Zum Hauptinhalt springen

Environment Variables

Environment variables for the idp service

NameIntroduction VersionTypeDescriptionDefault Value
IDP_PASSWORD_RESET_URI1.0.0stringThe URI where a user can reset their password.
OC_TRACING_ENABLED
IDP_TRACING_ENABLED
1.0.0boolActivates tracing.false
OC_TRACING_TYPE
IDP_TRACING_TYPE
1.0.0stringThe type of tracing. Defaults to '', which is the same as 'jaeger'. Allowed tracing types are 'jaeger' and '' as of now.
OC_TRACING_ENDPOINT
IDP_TRACING_ENDPOINT
1.0.0stringThe endpoint of the tracing agent.
OC_TRACING_COLLECTOR
IDP_TRACING_COLLECTOR
1.0.0stringThe HTTP endpoint for sending spans directly to a collector, i.e. \http://jaeger-collector:14268/api/traces. Only used if the tracing endpoint is unset.
OC_LOG_LEVEL
IDP_LOG_LEVEL
1.0.0stringThe log level. Valid values are: 'panic', 'fatal', 'error', 'warn', 'info', 'debug', 'trace'.
OC_LOG_PRETTY
IDP_LOG_PRETTY
1.0.0boolActivates pretty log output.false
OC_LOG_COLOR
IDP_LOG_COLOR
1.0.0boolActivates colorized log output.false
OC_LOG_FILE
IDP_LOG_FILE
1.0.0stringThe path to the log file. Activates logging to this file if set.
IDP_DEBUG_ADDR1.0.0stringBind address of the debug server, where metrics, health, config and debug endpoints will be exposed.127.0.0.1:9134
IDP_DEBUG_TOKEN1.0.0stringToken to secure the metrics endpoint.
IDP_DEBUG_PPROF1.0.0boolEnables pprof, which can be used for profiling.false
IDP_DEBUG_ZPAGES1.0.0boolEnables zpages, which can be used for collecting and viewing in-memory traces.false
IDP_HTTP_ADDR1.0.0stringThe bind address of the HTTP service.127.0.0.1:9130
IDP_HTTP_ROOT1.0.0stringSubdirectory that serves as the root for this HTTP service./
IDP_TRANSPORT_TLS_CERT1.0.0stringPath/File name of the TLS server certificate (in PEM format) for the IDP service. If not defined, the root directory derives from $OC_BASE_DATA_PATH/idp./home/chaser/.opencloud/idp/server.crt
IDP_TRANSPORT_TLS_KEY1.0.0stringPath/File name for the TLS certificate key (in PEM format) for the server certificate to use for the IDP service. If not defined, the root directory derives from $OC_BASE_DATA_PATH/idp./home/chaser/.opencloud/idp/server.key
IDP_TLS1.0.0boolDisable or Enable HTTPS for the communication between the Proxy service and the IDP service. If set to 'true', the key and cert files need to be configured and present.false
OC_REVA_GATEWAY1.0.0stringThe CS3 gateway endpoint.eu.opencloud.api.gateway
OC_GRPC_CLIENT_TLS_MODE1.0.0stringTLS mode for grpc connection to the go-micro based grpc services. Possible values are 'off', 'insecure' and 'on'. 'off': disables transport security for the clients. 'insecure' allows using transport security, but disables certificate verification (to be used with the autogenerated self-signed certificates). 'on' enables transport security, including server certificate verification.
OC_GRPC_CLIENT_TLS_CACERT1.0.0stringPath/File name for the root CA certificate (in PEM format) used to validate TLS server certificates of the go-micro based grpc services.
OC_MACHINE_AUTH_API_KEY
IDP_MACHINE_AUTH_API_KEY
1.0.0stringMachine auth API key used to validate internal requests necessary for the access to resources from other services.
IDP_ASSET_PATH1.0.0stringServe IDP assets from a path on the filesystem instead of the builtin assets.
IDP_LOGIN_BACKGROUND_URL1.0.0stringConfigure an alternative URL to the background image for the login page.
OC_URL
OC_OIDC_ISSUER
IDP_ISS
1.0.0stringThe OIDC issuer URL to use.https://localhost:9200
IDP_IDENTITY_MANAGER1.0.0stringThe identity manager implementation to use. Supported identity managers are 'ldap', 'cs3', 'libregraph' and 'guest'.ldap
IDP_URI_BASE_PATH1.0.0stringIDP uri base path (defaults to '').
IDP_SIGN_IN_URI1.0.0stringIDP sign-in url.
IDP_SIGN_OUT_URI1.0.0stringIDP sign-out url.
IDP_ENDPOINT_URI1.0.0stringURL of the IDP endpoint.
OC_LDAP_INSECURE
IDP_INSECURE
1.0.0boolDisable TLS certificate validation for the LDAP connections. Do not set this in production environments.false
IDP_ALLOW_CLIENT_GUESTS1.0.0boolAllow guest clients to access OpenCloud.false
IDP_ALLOW_DYNAMIC_CLIENT_REGISTRATION1.0.0boolAllow dynamic client registration.false
IDP_ENCRYPTION_SECRET_FILE1.0.0stringPath to the encryption secret file, if unset, a new certificate will be autogenerated upon each restart, thus invalidating all existing sessions. If not defined, the root directory derives from $OC_BASE_DATA_PATH/idp./home/chaser/.opencloud/idp/encryption.key
IDP_DEFAULT_SIGNIN_PAGE_TEXT2.0.0string
IDP_DEFAULT_LOGO_TARGET_URInextstringDefault logo target URI.https://opencloud.eu
IDP_SIGNING_KID1.0.0stringValue of the KID (Key ID) field which is used in created tokens to uniquely identify the signing-private-key.private-key
IDP_SIGNING_METHOD1.0.0stringSigning method of IDP requests like 'PS256'PS256
IDP_SIGNING_PRIVATE_KEY_FILES1.0.0[]stringA list of private key files for signing IDP requests. If not defined, the root directory derives from $OC_BASE_DATA_PATH/idp. See the Environment Variable Types description for more details.[/home/chaser/.opencloud/idp/private-key.pem]
IDP_VALIDATION_KEYS_PATH1.0.0stringPath to validation keys for IDP requests.
IDP_ACCESS_TOKEN_EXPIRATION1.0.0uint64'Access token lifespan in seconds (time before an access token is expired).'300
IDP_ID_TOKEN_EXPIRATION1.0.0uint64ID token lifespan in seconds (time before an ID token is expired).300
IDP_REFRESH_TOKEN_EXPIRATION1.0.0uint64Refresh token lifespan in seconds (time before an refresh token is expired). This also limits the duration of an idle offline session.2592000
IDP_DYNAMIC_CLIENT_SECRET_DURATION1.0.0uint64Lifespan in seconds of a dynamically registered OIDC client.0
OC_LDAP_URI
IDP_LDAP_URI
1.0.0stringUrl of the LDAP service to use as IDP.ldaps://localhost:9235
OC_LDAP_CACERT
IDP_LDAP_TLS_CACERT
1.0.0stringPath/File name for the root CA certificate (in PEM format) used to validate TLS server certificates of the LDAP service. If not defined, the root directory derives from $OC_BASE_DATA_PATH/idp./home/chaser/.opencloud/idm/ldap.crt
OC_LDAP_BIND_DN
IDP_LDAP_BIND_DN
1.0.0stringLDAP DN to use for simple bind authentication with the target LDAP server.uid=idp,ou=sysusers,o=libregraph-idm
OC_LDAP_BIND_PASSWORD
IDP_LDAP_BIND_PASSWORD
1.0.0stringPassword to use for authenticating the 'bind_dn'.
OC_LDAP_USER_BASE_DN
IDP_LDAP_BASE_DN
1.0.0stringSearch base DN for looking up LDAP users.ou=users,o=libregraph-idm
OC_LDAP_USER_SCOPE
IDP_LDAP_SCOPE
1.0.0stringLDAP search scope to use when looking up users. Supported scopes are 'base', 'one' and 'sub'.sub
IDP_LDAP_LOGIN_ATTRIBUTE1.0.0stringLDAP User attribute to use for login like 'uid'.uid
OC_LDAP_USER_SCHEMA_MAIL
IDP_LDAP_EMAIL_ATTRIBUTE
1.0.0stringLDAP User email attribute like 'mail'.mail
OC_LDAP_USER_SCHEMA_USERNAME
IDP_LDAP_NAME_ATTRIBUTE
1.0.0stringLDAP User name attribute like 'displayName'.displayName
OC_LDAP_USER_SCHEMA_ID
IDP_LDAP_UUID_ATTRIBUTE
1.0.0stringLDAP User UUID attribute like 'uid'.openCloudUUID
IDP_LDAP_UUID_ATTRIBUTE_TYPE1.0.0stringLDAP User uuid attribute type like 'text'.text
OC_LDAP_USER_ENABLED_ATTRIBUTE
IDP_USER_ENABLED_ATTRIBUTE
1.0.0stringLDAP Attribute to use as a flag telling if the user is enabled or disabled.openCloudUserEnabled
OC_LDAP_USER_FILTER
IDP_LDAP_FILTER
1.0.0stringLDAP filter to add to the default filters for user search like '(objectclass=openCloudUser)'.
OC_LDAP_USER_OBJECTCLASS
IDP_LDAP_OBJECTCLASS
1.0.0stringLDAP User ObjectClass like 'inetOrgPerson'.inetOrgPerson