Security
Please read this page carefully. Although there are various ways to secure your Qdrant instances, they are unsecured by default. You need to enable security measures before production use. Otherwise, they are completely open to anyone
Authentication
Available as of v1.2.0
Qdrant supports a simple form of client authentication using a static API key. This can be used to secure your instance.
To enable API key based authentication in your own Qdrant instance you must specify a key in the configuration:
service:
# Set an api-key.
# If set, all requests must include a header with the api-key.
# example header: `api-key: <API-KEY>`
#
# If you enable this you should also enable TLS.
# (Either above or via an external service like nginx.)
# Sending an api-key over an unencrypted channel is insecure.
api_key: your_secret_api_key_here
Or alternatively, you can use the environment variable:
docker run -p 6333:6333 \
-e QDRANT__SERVICE__API_KEY=your_secret_api_key_here \
qdrant/qdrant
For using API key based authentication in Qdrant Cloud see the cloud Authentication section.
The API key then needs to be present in all REST or gRPC requests to your instance. All official Qdrant clients for Python, Go, Rust, .NET and Java support the API key parameter.
curl \
-X GET https://localhost:6333 \
--header 'api-key: your_secret_api_key_here'
from qdrant_client import QdrantClient
client = QdrantClient(
url="https://localhost:6333",
api_key="your_secret_api_key_here",
)
import { QdrantClient } from "@qdrant/js-client-rest";
const client = new QdrantClient({
url: "http://localhost",
port: 6333,
apiKey: "your_secret_api_key_here",
});
use qdrant_client::Qdrant;
let client = Qdrant::from_url("https://xyz-example.eu-central.aws.cloud.qdrant.io:6334")
.api_key("<paste-your-api-key-here>")
.build()?;
import io.qdrant.client.QdrantClient;
import io.qdrant.client.QdrantGrpcClient;
QdrantClient client =
new QdrantClient(
QdrantGrpcClient.newBuilder(
"xyz-example.eu-central.aws.cloud.qdrant.io",
6334,
true)
.withApiKey("<paste-your-api-key-here>")
.build());
using Qdrant.Client;
var client = new QdrantClient(
host: "xyz-example.eu-central.aws.cloud.qdrant.io",
https: true,
apiKey: "<paste-your-api-key-here>"
);
import "github.com/qdrant/go-client/qdrant"
client, err := qdrant.NewClient(&qdrant.Config{
Host: "xyz-example.eu-central.aws.cloud.qdrant.io",
Port: 6334,
APIKey: "<paste-your-api-key-here>",
UseTLS: true,
})
Read-only API key
Available as of v1.7.0
In addition to the regular API key, Qdrant also supports a read-only API key. This key can be used to access read-only operations on the instance.
service:
read_only_api_key: your_secret_read_only_api_key_here
Or with the environment variable:
export QDRANT__SERVICE__READ_ONLY_API_KEY=your_secret_read_only_api_key_here
Both API keys can be used simultaneously.
Granular access control with JWT
Available as of v1.9.0
For more complex cases, Qdrant supports granular access control with JSON Web Tokens (JWT). This allows you to have tokens, which allow restricited access to a specific parts of the stored data and build Role-based access control (RBAC) on top of that. In this way, you can define permissions for users and restrict access to sensitive endpoints.
To enable JWT-based authentication in your own Qdrant instance you need to specify the api-key
and enable the jwt_rbac
feature in the configuration:
service:
api_key: you_secret_api_key_here
jwt_rbac: true
Or with the environment variables:
export QDRANT__SERVICE__API_KEY=your_secret_api_key_here
export QDRANT__SERVICE__JWT_RBAC=true
The api_key
you set in the configuration will be used to encode and decode the JWTs, so βneedless to sayβ keep it secure. If your api_key
changes, all existing tokens will be invalid.
To use JWT-based authentication, you need to provide it as a bearer token in the Authorization
header, or as an key in the Api-Key
header of your requests.
Authorization: Bearer <JWT>
// or
Api-Key: <JWT>
from qdrant_client import QdrantClient
qdrant_client = QdrantClient(
"xyz-example.eu-central.aws.cloud.qdrant.io",
api_key="<JWT>",
)
import { QdrantClient } from "@qdrant/js-client-rest";
const client = new QdrantClient({
host: "xyz-example.eu-central.aws.cloud.qdrant.io",
apiKey: "<JWT>",
});
use qdrant_client::Qdrant;
let client = Qdrant::from_url("https://xyz-example.eu-central.aws.cloud.qdrant.io:6334")
.api_key("<JWT>")
.build()?;
import io.qdrant.client.QdrantClient;
import io.qdrant.client.QdrantGrpcClient;
QdrantClient client =
new QdrantClient(
QdrantGrpcClient.newBuilder(
"xyz-example.eu-central.aws.cloud.qdrant.io",
6334,
true)
.withApiKey("<JWT>")
.build());
using Qdrant.Client;
var client = new QdrantClient(
host: "xyz-example.eu-central.aws.cloud.qdrant.io",
https: true,
apiKey: "<JWT>"
);
import "github.com/qdrant/go-client/qdrant"
client, err := qdrant.NewClient(&qdrant.Config{
Host: "xyz-example.eu-central.aws.cloud.qdrant.io",
Port: 6334,
APIKey: "<JWT>",
UseTLS: true,
})
Generating JSON Web Tokens
Due to the nature of JWT, anyone who knows the api_key
can generate tokens by using any of the existing libraries and tools, it is not necessary for them to have access to the Qdrant instance to generate them.
For convenience, we have added a JWT generation tool the Qdrant Web UI under the π tab, if you’re using the default url, it will be at http://localhost:6333/dashboard#/jwt
.
JWT Header - Qdrant uses the
HS256
algorithm to decode the tokens.{ "alg": "HS256", "typ": "JWT" }
JWT Payload - You can include any combination of the parameters available in the payload. Keep reading for more info on each one.
{ "exp": 1640995200, // Expiration time "value_exists": ..., // Validate this token by looking for a point with a payload value "access": "r", // Define the access level. }
Signing the token - To confirm that the generated token is valid, it needs to be signed with the api_key
you have set in the configuration.
That would mean, that someone who knows the api_key
gives the authorization for the new token to be used in the Qdrant instance.
Qdrant can validate the signature, because it knows the api_key
and can decode the token.
The process of token generation can be done on the client side offline, and doesn’t require any communication with the Qdrant instance.
Here is an example of libraries that can be used to generate JWT tokens:
- Python: PyJWT
- JavaScript: jsonwebtoken
- Rust: jsonwebtoken
JWT Configuration
These are the available options, or claims in the JWT lingo. You can use them in the JWT payload to define its functionality.
exp
- The expiration time of the token. This is a Unix timestamp in seconds. The token will be invalid after this time. The check for this claim includes a 30-second leeway to account for clock skew.{ "exp": 1640995200, // Expiration time }
value_exists
- This is a claim that can be used to validate the token against the data stored in a collection. Structure of this claim is as follows:{ "value_exists": { "collection": "my_validation_collection", "matches": [ { "key": "my_key", "value": "value_that_must_exist" } ], }, }
If this claim is present, Qdrant will check if there is a point in the collection with the specified key-values. If it does, the token is valid.
This claim is especially useful if you want to have an ability to revoke tokens without changing the
api_key
. Consider a case where you have a collection of users, and you want to revoke access to a specific user.{ "value_exists": { "collection": "users", "matches": [ { "key": "user_id", "value": "andrey" }, { "key": "role", "value": "manager" } ], }, }
You can create a token with this claim, and when you want to revoke access, you can change the
role
of the user to something else, and the token will be invalid.access
- This claim defines the access level of the token. If this claim is present, Qdrant will check if the token has the required access level to perform the operation. If this claim is not present, manage access is assumed.It can provide global access with
r
for read-only, orm
for manage. For example:{ "access": "r" }
It can also be specific to one or more collections. The
access
level for each collection isr
for read-only, orrw
for read-write, like this:{ "access": [ { "collection": "my_collection", "access": "rw" } ] }
You can also specify which subset of the collection the user is able to access by specifying a
payload
restriction that the points must have.{ "access": [ { "collection": "my_collection", "access": "r", "payload": { "user_id": "user_123456" } } ] }
This
payload
claim will be used to implicitly filter the points in the collection. It will be equivalent to appending this filter to each request:{ "filter": { "must": [{ "key": "user_id", "match": { "value": "user_123456" } }] } }
Table of access
Check out this table to see which actions are allowed or denied based on the access level.
This is also applicable to using api keys instead of tokens. In that case, api_key
maps to manage, while read_only_api_key
maps to read-only.
Action | manage | read-only | collection read-write | collection read-only | collection with payload claim (r / rw) |
---|---|---|---|---|---|
list collections | β | β | π‘ | π‘ | π‘ |
get collection info | β | β | β | β | β |
create collection | β | β | β | β | β |
delete collection | β | β | β | β | β |
update collection params | β | β | β | β | β |
get collection cluster info | β | β | β | β | β |
collection exists | β | β | β | β | β |
update collection cluster setup | β | β | β | β | β |
update aliases | β | β | β | β | β |
list collection aliases | β | β | π‘ | π‘ | π‘ |
list aliases | β | β | π‘ | π‘ | π‘ |
create shard key | β | β | β | β | β |
delete shard key | β | β | β | β | β |
create payload index | β | β | β | β | β |
delete payload index | β | β | β | β | β |
list collection snapshots | β | β | β | β | β |
create collection snapshot | β | β | β | β | β |
delete collection snapshot | β | β | β | β | β |
download collection snapshot | β | β | β | β | β |
upload collection snapshot | β | β | β | β | β |
recover collection snapshot | β | β | β | β | β |
list shard snapshots | β | β | β | β | β |
create shard snapshot | β | β | β | β | β |
delete shard snapshot | β | β | β | β | β |
download shard snapshot | β | β | β | β | β |
upload shard snapshot | β | β | β | β | β |
recover shard snapshot | β | β | β | β | β |
list full snapshots | β | β | β | β | β |
create full snapshot | β | β | β | β | β |
delete full snapshot | β | β | β | β | β |
download full snapshot | β | β | β | β | β |
get cluster info | β | β | β | β | β |
recover raft state | β | β | β | β | β |
delete peer | β | β | β | β | β |
get point | β | β | β | β | β |
get points | β | β | β | β | β |
upsert points | β | β | β | β | β |
update points batch | β | β | β | β | β |
delete points | β | β | β | β | β / π‘ |
update vectors | β | β | β | β | β |
delete vectors | β | β | β | β | β / π‘ |
set payload | β | β | β | β | β |
overwrite payload | β | β | β | β | β |
delete payload | β | β | β | β | β |
clear payload | β | β | β | β | β |
scroll points | β | β | β | β | π‘ |
query points | β | β | β | β | π‘ |
search points | β | β | β | β | π‘ |
search groups | β | β | β | β | π‘ |
recommend points | β | β | β | β | β |
recommend groups | β | β | β | β | β |
discover points | β | β | β | β | β |
count points | β | β | β | β | π‘ |
version | β | β | β | β | β |
readyz, healthz, livez | β | β | β | β | β |
telemetry | β | β | β | β | β |
metrics | β | β | β | β | β |
update locks | β | β | β | β | β |
get locks | β | β | β | β | β |
TLS
Available as of v1.2.0
TLS for encrypted connections can be enabled on your Qdrant instance to secure connections.
First make sure you have a certificate and private key for TLS, usually in
.pem
format. On your local machine you may use
mkcert to generate a self signed
certificate.
To enable TLS, set the following properties in the Qdrant configuration with the correct paths and restart:
service:
# Enable HTTPS for the REST and gRPC API
enable_tls: true
# TLS configuration.
# Required if either service.enable_tls or cluster.p2p.enable_tls is true.
tls:
# Server certificate chain file
cert: ./tls/cert.pem
# Server private key file
key: ./tls/key.pem
For internal communication when running cluster mode, TLS can be enabled with:
cluster:
# Configuration of the inter-cluster communication
p2p:
# Use TLS for communication between peers
enable_tls: true
With TLS enabled, you must start using HTTPS connections. For example:
curl -X GET https://localhost:6333
from qdrant_client import QdrantClient
client = QdrantClient(
url="https://localhost:6333",
)
import { QdrantClient } from "@qdrant/js-client-rest";
const client = new QdrantClient({ url: "https://localhost", port: 6333 });
use qdrant_client::Qdrant;
let client = Qdrant::from_url("http://localhost:6334").build()?;
Certificate rotation is enabled with a default refresh time of one hour. This
reloads certificate files every hour while Qdrant is running. This way changed
certificates are picked up when they get updated externally. The refresh time
can be tuned by changing the tls.cert_ttl
setting. You can leave this on, even
if you don’t plan to update your certificates. Currently this is only supported
for the REST API.
Optionally, you can enable client certificate validation on the server against a local certificate authority. Set the following properties and restart:
service:
# Check user HTTPS client certificate against CA file specified in tls config
verify_https_client_certificate: false
# TLS configuration.
# Required if either service.enable_tls or cluster.p2p.enable_tls is true.
tls:
# Certificate authority certificate file.
# This certificate will be used to validate the certificates
# presented by other nodes during inter-cluster communication.
#
# If verify_https_client_certificate is true, it will verify
# HTTPS client certificate
#
# Required if cluster.p2p.enable_tls is true.
ca_cert: ./tls/cacert.pem
Hardening
We recommend reducing the amount of permissions granted to Qdrant containers so that you can reduce the risk of exploitation. Here are some ways to reduce the permissions of a Qdrant container:
Run Qdrant as a non-root user. This can help mitigate the risk of future container breakout vulnerabilities. Qdrant does not need the privileges of the root user for any purpose.
- You can use the image
qdrant/qdrant:<version>-unprivileged
instead of the default Qdrant image. - You can use the flag
--user=1000:2000
when runningdocker run
. - You can set
user: 1000
when using Docker Compose. - You can set
runAsUser: 1000
when running in Kubernetes (our Helm chart does this by default).
- You can use the image
Run Qdrant with a read-only root filesystem. This can help mitigate vulnerabilities that require the ability to modify system files, which is a permission Qdrant does not need. As long as the container uses mounted volumes for storage (
/qdrant/storage
and/qdrant/snapshots
by default), Qdrant can continue to operate while being prevented from writing data outside of those volumes.- You can use the flag
--read-only
when runningdocker run
. - You can set
read_only: true
when using Docker Compose. - You can set
readOnlyRootFilesystem: true
when running in Kubernetes (our Helm chart does this by default).
- You can use the flag
Block Qdrant’s external network access. This can help mitigate server side request forgery attacks, like via the snapshot recovery API. Single-node Qdrant clusters do not require any outbound network access. Multi-node Qdrant clusters only need the ability to connect to other Qdrant nodes via TCP ports 6333, 6334, and 6335.
- You can use
docker network create --internal <name>
and use that network when runningdocker run --network <name>
. - You can create an internal network when using Docker Compose.
- You can create a NetworkPolicy when using Kubernetes. Note that multi-node Qdrant clusters will also need access to cluster DNS in Kubernetes.
- You can use
There are other techniques for reducing the permissions such as dropping Linux capabilities depending on your deployment method, but the methods mentioned above are the most important.