• HashiCorp Developer

  • HashiCorp Cloud Platform
  • Terraform
  • Packer
  • Consul
  • Vault
  • Boundary
  • Nomad
  • Waypoint
  • Vagrant
Nomad
  • Install
  • Intro
  • Tutorials
  • Documentation
  • API
  • Tools
  • Plugins
  • Sign up
Nomad Home

Documentation

Skip to main content
  • Documentation

    • Overview
    • acl
    • audit
    • autopilot
    • client
    • consul
    • plugin
    • sentinel
    • search
    • server
    • server_join
    • telemetry
    • tls
    • ui
    • vault

  • Schedulers

  • Nomad Ecosystem
  • Nomad Partnerships
  • Who Uses Nomad
  • FAQ

  • Resources

  • Tutorial Library
  • Community Forum
    (opens in new tab)
  • Support
    (opens in new tab)
  • GitHub
    (opens in new tab)
  1. Developer
  2. Nomad
  3. Documentation
  4. Configuration
  5. acl
  • Nomad
  • v1.3.x
  • v1.2.x
  • v1.1.x
  • v1.0.x
  • v0.12.x
  • v0.11.x

ยปacl Block

Placementacl

The acl block configures the Nomad agent to enable ACLs and tunes various ACL parameters. Learn more about configuring Nomad's ACL system in the Secure Nomad with Access Control guide.

acl {
  enabled    = true
  token_ttl  = "30s"
  policy_ttl = "60s"
  role_ttl   = "60s"
}

acl Parameters

  • enabled (bool: false) - Specifies if ACL enforcement is enabled. All other ACL configuration options depend on this value. Note that the Nomad command line client will send requests for client endpoints such as alloc exec directly to Nomad clients whenever they are accessible. In this scenario, the client will enforce ACLs, so both servers and clients should have ACLs enabled.

  • token_ttl (string: "30s") - Specifies the maximum time-to-live (TTL) for cached ACL tokens. This does not affect servers, since they do not cache tokens. Setting this value lower reduces how stale a token can be, but increases the request load against servers. If a client cannot reach a server, for example because of an outage, the TTL will be ignored and the cached value used.

  • policy_ttl (string: "30s") - Specifies the maximum time-to-live (TTL) for cached ACL policies. This does not affect servers, since they do not cache policies. Setting this value lower reduces how stale a policy can be, but increases the request load against servers. If a client cannot reach a server, for example because of an outage, the TTL will be ignored and the cached value used.

  • role_ttl (string: "30s") - Specifies the maximum time-to-live (TTL) for cached ACL roles. This does not affect servers, since they do not cache roles. Setting this value lower reduces how stale a role can be, but increases the request load against servers. If a client cannot reach a server, for example because of an outage, the TTL will be ignored and the cached value used.

  • replication_token (string: "") - Specifies the Secret ID of the ACL token to use for replicating policies and tokens. This is used by servers in non-authoritative region to mirror the policies and tokens into the local region from authoritative_region.

  • token_min_expiration_ttl (string: "1m") - Specifies the lowest acceptable TTL value for an ACL token when setting expiration. This is used by the Nomad servers to validate ACL tokens.

  • token_max_expiration_ttl (string: "24h") - Specifies the highest acceptable TTL value for an ACL token when setting expiration. This is used by the Nomad servers to validate ACL tokens.

Edit this page on GitHub

On this page

  1. acl Block
  2. acl Parameters
Give Feedback(opens in new tab)
  • Certifications
  • System Status
  • Terms of Use
  • Security
  • Privacy
  • Trademark Policy
  • Trade Controls
  • Give Feedback(opens in new tab)