Security

Please read this page carefully. Although there are various ways to secure your Qdrant instances, they are unsecured by default. You need to enable security measures before production use. Otherwise, they are completely open to anyone

Authentication

Available as of v1.2.0

Qdrant supports a simple form of client authentication using a static API key. This can be used to secure your instance.

To enable API key based authentication in your own Qdrant instance you must specify a key in the configuration:

service:
  # Set an api-key.
  # If set, all requests must include a header with the api-key.
  # example header: `api-key: <API-KEY>`
  #
  # If you enable this you should also enable TLS.
  # (Either above or via an external service like nginx.)
  # Sending an api-key over an unencrypted channel is insecure.
  api_key: your_secret_api_key_here

Or alternatively, you can use the environment variable:

export QDRANT__SERVICE__API_KEY=your_secret_api_key_here

For using API key based authentication in Qdrant Cloud see the cloud Authentication section.

The API key then needs to be present in all REST or gRPC requests to your instance. All official Qdrant clients for Python, Go, Rust, .NET and Java support the API key parameter.

curl \
  -X GET https://localhost:6333 \
  --header 'api-key: your_secret_api_key_here'
from qdrant_client import QdrantClient

client = QdrantClient(
    url="https://localhost:6333",
    api_key="your_secret_api_key_here",
)
import { QdrantClient } from "@qdrant/js-client-rest";

const client = new QdrantClient({
  url: "http://localhost",
  port: 6333,
  apiKey: "your_secret_api_key_here",
});
use qdrant_client::Qdrant;

let client = Qdrant::from_url("https://xyz-example.eu-central.aws.cloud.qdrant.io:6334")
    .api_key("<paste-your-api-key-here>")
    .build()?;
import io.qdrant.client.QdrantClient;
import io.qdrant.client.QdrantGrpcClient;

QdrantClient client =
    new QdrantClient(
        QdrantGrpcClient.newBuilder(
                "xyz-example.eu-central.aws.cloud.qdrant.io",
                6334,
                true)
            .withApiKey("<paste-your-api-key-here>")
            .build());
using Qdrant.Client;

var client = new QdrantClient(
  host: "xyz-example.eu-central.aws.cloud.qdrant.io",
  https: true,
  apiKey: "<paste-your-api-key-here>"
);

Read-only API key

Available as of v1.7.0

In addition to the regular API key, Qdrant also supports a read-only API key. This key can be used to access read-only operations on the instance.

service:
  read_only_api_key: your_secret_read_only_api_key_here

Or with the environment variable:

export QDRANT__SERVICE__READ_ONLY_API_KEY=your_secret_read_only_api_key_here

Both API keys can be used simultaneously.

Granular access control with JWT

Available as of v1.9.0

For more complex cases, Qdrant supports granular access control with JSON Web Tokens (JWT). This allows you to have tokens, which allow restricited access to a specific parts of the stored data and build Role-based access control (RBAC) on top of that. In this way, you can define permissions for users and restrict access to sensitive endpoints.

To enable JWT-based authentication in your own Qdrant instance you need to specify the api-key and enable the jwt_rbac feature in the configuration:

service:
  api_key: you_secret_api_key_here
  jwt_rbac: true

Or with the environment variables:

export QDRANT__SERVICE__API_KEY=your_secret_api_key_here
export QDRANT__SERVICE__JWT_RBAC=true

The api_key you set in the configuration will be used to encode and decode the JWTs, so –needless to say– keep it secure. If your api_key changes, all existing tokens will be invalid.

To use JWT-based authentication, you need to provide it as a bearer token in the Authorization header, or as an key in the Api-Key header of your requests.

Authorization: Bearer <JWT>

// or

Api-Key: <JWT>
from qdrant_client import QdrantClient

qdrant_client = QdrantClient(
    "xyz-example.eu-central.aws.cloud.qdrant.io",
    api_key="<JWT>",
)
import { QdrantClient } from "@qdrant/js-client-rest";

const client = new QdrantClient({
  host: "xyz-example.eu-central.aws.cloud.qdrant.io",
  apiKey: "<JWT>",
});
use qdrant_client::Qdrant;

let client = Qdrant::from_url("https://xyz-example.eu-central.aws.cloud.qdrant.io:6334")
    .api_key("<JWT>")
    .build()?;
import io.qdrant.client.QdrantClient;
import io.qdrant.client.QdrantGrpcClient;

QdrantClient client =
    new QdrantClient(
        QdrantGrpcClient.newBuilder(
                "xyz-example.eu-central.aws.cloud.qdrant.io",
                6334,
                true)
            .withApiKey("<JWT>")
            .build());
using Qdrant.Client;

var client = new QdrantClient(
  host: "xyz-example.eu-central.aws.cloud.qdrant.io",
  https: true,
  apiKey: "<JWT>"
);

Generating JSON Web Tokens

Due to the nature of JWT, anyone who knows the api_key can generate tokens by using any of the existing libraries and tools, it is not necessary for them to have access to the Qdrant instance to generate them.

For convenience, we have added a JWT generation tool the Qdrant Web UI under the πŸ”‘ tab, if you’re using the default url, it will be at http://localhost:6333/dashboard#/jwt.

  • JWT Header - Qdrant uses the HS256 algorithm to decode the tokens.

    {
      "alg": "HS256",
      "typ": "JWT"
    }
    
  • JWT Payload - You can include any combination of the parameters available in the payload. Keep reading for more info on each one.

    {
      "exp": 1640995200, // Expiration time
      "value_exists": ..., // Validate this token by looking for a point with a payload value
      "access": "r", // Define the access level.
    }
    

Signing the token - To confirm that the generated token is valid, it needs to be signed with the api_key you have set in the configuration. That would mean, that someone who knows the api_key gives the authorization for the new token to be used in the Qdrant instance. Qdrant can validate the signature, because it knows the api_key and can decode the token.

The process of token generation can be done on the client side offline, and doesn’t require any communication with the Qdrant instance.

Here is an example of libraries that can be used to generate JWT tokens:

JWT Configuration

These are the available options, or claims in the JWT lingo. You can use them in the JWT payload to define its functionality.

  • exp - The expiration time of the token. This is a Unix timestamp in seconds. The token will be invalid after this time. The check for this claim includes a 30-second leeway to account for clock skew.

    {
      "exp": 1640995200, // Expiration time
    }
    
  • value_exists - This is a claim that can be used to validate the token against the data stored in a collection. Structure of this claim is as follows:

    {
      "value_exists": {
        "collection": "my_validation_collection",
        "matches": [
          { "key": "my_key", "value": "value_that_must_exist" }
        ],
      },
    }
    

    If this claim is present, Qdrant will check if there is a point in the collection with the specified key-values. If it does, the token is valid.

    This claim is especially useful if you want to have an ability to revoke tokens without changing the api_key. Consider a case where you have a collection of users, and you want to revoke access to a specific user.

    {
      "value_exists": {
        "collection": "users",
        "matches": [
          { "key": "user_id", "value": "andrey" },
          { "key": "role", "value": "manager" }
        ],
      },
    }
    

    You can create a token with this claim, and when you want to revoke access, you can change the role of the user to something else, and the token will be invalid.

  • access - This claim defines the access level of the token. If this claim is present, Qdrant will check if the token has the required access level to perform the operation. If this claim is not present, manage access is assumed.

    It can provide global access with r for read-only, or m for manage. For example:

    {
      "access": "r"
    }
    

    It can also be specific to one or more collections. The access level for each collection is r for read-only, or rw for read-write, like this:

    {
      "access": [
        {
          "collection": "my_collection",
          "access": "rw"
        }
      ]
    }
    

    You can also specify which subset of the collection the user is able to access by specifying a payload restriction that the points must have.

    {
      "access": [
        {
          "collection": "my_collection",
          "access": "r",
          "payload": {
            "user_id": "user_123456"
          }
        }
      ]
    }
    

    This payload claim will be used to implicitly filter the points in the collection. It will be equivalent to appending this filter to each request:

    { "filter": { "must": [{ "key": "user_id", "match": { "value": "user_123456" } }] } }
    

Table of access

Check out this table to see which actions are allowed or denied based on the access level.

This is also applicable to using api keys instead of tokens. In that case, api_key maps to manage, while read_only_api_key maps to read-only.

Symbols: βœ… Allowed | ❌ Denied | 🟑 Allowed, but filtered
Actionmanageread-onlycollection read-writecollection read-onlycollection with payload claim (r / rw)
list collectionsβœ…βœ…πŸŸ‘πŸŸ‘πŸŸ‘
get collection infoβœ…βœ…βœ…βœ…βŒ
create collectionβœ…βŒβŒβŒβŒ
delete collectionβœ…βŒβŒβŒβŒ
update collection paramsβœ…βŒβŒβŒβŒ
get collection cluster infoβœ…βœ…βœ…βœ…βŒ
collection existsβœ…βœ…βœ…βœ…βœ…
update collection cluster setupβœ…βŒβŒβŒβŒ
update aliasesβœ…βŒβŒβŒβŒ
list collection aliasesβœ…βœ…πŸŸ‘πŸŸ‘πŸŸ‘
list aliasesβœ…βœ…πŸŸ‘πŸŸ‘πŸŸ‘
create shard keyβœ…βŒβŒβŒβŒ
delete shard keyβœ…βŒβŒβŒβŒ
create payload indexβœ…βŒβœ…βŒβŒ
delete payload indexβœ…βŒβœ…βŒβŒ
list collection snapshotsβœ…βœ…βœ…βœ…βŒ
create collection snapshotβœ…βŒβœ…βŒβŒ
delete collection snapshotβœ…βŒβœ…βŒβŒ
download collection snapshotβœ…βœ…βœ…βœ…βŒ
upload collection snapshotβœ…βŒβŒβŒβŒ
recover collection snapshotβœ…βŒβŒβŒβŒ
list shard snapshotsβœ…βœ…βœ…βœ…βŒ
create shard snapshotβœ…βŒβœ…βŒβŒ
delete shard snapshotβœ…βŒβœ…βŒβŒ
download shard snapshotβœ…βœ…βœ…βœ…βŒ
upload shard snapshotβœ…βŒβŒβŒβŒ
recover shard snapshotβœ…βŒβŒβŒβŒ
list full snapshotsβœ…βœ…βŒβŒβŒ
create full snapshotβœ…βŒβŒβŒβŒ
delete full snapshotβœ…βŒβŒβŒβŒ
download full snapshotβœ…βœ…βŒβŒβŒ
get cluster infoβœ…βœ…βŒβŒβŒ
recover raft stateβœ…βŒβŒβŒβŒ
delete peerβœ…βŒβŒβŒβŒ
get pointβœ…βœ…βœ…βœ…βŒ
get pointsβœ…βœ…βœ…βœ…βŒ
upsert pointsβœ…βŒβœ…βŒβŒ
update points batchβœ…βŒβœ…βŒβŒ
delete pointsβœ…βŒβœ…βŒβŒ / 🟑
update vectorsβœ…βŒβœ…βŒβŒ
delete vectorsβœ…βŒβœ…βŒβŒ / 🟑
set payloadβœ…βŒβœ…βŒβŒ
overwrite payloadβœ…βŒβœ…βŒβŒ
delete payloadβœ…βŒβœ…βŒβŒ
clear payloadβœ…βŒβœ…βŒβŒ
scroll pointsβœ…βœ…βœ…βœ…πŸŸ‘
query pointsβœ…βœ…βœ…βœ…πŸŸ‘
search pointsβœ…βœ…βœ…βœ…πŸŸ‘
search groupsβœ…βœ…βœ…βœ…πŸŸ‘
recommend pointsβœ…βœ…βœ…βœ…βŒ
recommend groupsβœ…βœ…βœ…βœ…βŒ
discover pointsβœ…βœ…βœ…βœ…βŒ
count pointsβœ…βœ…βœ…βœ…πŸŸ‘
versionβœ…βœ…βœ…βœ…βœ…
readyz, healthz, livezβœ…βœ…βœ…βœ…βœ…
telemetryβœ…βœ…βŒβŒβŒ
metricsβœ…βœ…βŒβŒβŒ
update locksβœ…βŒβŒβŒβŒ
get locksβœ…βœ…βŒβŒβŒ

TLS

Available as of v1.2.0

TLS for encrypted connections can be enabled on your Qdrant instance to secure connections.

First make sure you have a certificate and private key for TLS, usually in .pem format. On your local machine you may use mkcert to generate a self signed certificate.

To enable TLS, set the following properties in the Qdrant configuration with the correct paths and restart:

service:
  # Enable HTTPS for the REST and gRPC API
  enable_tls: true

# TLS configuration.
# Required if either service.enable_tls or cluster.p2p.enable_tls is true.
tls:
  # Server certificate chain file
  cert: ./tls/cert.pem

  # Server private key file
  key: ./tls/key.pem

For internal communication when running cluster mode, TLS can be enabled with:

cluster:
  # Configuration of the inter-cluster communication
  p2p:
    # Use TLS for communication between peers
    enable_tls: true

With TLS enabled, you must start using HTTPS connections. For example:

curl -X GET https://localhost:6333
from qdrant_client import QdrantClient

client = QdrantClient(
    url="https://localhost:6333",
)
import { QdrantClient } from "@qdrant/js-client-rest";

const client = new QdrantClient({ url: "https://localhost", port: 6333 });
use qdrant_client::Qdrant;

let client = Qdrant::from_url("http://localhost:6334").build()?;

Certificate rotation is enabled with a default refresh time of one hour. This reloads certificate files every hour while Qdrant is running. This way changed certificates are picked up when they get updated externally. The refresh time can be tuned by changing the tls.cert_ttl setting. You can leave this on, even if you don’t plan to update your certificates. Currently this is only supported for the REST API.

Optionally, you can enable client certificate validation on the server against a local certificate authority. Set the following properties and restart:

service:
  # Check user HTTPS client certificate against CA file specified in tls config
  verify_https_client_certificate: false

# TLS configuration.
# Required if either service.enable_tls or cluster.p2p.enable_tls is true.
tls:
  # Certificate authority certificate file.
  # This certificate will be used to validate the certificates
  # presented by other nodes during inter-cluster communication.
  #
  # If verify_https_client_certificate is true, it will verify
  # HTTPS client certificate
  #
  # Required if cluster.p2p.enable_tls is true.
  ca_cert: ./tls/cacert.pem

Hardening

We recommend reducing the amount of permissions granted to Qdrant containers so that you can reduce the risk of exploitation. Here are some ways to reduce the permissions of a Qdrant container:

  • Run Qdrant as a non-root user. This can help mitigate the risk of future container breakout vulnerabilities. Qdrant does not need the privileges of the root user for any purpose.

    • You can use the image qdrant/qdrant:<version>-unprivileged instead of the default Qdrant image.
    • You can use the flag --user=1000:2000 when running docker run.
    • You can set user: 1000 when using Docker Compose.
    • You can set runAsUser: 1000 when running in Kubernetes (our Helm chart does this by default).
  • Run Qdrant with a read-only root filesystem. This can help mitigate vulnerabilities that require the ability to modify system files, which is a permission Qdrant does not need. As long as the container uses mounted volumes for storage (/qdrant/storage and /qdrant/snapshots by default), Qdrant can continue to operate while being prevented from writing data outside of those volumes.

  • Block Qdrant’s external network access. This can help mitigate server side request forgery attacks, like via the snapshot recovery API. Single-node Qdrant clusters do not require any outbound network access. Multi-node Qdrant clusters only need the ability to connect to other Qdrant nodes via TCP ports 6333, 6334, and 6335.

There are other techniques for reducing the permissions such as dropping Linux capabilities depending on your deployment method, but the methods mentioned above are the most important.

Security