<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Xen Orchestra on publicly accessible VM]]></title><description><![CDATA[<p dir="auto">Hi,</p>
<p dir="auto">I am deploying Xen Orchestra on an OVH cloud VPS to managed multiple Hosts at different locations. Could you please tell me if the login interface has any brute force attack prevention built in? Is it secure enough to be publicly accessible? I have already set 2FA but couldn't see any option for FIDO2 or passwordless authentication.</p>
<p dir="auto">Thank you</p>
]]></description><link>https://xcp-ng.org/forum/topic/9975/xen-orchestra-on-publicly-accessible-vm</link><generator>RSS for Node</generator><lastBuildDate>Tue, 14 Apr 2026 11:50:03 GMT</lastBuildDate><atom:link href="https://xcp-ng.org/forum/topic/9975.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 15 Nov 2024 14:07:00 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Xen Orchestra on publicly accessible VM on Fri, 22 Nov 2024 12:44:49 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/adriangabura" aria-label="Profile: adriangabura">@<bdi>adriangabura</bdi></a> This is a production server. This is also the only one we have on the cloud (OVH) for all our others hosts we use a private network behind our firewall and login via OpenVPN. But OVH we are struggling to come to a good design especially since version 8.3 now connect you to the web interface directly. How do we change port or block it?</p>
]]></description><link>https://xcp-ng.org/forum/post/86112</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/86112</guid><dc:creator><![CDATA[fred974]]></dc:creator><pubDate>Fri, 22 Nov 2024 12:44:49 GMT</pubDate></item><item><title><![CDATA[Reply to Xen Orchestra on publicly accessible VM on Wed, 20 Nov 2024 18:26:18 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/fred974" aria-label="Profile: fred974">@<bdi>fred974</bdi></a> Is this for production, or non-production?</p>
]]></description><link>https://xcp-ng.org/forum/post/86058</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/86058</guid><dc:creator><![CDATA[adriangabura]]></dc:creator><pubDate>Wed, 20 Nov 2024 18:26:18 GMT</pubDate></item><item><title><![CDATA[Reply to Xen Orchestra on publicly accessible VM on Mon, 18 Nov 2024 15:36:27 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/fred974" aria-label="Profile: fred974">@<bdi>fred974</bdi></a> said in <a href="/forum/post/85944">Xen Orchestra on publicly accessible VM</a>:</p>
<blockquote>
<p dir="auto">Thank you all. I could set Xen Orchestra vi vpn tunnel, you all righ so I'll do that. But how do I stop access to the web interface <a href="http://serverip" target="_blank" rel="noopener noreferrer nofollow ugc">http://serverip</a> ?</p>
</blockquote>
<p dir="auto">Run a VM with a firewall (pfSense, Vyos, OpnSense etc.) and put the public interface as WAN in the VM and control vpn access there?</p>
]]></description><link>https://xcp-ng.org/forum/post/85953</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/85953</guid><dc:creator><![CDATA[redakula]]></dc:creator><pubDate>Mon, 18 Nov 2024 15:36:27 GMT</pubDate></item><item><title><![CDATA[Reply to Xen Orchestra on publicly accessible VM on Mon, 18 Nov 2024 13:16:54 GMT]]></title><description><![CDATA[<p dir="auto">Thank you all. I could set Xen Orchestra vi vpn tunnel, you all righ so I'll do that. But how do I stop access to the web interface <a href="http://serverip" target="_blank" rel="noopener noreferrer nofollow ugc">http://serverip</a> ?</p>
]]></description><link>https://xcp-ng.org/forum/post/85944</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/85944</guid><dc:creator><![CDATA[fred974]]></dc:creator><pubDate>Mon, 18 Nov 2024 13:16:54 GMT</pubDate></item><item><title><![CDATA[Reply to Xen Orchestra on publicly accessible VM on Sat, 16 Nov 2024 16:23:35 GMT]]></title><description><![CDATA[<p dir="auto">You can easily add some firewall rules as an additional layer and/or restrict to ssh-forwarded sessions</p>
]]></description><link>https://xcp-ng.org/forum/post/85890</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/85890</guid><dc:creator><![CDATA[KPS]]></dc:creator><pubDate>Sat, 16 Nov 2024 16:23:35 GMT</pubDate></item><item><title><![CDATA[Reply to Xen Orchestra on publicly accessible VM on Fri, 15 Nov 2024 19:25:56 GMT]]></title><description><![CDATA[<p dir="auto">Nothing is secure enough, for it depends on your requirements and scope. It's a very bad practice to open such interfaces to the public space. As a suggestion - SSH tunnel, site-to-site VPN. There are a lot of potential solutions, but as I said it all depends on your security policy.</p>
]]></description><link>https://xcp-ng.org/forum/post/85869</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/85869</guid><dc:creator><![CDATA[adriangabura]]></dc:creator><pubDate>Fri, 15 Nov 2024 19:25:56 GMT</pubDate></item><item><title><![CDATA[Reply to Xen Orchestra on publicly accessible VM on Fri, 15 Nov 2024 18:12:39 GMT]]></title><description><![CDATA[<ol>
<li>Yes</li>
<li>No FIDO2 auth, you can however use OIDC and connect to a SSO provider with FIDO2 access.</li>
</ol>
]]></description><link>https://xcp-ng.org/forum/post/85863</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/85863</guid><dc:creator><![CDATA[olivierlambert]]></dc:creator><pubDate>Fri, 15 Nov 2024 18:12:39 GMT</pubDate></item></channel></rss>