Proxied Authentication Group Membership Management . 88 12.4 LDAP Groups . 88 12.5 OAuth2 Group Members . 89 12.6 Command-Line Interface . 89 13 Process Management 89 13.1 Sandboxing . 89 13.2 Temporary Directory . 91 13.3 Shiny Applications & Plumber APIs . 91 13.4 TensorFlow Model APIs . 91 13.5 User Account for Processes . 92 13.6 Current user execution . 92 2 13.7 PAM sessions . 93 13.8 Path Rewriting . 94 13.9 Program Supervisors . 95 13.10Using the config Package . 96 14 Content Management 97 14.1 Sharing Settings . 97 14.2 Vanity Paths . 98 14.3 Tags . ..
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages169 Page
-
File Size-