path: root/manpages/taler-merchant-httpd.1.rst
diff options
authorChristian Grothoff <>2021-01-31 22:22:33 +0100
committerChristian Grothoff <>2021-01-31 22:22:33 +0100
commit1c5fd285e514a202d421c500823e66181c0a51ac (patch)
tree010002c36f6d1e1b9c8ff110b597c38c462f7676 /manpages/taler-merchant-httpd.1.rst
parentcaa71e0fdf940fb8aa71fbd60261bfbdd55f5336 (diff)
document new option (#6731)
Diffstat (limited to 'manpages/taler-merchant-httpd.1.rst')
1 files changed, 21 insertions, 0 deletions
diff --git a/manpages/taler-merchant-httpd.1.rst b/manpages/taler-merchant-httpd.1.rst
index 1b2337a..126e845 100644
--- a/manpages/taler-merchant-httpd.1.rst
+++ b/manpages/taler-merchant-httpd.1.rst
@@ -32,6 +32,19 @@ before running this command.
+**-a** *TOKEN* \| **––auth=**\ \ *TOKEN*
+ Use TOKEN for initial access control to the merchant backend. The value
+ given in TOKEN must appear in backoffice requests to the default instance
+ of the merchant, i.e. "Authorization: secret-token:TOKEN" to obtain
+ access to the merchant backend. Note that setting a passphrase for the
+ default instance by any means will block future access via TOKEN. This
+ is basically a way to reset the passphrase protecting access. TOKEN
+ should be a "pchar" as per RFC 8959, but this is NOT checked. Note that
+ TOKEN will only grant access to the 'default' instance, not other instances.
+ Instead of using the command-line, which exposes TOKEN to users on the
+ system, you may want to consider setting the
+ TALER_MERCHANT_TOKEN environment variable instead.
**-C** \| **––connection-close**
Force each HTTP connection to be closed after each request
(useful in combination with -f to avoid having to wait for nc to
@@ -68,6 +81,14 @@ SIGTERM
+Environment Variables
+ Like the "-a" option, resets the access token for the default
+ instance to the given value.
See Also