Die nachfolgenden Inhalte sind nur in englischer Sprache verfügbar.

Parameters

Possible valuesDescriptionAvailable from
as variable name in the config fileas  environment variable with 
namespace "planta.server." as prefix
   
bosh.stream.default_protocolsecure.stream.default_protocol{planta_plain, planta_ssl}Connect with or without TLS encryption
bosh.stream.defaults_enforcedsecure.stream.defaults_enforced{true / false}If defaults are not enforced, a client can specify a protocol, host, and port via the route attribute.
ssl.protocolsecure.ssl.protocolTLSv1.2Protocol for Planta backend SSL connection.
ssl.keystore.filesecure.ssl.keystore.fileconfig/keystore.jksKeystore file in jks format. Must contain the client certificates for the servlet. Used for ssl backend connection.
ssl.keystore.passwordsecure.ssl.keystore.password
Password to access keystore
ssl.truststore.filesecure.ssl.truststore.fileconfig/truststore.jksTruststore file in jks format. Must contain the public keys of the trust chain up to the CA that issued the certificates in keystore.jks
ssl.truststore.passwordsecure.ssl.truststore.password
Password to access truststore
servlet.enforce_request_vectorsecure.servlet.enforce_request_vector{false / true}Default settings for the SSL/TLS enabled connector
servlet.transport_schemesecure.servlet.transport_scheme{http / https}If set to https, an SSL connection is used.
servlet.entrypointsecure.servlet.entrypoint

String

Makes entrypoint for planta secure configurable. 

This setting must match that of the ClientAdapter (secure_server_endpoint parameter).

Default: \PlantaServerAdapter\

S 39.5.35
servlet.connectionsecure.servlet.connectionString : IntegerCombines interface and port, separated by a ':', e.g. your_interface:your_portS 39.5.34
reverse_proxy.authsecure.reverse_proxy.auth{true / false}To allow login using either LDAP or OIDC, this has to be set to true.
reverse_proxy.user_formatsecure.reverse_proxy.user_formatplainThe format of the user header. At the moment the header is transmitted plain.
reverse_proxy.user_headersecure.reverse_proxy.user_header{X-Authenticated-User / X-Forwarded-User}X-Authenticated-User is used for LDAP method and X-Forwarded-User is used for OIDC as header attribute for the user name.
If it is left blank, neither LDAP nor OIDC is activated as login method.

reverse_proxy.user_tokensecure.reverse_proxy.user_token

X-Forwarded-Access-Token

Is used for OIDC as header attribute for the user token.S 39.5.34
bosh.session.min_waitsecure.session.min_waitIntegerDefines how long a polling request may wait. Longer intervals reduce overhead, shorter intervals reduce the time until connection failure will be noticed.
bosh.session.max_waitsecure.session.max_waitIntegerA potential reverse proxy requires a read timeout >= max_wait in order to avoid 504 gateway timeout errors on the client adapter side.
bosh.session.default_waitsecure.session.default_waitInteger

planta.session.keepalivesecure.a.session.keepaliveIntegerShould be the same value for both keepalive and the client
bosh.session.max_inactivitysecure.session.max_inactivityIntegerDefines how long a session remains alive in the absence of web requests.
service.ldap_enabledservice.ldap_enabled{true / false}Enables ldap service to synchronize user of a directory serviceS 39.5.34
service.ldap_useSSLservice.ldap_useSSL{true / false}Enables ssl usage of the ldap service S 39.5.34
ldap_configurationconfig.ldappath to LDAP configuration file
S 39.5.34
oidc.clientIdsecure.oidc.clientIdString
S 39.5.34
oidc.url_issuersecure.oidc.url_issuerURl
S 39.5.34
oidc.url_jwksetsecure.oidc.url_jwksetURl
S 39.5.34
servlet.local_port
Integer 8080

Up to

S 39.5.31

auth_method.ldap
{true / false}Enables authentication using a DirectoryService. A separate configuration is required

Up to

S 39.5.31

auth_method.ldap_useSSL
{true / false}Enables SSL Protocol for the DirectoryService

Up to

S 39.5.31

auth_method.ldap_configuration
path to LDAP configuration file

Up to

S 39.5.31