All provider configuration
authentication-sessions
infinispan
| Option | Type or Values | Default |
|---|---|---|
spi-authentication-sessions--infinispan--auth-sessions-limitThe maximum number of concurrent authentication sessions per RootAuthenticationSession. CLI: --spi-authentication-sessions--infinispan--auth-sessions-limitEnv: KC_SPI_AUTHENTICATION_SESSIONS__INFINISPAN__AUTH_SESSIONS_LIMIT | int | 300 |
remote
| Option | Type or Values | Default |
|---|---|---|
spi-authentication-sessions--remote--auth-sessions-limitThe maximum number of concurrent authentication sessions per RootAuthenticationSession. CLI: --spi-authentication-sessions--remote--auth-sessions-limitEnv: KC_SPI_AUTHENTICATION_SESSIONS__REMOTE__AUTH_SESSIONS_LIMIT | int | 300 |
spi-authentication-sessions--remote--max-retriesThe maximum number of retries if an error occurs. A value of zero or less disable any retries. CLI: --spi-authentication-sessions--remote--max-retriesEnv: KC_SPI_AUTHENTICATION_SESSIONS__REMOTE__MAX_RETRIES | int | 10 |
spi-authentication-sessions--remote--retry-base-timeThe base back-off time in milliseconds. CLI: --spi-authentication-sessions--remote--retry-base-timeEnv: KC_SPI_AUTHENTICATION_SESSIONS__REMOTE__RETRY_BASE_TIME | int | 10 |
brute-force-protector
default-brute-force-detector
| Option | Type or Values | Default |
|---|---|---|
spi-brute-force-protector--default-brute-force-detector--allow-concurrent-requestsIf concurrent logins are allowed by the brute force protection. CLI: --spi-brute-force-protector--default-brute-force-detector--allow-concurrent-requestsEnv: KC_SPI_BRUTE_FORCE_PROTECTOR__DEFAULT_BRUTE_FORCE_DETECTOR__ALLOW_CONCURRENT_REQUESTS | true, false | false |
cache-embedded
default
| Option | Type or Values | Default |
|---|---|---|
spi-cache-embedded--default--action-tokens-ownersSets the number of owners for the actionTokens distributed cache. It defines the number of copies of your data in the cluster. CLI: --spi-cache-embedded--default--action-tokens-ownersEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__ACTION_TOKENS_OWNERS | Integer | |
spi-cache-embedded--default--authentication-sessions-ownersSets the number of owners for the authenticationSessions distributed cache. It defines the number of copies of your data in the cluster. CLI: --spi-cache-embedded--default--authentication-sessions-ownersEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__AUTHENTICATION_SESSIONS_OWNERS | Integer | |
spi-cache-embedded--default--authorization-max-countThe maximum number of entries that can be stored in-memory by the authorization cache. CLI: --spi-cache-embedded--default--authorization-max-countEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__AUTHORIZATION_MAX_COUNT | Integer | |
spi-cache-embedded--default--client-sessions-max-countThe maximum number of entries that can be stored in-memory by the clientSessions cache. CLI: --spi-cache-embedded--default--client-sessions-max-countEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__CLIENT_SESSIONS_MAX_COUNT | Integer | |
spi-cache-embedded--default--client-sessions-ownersSets the number of owners for the clientSessions distributed cache. It defines the number of copies of your data in the cluster. CLI: --spi-cache-embedded--default--client-sessions-ownersEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__CLIENT_SESSIONS_OWNERS | Integer | |
spi-cache-embedded--default--config-fileDefines the file from which cache configuration should be loaded from. The configuration file is relative to the conf/ directory.CLI: --spi-cache-embedded--default--config-fileEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__CONFIG_FILE | String | |
spi-cache-embedded--default--crl-max-countThe maximum number of entries that can be stored in-memory by the crl cache. CLI: --spi-cache-embedded--default--crl-max-countEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__CRL_MAX_COUNT | Integer | |
spi-cache-embedded--default--keys-max-countThe maximum number of entries that can be stored in-memory by the keys cache. CLI: --spi-cache-embedded--default--keys-max-countEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__KEYS_MAX_COUNT | Integer | |
spi-cache-embedded--default--login-failures-ownersSets the number of owners for the loginFailures distributed cache. It defines the number of copies of your data in the cluster. CLI: --spi-cache-embedded--default--login-failures-ownersEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__LOGIN_FAILURES_OWNERS | Integer | |
spi-cache-embedded--default--machine-nameThe name of the physical machine where this instance runs. It can be set if multiple NQRust-Identity instances are running in the same physical machines. Infinispan takes into consideration this value to keep the backup data spread between different machines. CLI: --spi-cache-embedded--default--machine-nameEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__MACHINE_NAME | String | |
spi-cache-embedded--default--metrics-histograms-enabledEnable histograms for metrics for the embedded caches. CLI: --spi-cache-embedded--default--metrics-histograms-enabledEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__METRICS_HISTOGRAMS_ENABLED | true, false | false |
spi-cache-embedded--default--network-bind-addressIP address used by clustering transport. By default, SITE_LOCAL is used. CLI: --spi-cache-embedded--default--network-bind-addressEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__NETWORK_BIND_ADDRESS | String | |
spi-cache-embedded--default--network-bind-portThe Port the clustering transport will bind to. By default, port 7800 is used. CLI: --spi-cache-embedded--default--network-bind-portEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__NETWORK_BIND_PORT | Integer | |
spi-cache-embedded--default--network-external-addressIP address that other instances in the cluster should use to contact this node. Set only if it is different to cache-embedded-network-bind-address, for example when this instance is behind a firewall. CLI: --spi-cache-embedded--default--network-external-addressEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__NETWORK_EXTERNAL_ADDRESS | String | |
spi-cache-embedded--default--network-external-portPort that other instances in the cluster should use to contact this node. Set only if it is different to cache-embedded-network-bind-port, for example when this instance is behind a firewall CLI: --spi-cache-embedded--default--network-external-portEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__NETWORK_EXTERNAL_PORT | Integer | |
spi-cache-embedded--default--node-nameSets the name of the current node. This is a friendly name to make logs, etc. make more sense. CLI: --spi-cache-embedded--default--node-nameEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__NODE_NAME | String | |
spi-cache-embedded--default--offline-client-sessions-max-countThe maximum number of entries that can be stored in-memory by the offlineClientSessions cache. CLI: --spi-cache-embedded--default--offline-client-sessions-max-countEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__OFFLINE_CLIENT_SESSIONS_MAX_COUNT | Integer | |
spi-cache-embedded--default--offline-sessions-max-countThe maximum number of entries that can be stored in-memory by the offlineSessions cache. CLI: --spi-cache-embedded--default--offline-sessions-max-countEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__OFFLINE_SESSIONS_MAX_COUNT | Integer | |
spi-cache-embedded--default--rack-nameThe name of the rack where this instance runs. It can be set if multiple NQRust-Identity instances are running in the same physical rack. Infinispan takes into consideration this value to keep the backup data spread between different racks. CLI: --spi-cache-embedded--default--rack-nameEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__RACK_NAME | String | |
spi-cache-embedded--default--realms-max-countThe maximum number of entries that can be stored in-memory by the realms cache. CLI: --spi-cache-embedded--default--realms-max-countEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__REALMS_MAX_COUNT | Integer | |
spi-cache-embedded--default--sessions-max-countThe maximum number of entries that can be stored in-memory by the sessions cache. CLI: --spi-cache-embedded--default--sessions-max-countEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__SESSIONS_MAX_COUNT | Integer | |
spi-cache-embedded--default--sessions-ownersSets the number of owners for the sessions distributed cache. It defines the number of copies of your data in the cluster. CLI: --spi-cache-embedded--default--sessions-ownersEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__SESSIONS_OWNERS | Integer | |
spi-cache-embedded--default--site-nameThe name of the site (availability zone) where this instance runs. It can be set if running NQRust-Identity in different availability zones. Infinispan takes into consideration this value to keep the backup data spread between different sites. CLI: --spi-cache-embedded--default--site-nameEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__SITE_NAME | String | |
spi-cache-embedded--default--users-max-countThe maximum number of entries that can be stored in-memory by the users cache. CLI: --spi-cache-embedded--default--users-max-countEnv: KC_SPI_CACHE_EMBEDDED__DEFAULT__USERS_MAX_COUNT | Integer |
cache-remote
default
| Option | Type or Values | Default |
|---|---|---|
spi-cache-remote--default--auth-realmSpecifies the Infinispan server realm to be used for authentication. CLI: --spi-cache-remote--default--auth-realmEnv: KC_SPI_CACHE_REMOTE__DEFAULT__AUTH_REALM | String | default |
spi-cache-remote--default--backup-sitesConfigures a list of backup sites names to where the external Infinispan cluster backups the NQRust-Identity data. CLI: --spi-cache-remote--default--backup-sitesEnv: KC_SPI_CACHE_REMOTE__DEFAULT__BACKUP_SITES | List | |
spi-cache-remote--default--client-intelligenceSpecifies the level of intelligence the Hot Rod client should have. CLI: --spi-cache-remote--default--client-intelligenceEnv: KC_SPI_CACHE_REMOTE__DEFAULT__CLIENT_INTELLIGENCE | BASIC, TOPOLOGY_AWARE, HASH_DISTRIBUTION_AWARE | HASH_DISTRIBUTION_AWARE |
spi-cache-remote--default--connection-pool-exhausted-actionSpecifies what happens when asking for a connection from a server’s pool, and that pool is exhausted. CLI: --spi-cache-remote--default--connection-pool-exhausted-actionEnv: KC_SPI_CACHE_REMOTE__DEFAULT__CONNECTION_POOL_EXHAUSTED_ACTION | EXCEPTION, WAIT, CREATE_NEW | CREATE_NEW |
spi-cache-remote--default--connection-pool-max-activeSets the maximum number of connections per Infinispan server instance. CLI: --spi-cache-remote--default--connection-pool-max-activeEnv: KC_SPI_CACHE_REMOTE__DEFAULT__CONNECTION_POOL_MAX_ACTIVE | Integer | 16 |
spi-cache-remote--default--hostnameThe hostname of the external Infinispan cluster. CLI: --spi-cache-remote--default--hostnameEnv: KC_SPI_CACHE_REMOTE__DEFAULT__HOSTNAME | String | |
spi-cache-remote--default--passwordThe password for the authentication to the external Infinispan cluster. It is optional if connecting to an unsecure external Infinispan cluster. If the option is specified, cache-remote-username is required as well.CLI: --spi-cache-remote--default--passwordEnv: KC_SPI_CACHE_REMOTE__DEFAULT__PASSWORD | String | |
spi-cache-remote--default--portThe port of the external Infinispan cluster. CLI: --spi-cache-remote--default--portEnv: KC_SPI_CACHE_REMOTE__DEFAULT__PORT | Integer | 11222 |
spi-cache-remote--default--properties-filePath to the properties file with the Hot Rod client configuration. CLI: --spi-cache-remote--default--properties-fileEnv: KC_SPI_CACHE_REMOTE__DEFAULT__PROPERTIES_FILE | File | |
spi-cache-remote--default--sasl-mechanismSelects the SASL mechanism to use for the connection to the Infinispan server. CLI: --spi-cache-remote--default--sasl-mechanismEnv: KC_SPI_CACHE_REMOTE__DEFAULT__SASL_MECHANISM | String | SCRAM-SHA-512 |
spi-cache-remote--default--tls-enabledEnable TLS support to communicate with a secured remote Infinispan server. Recommended to be enabled in production. CLI: --spi-cache-remote--default--tls-enabledEnv: KC_SPI_CACHE_REMOTE__DEFAULT__TLS_ENABLED | true, false | true |
spi-cache-remote--default--tls-sni-hostnameSpecifies the TLS SNI hostname for the connection to the Infinispan server. CLI: --spi-cache-remote--default--tls-sni-hostnameEnv: KC_SPI_CACHE_REMOTE__DEFAULT__TLS_SNI_HOSTNAME | String | |
spi-cache-remote--default--usernameThe username for the authentication to the external Infinispan cluster. It is optional if connecting to an unsecure external Infinispan cluster. If the option is specified, cache-remote-password is required as well.CLI: --spi-cache-remote--default--usernameEnv: KC_SPI_CACHE_REMOTE__DEFAULT__USERNAME | String |
ciba-auth-channel
ciba-http-auth-channel
| Option | Type or Values | Default |
|---|---|---|
spi-ciba-auth-channel--ciba-http-auth-channel--http-authentication-channel-uriThe HTTP(S) URI of the authentication channel. CLI: --spi-ciba-auth-channel--ciba-http-auth-channel--http-authentication-channel-uriEnv: KC_SPI_CIBA_AUTH_CHANNEL__CIBA_HTTP_AUTH_CHANNEL__HTTP_AUTHENTICATION_CHANNEL_URI | string |
client-policy-executor
client-id-metadata-document
| Option | Type or Values | Default |
|---|---|---|
spi-client-policy-executor--client-id-metadata-document--cimd-provider-nameProvider to use for the CIMD CLI: --spi-client-policy-executor--client-id-metadata-document--cimd-provider-nameEnv: KC_SPI_CLIENT_POLICY_EXECUTOR__CLIENT_ID_METADATA_DOCUMENT__CIMD_PROVIDER_NAME | string | persistent-cimd |
spi-client-policy-executor--client-id-metadata-document--max-cache-timeMax cache time of client metadata in seconds for the CIMD. CLI: --spi-client-policy-executor--client-id-metadata-document--max-cache-timeEnv: KC_SPI_CLIENT_POLICY_EXECUTOR__CLIENT_ID_METADATA_DOCUMENT__MAX_CACHE_TIME | int | 259200 |
spi-client-policy-executor--client-id-metadata-document--min-cache-timeMin cache time of client metadata in seconds for the CIMD. CLI: --spi-client-policy-executor--client-id-metadata-document--min-cache-timeEnv: KC_SPI_CLIENT_POLICY_EXECUTOR__CLIENT_ID_METADATA_DOCUMENT__MIN_CACHE_TIME | int | 300 |
spi-client-policy-executor--client-id-metadata-document--upper-limit-metadata-bytesClient metadata upper limit in byte for the CIMD. CLI: --spi-client-policy-executor--client-id-metadata-document--upper-limit-metadata-bytesEnv: KC_SPI_CLIENT_POLICY_EXECUTOR__CLIENT_ID_METADATA_DOCUMENT__UPPER_LIMIT_METADATA_BYTES | int | 5000 |
connections-http-client
default
| Option | Type or Values | Default |
|---|---|---|
spi-connections-http-client--default--backoff-multiplierMultiplier for exponential backoff between retry attempts. For example, with an initial backoff of 1000ms and a multiplier of 2.0, the retry delays would be: 1000ms, 2000ms, 4000ms, etc. CLI: --spi-connections-http-client--default--backoff-multiplierEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__BACKOFF_MULTIPLIER | string | 2.0 |
spi-connections-http-client--default--client-key-passwordThe key password. CLI: --spi-connections-http-client--default--client-key-passwordEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__CLIENT_KEY_PASSWORD | string | -1 |
spi-connections-http-client--default--client-keystoreThe file path of the key store from where the key material is going to be read from to set-up TLS connections. CLI: --spi-connections-http-client--default--client-keystoreEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__CLIENT_KEYSTORE | string | |
spi-connections-http-client--default--client-keystore-passwordThe key store password. CLI: --spi-connections-http-client--default--client-keystore-passwordEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__CLIENT_KEYSTORE_PASSWORD | string | |
spi-connections-http-client--default--connection-pool-sizeAssigns maximum total connection value. CLI: --spi-connections-http-client--default--connection-pool-sizeEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__CONNECTION_POOL_SIZE | int | |
spi-connections-http-client--default--connection-request-timeout-millisTimeout when trying to obtain any connection, new or pooled. CLI: --spi-connections-http-client--default--connection-request-timeout-millisEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__CONNECTION_REQUEST_TIMEOUT_MILLIS | long | 5000 |
spi-connections-http-client--default--connection-ttl-millisSets maximum time, in milliseconds, to live for persistent connections. CLI: --spi-connections-http-client--default--connection-ttl-millisEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__CONNECTION_TTL_MILLIS | long | -1 |
spi-connections-http-client--default--disable-cookiesDisables state (cookie) management. CLI: --spi-connections-http-client--default--disable-cookiesEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__DISABLE_COOKIES | true, false | true |
spi-connections-http-client--default--disable-trust-managerDisable trust management and hostname verification. NOTE this is a security hole, so only set this option if you cannot or do not want to verify the identity of the host you are communicating with. CLI: --spi-connections-http-client--default--disable-trust-managerEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__DISABLE_TRUST_MANAGER | true, false | false |
spi-connections-http-client--default--establish-connection-timeout-millisTimeout when making an initial socket connection. Only effective if less than the connection-request-timeout-millis. CLI: --spi-connections-http-client--default--establish-connection-timeout-millisEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__ESTABLISH_CONNECTION_TIMEOUT_MILLIS | long | -1 |
spi-connections-http-client--default--initial-backoff-millisInitial backoff time in milliseconds before the first retry attempt. CLI: --spi-connections-http-client--default--initial-backoff-millisEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__INITIAL_BACKOFF_MILLIS | long | 1000 |
spi-connections-http-client--default--jitter-factorJitter factor to apply to backoff times. A value of 0.5 means the actual backoff time will be between 50% and 150% of the calculated exponential backoff time. CLI: --spi-connections-http-client--default--jitter-factorEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__JITTER_FACTOR | string | 0.5 |
spi-connections-http-client--default--max-connection-idle-time-millisSets the time, in milliseconds, for evicting idle connections from the pool. CLI: --spi-connections-http-client--default--max-connection-idle-time-millisEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__MAX_CONNECTION_IDLE_TIME_MILLIS | long | 900000 |
spi-connections-http-client--default--max-consumed-response-sizeMaximum size of a response consumed by the client (to prevent denial of service) CLI: --spi-connections-http-client--default--max-consumed-response-sizeEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__MAX_CONSUMED_RESPONSE_SIZE | long | 10000000 |
spi-connections-http-client--default--max-pooled-per-routeAssigns maximum connection per route value. CLI: --spi-connections-http-client--default--max-pooled-per-routeEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__MAX_POOLED_PER_ROUTE | int | 64 |
spi-connections-http-client--default--max-retriesMaximum number of retry attempts for all outgoing HTTP requests. Set to 0 to disable retries (default). CLI: --spi-connections-http-client--default--max-retriesEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__MAX_RETRIES | int | 0 |
spi-connections-http-client--default--proxy-mappingsDenotes the combination of a regex based hostname pattern and a proxy-uri in the form of hostnamePattern;proxyUri. CLI: --spi-connections-http-client--default--proxy-mappingsEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__PROXY_MAPPINGS | string | |
spi-connections-http-client--default--reuse-connectionsIf connections should be reused. CLI: --spi-connections-http-client--default--reuse-connectionsEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__REUSE_CONNECTIONS | true, false | true |
spi-connections-http-client--default--socket-timeout-millisSocket inactivity timeout. CLI: --spi-connections-http-client--default--socket-timeout-millisEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__SOCKET_TIMEOUT_MILLIS | long | 5000 |
spi-connections-http-client--default--use-jitterWhether to apply jitter to backoff times to prevent synchronized retry storms when multiple clients are retrying at the same time. CLI: --spi-connections-http-client--default--use-jitterEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__DEFAULT__USE_JITTER | true, false | true |
opentelemetry
| Option | Type or Values | Default |
|---|---|---|
spi-connections-http-client--opentelemetry--backoff-multiplierMultiplier for exponential backoff between retry attempts. For example, with an initial backoff of 1000ms and a multiplier of 2.0, the retry delays would be: 1000ms, 2000ms, 4000ms, etc. CLI: --spi-connections-http-client--opentelemetry--backoff-multiplierEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__BACKOFF_MULTIPLIER | string | 2.0 |
spi-connections-http-client--opentelemetry--client-key-passwordThe key password. CLI: --spi-connections-http-client--opentelemetry--client-key-passwordEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__CLIENT_KEY_PASSWORD | string | -1 |
spi-connections-http-client--opentelemetry--client-keystoreThe file path of the key store from where the key material is going to be read from to set-up TLS connections. CLI: --spi-connections-http-client--opentelemetry--client-keystoreEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__CLIENT_KEYSTORE | string | |
spi-connections-http-client--opentelemetry--client-keystore-passwordThe key store password. CLI: --spi-connections-http-client--opentelemetry--client-keystore-passwordEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__CLIENT_KEYSTORE_PASSWORD | string | |
spi-connections-http-client--opentelemetry--connection-pool-sizeAssigns maximum total connection value. CLI: --spi-connections-http-client--opentelemetry--connection-pool-sizeEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__CONNECTION_POOL_SIZE | int | |
spi-connections-http-client--opentelemetry--connection-request-timeout-millisTimeout when trying to obtain any connection, new or pooled. CLI: --spi-connections-http-client--opentelemetry--connection-request-timeout-millisEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__CONNECTION_REQUEST_TIMEOUT_MILLIS | long | 5000 |
spi-connections-http-client--opentelemetry--connection-ttl-millisSets maximum time, in milliseconds, to live for persistent connections. CLI: --spi-connections-http-client--opentelemetry--connection-ttl-millisEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__CONNECTION_TTL_MILLIS | long | -1 |
spi-connections-http-client--opentelemetry--disable-cookiesDisables state (cookie) management. CLI: --spi-connections-http-client--opentelemetry--disable-cookiesEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__DISABLE_COOKIES | true, false | true |
spi-connections-http-client--opentelemetry--disable-trust-managerDisable trust management and hostname verification. NOTE this is a security hole, so only set this option if you cannot or do not want to verify the identity of the host you are communicating with. CLI: --spi-connections-http-client--opentelemetry--disable-trust-managerEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__DISABLE_TRUST_MANAGER | true, false | false |
spi-connections-http-client--opentelemetry--establish-connection-timeout-millisTimeout when making an initial socket connection. Only effective if less than the connection-request-timeout-millis. CLI: --spi-connections-http-client--opentelemetry--establish-connection-timeout-millisEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__ESTABLISH_CONNECTION_TIMEOUT_MILLIS | long | -1 |
spi-connections-http-client--opentelemetry--initial-backoff-millisInitial backoff time in milliseconds before the first retry attempt. CLI: --spi-connections-http-client--opentelemetry--initial-backoff-millisEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__INITIAL_BACKOFF_MILLIS | long | 1000 |
spi-connections-http-client--opentelemetry--jitter-factorJitter factor to apply to backoff times. A value of 0.5 means the actual backoff time will be between 50% and 150% of the calculated exponential backoff time. CLI: --spi-connections-http-client--opentelemetry--jitter-factorEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__JITTER_FACTOR | string | 0.5 |
spi-connections-http-client--opentelemetry--max-connection-idle-time-millisSets the time, in milliseconds, for evicting idle connections from the pool. CLI: --spi-connections-http-client--opentelemetry--max-connection-idle-time-millisEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__MAX_CONNECTION_IDLE_TIME_MILLIS | long | 900000 |
spi-connections-http-client--opentelemetry--max-consumed-response-sizeMaximum size of a response consumed by the client (to prevent denial of service) CLI: --spi-connections-http-client--opentelemetry--max-consumed-response-sizeEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__MAX_CONSUMED_RESPONSE_SIZE | long | 10000000 |
spi-connections-http-client--opentelemetry--max-pooled-per-routeAssigns maximum connection per route value. CLI: --spi-connections-http-client--opentelemetry--max-pooled-per-routeEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__MAX_POOLED_PER_ROUTE | int | 64 |
spi-connections-http-client--opentelemetry--max-retriesMaximum number of retry attempts for all outgoing HTTP requests. Set to 0 to disable retries (default). CLI: --spi-connections-http-client--opentelemetry--max-retriesEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__MAX_RETRIES | int | 0 |
spi-connections-http-client--opentelemetry--proxy-mappingsDenotes the combination of a regex based hostname pattern and a proxy-uri in the form of hostnamePattern;proxyUri. CLI: --spi-connections-http-client--opentelemetry--proxy-mappingsEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__PROXY_MAPPINGS | string | |
spi-connections-http-client--opentelemetry--reuse-connectionsIf connections should be reused. CLI: --spi-connections-http-client--opentelemetry--reuse-connectionsEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__REUSE_CONNECTIONS | true, false | true |
spi-connections-http-client--opentelemetry--socket-timeout-millisSocket inactivity timeout. CLI: --spi-connections-http-client--opentelemetry--socket-timeout-millisEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__SOCKET_TIMEOUT_MILLIS | long | 5000 |
spi-connections-http-client--opentelemetry--use-jitterWhether to apply jitter to backoff times to prevent synchronized retry storms when multiple clients are retrying at the same time. CLI: --spi-connections-http-client--opentelemetry--use-jitterEnv: KC_SPI_CONNECTIONS_HTTP_CLIENT__OPENTELEMETRY__USE_JITTER | true, false | true |
connections-jpa
quarkus
| Option | Type or Values | Default |
|---|---|---|
spi-connections-jpa--quarkus--initialize-emptyInitialize database if empty. If set to false the database has to be manually initialized. If you want to manually initialize the database set migrationStrategy to manual which will create a file with SQL commands to initialize the database. CLI: --spi-connections-jpa--quarkus--initialize-emptyEnv: KC_SPI_CONNECTIONS_JPA__QUARKUS__INITIALIZE_EMPTY | true, false | true |
spi-connections-jpa--quarkus--migration-exportPath for where to write manual database initialization/migration file. CLI: --spi-connections-jpa--quarkus--migration-exportEnv: KC_SPI_CONNECTIONS_JPA__QUARKUS__MIGRATION_EXPORT | string | |
spi-connections-jpa--quarkus--migration-strategyStrategy to use to migrate database. Valid values are update, manual and validate. Update will automatically migrate the database schema. Manual will export the required changes to a file with SQL commands that you can manually execute on the database. Validate will simply check if the database is up-to-date. CLI: --spi-connections-jpa--quarkus--migration-strategyEnv: KC_SPI_CONNECTIONS_JPA__QUARKUS__MIGRATION_STRATEGY | update, manual, validate | update |
cors
default
| Option | Type or Values | Default |
|---|---|---|
spi-cors--default--allowed-headersA comma-separated list of additional allowed headers for CORS requests CLI: --spi-cors--default--allowed-headersEnv: KC_SPI_CORS__DEFAULT__ALLOWED_HEADERS | string |
credential
nqrust-identity-password
| Option | Type or Values | Default |
|---|---|---|
spi-credential--keycloak-password--validations-counter-tagsComma-separated list of tags to be used when publishing password validation counter metric. CLI: --spi-credential--keycloak-password--validations-counter-tagsEnv: KC_SPI_CREDENTIAL__KEYCLOAK_PASSWORD__VALIDATIONS_COUNTER_TAGS | realm, algorithm, hashing_strength, outcome | realm,algorithm,hashing_strength,outcome |
crl-storage
infinispan
| Option | Type or Values | Default |
|---|---|---|
spi-crl-storage--infinispan--cache-timeInterval in seconds that the CRL is cached. The next update time of the CRL is always a minimum if present. Zero or a negative value means CRL is cached until the next update time specified in the CRL (or infinite if the CRL does not contain the next update). CLI: --spi-crl-storage--infinispan--cache-timeEnv: KC_SPI_CRL_STORAGE__INFINISPAN__CACHE_TIME | int | -1 |
spi-crl-storage--infinispan--min-time-between-requestsMinimum interval in seconds between two requests to retrieve the CRL. The CRL is not updated from the URL again until this minimum time has passed since the previous refresh. In theory this option is never used if the CRL is refreshed correctly in the next update time. The interval should be a positive number. Default 10 seconds. CLI: --spi-crl-storage--infinispan--min-time-between-requestsEnv: KC_SPI_CRL_STORAGE__INFINISPAN__MIN_TIME_BETWEEN_REQUESTS | int | 10 |
datastore
legacy
| Option | Type or Values | Default |
|---|---|---|
spi-datastore--legacy--allow-migrate-existing-database-to-snapshotBy default, it is not allowed to run the snapshot/development server against the database, which was previously migrated to some officially released server version. As an attempt of doing this indicates that you are trying to run development server against production database, which can result in a loss or corruption of data, and also does not allow upgrading. If it is really intended, you can use this option, which will allow to use nightly/development server against production database when explicitly switch to true. This option is recommended just in the development environments and should be never used in the production! CLI: --spi-datastore--legacy--allow-migrate-existing-database-to-snapshotEnv: KC_SPI_DATASTORE__LEGACY__ALLOW_MIGRATE_EXISTING_DATABASE_TO_SNAPSHOT | true, false | false |
device-representation
device-representation
| Option | Type or Values | Default |
|---|---|---|
spi-device-representation--device-representation--cache-sizeSets the maximum number of parsed user-agent values in the local cache. CLI: --spi-device-representation--device-representation--cache-sizeEnv: KC_SPI_DEVICE_REPRESENTATION__DEVICE_REPRESENTATION__CACHE_SIZE | Integer | 2048 |
events-listener
| Option | Type or Values | Default |
|---|---|---|
spi-events-listener--email--exclude-eventsA comma-separated list of events that should not be sent via email to the user’s account. CLI: --spi-events-listener--email--exclude-eventsEnv: KC_SPI_EVENTS_LISTENER__EMAIL__EXCLUDE_EVENTS | authreqid_to_token, authreqid_to_token_error, client_delete, client_delete_error, client_info, client_info_error, client_initiated_account_linking, client_initiated_account_linking_error, client_login, client_login_error, client_register, client_register_error, client_update, client_update_error, code_to_token, code_to_token_error, custom_required_action, custom_required_action_error, delete_account, delete_account_error, execute_action_token, execute_action_token_error, execute_actions, execute_actions_error, federated_identity_link, federated_identity_link_error, federated_identity_override_link, federated_identity_override_link_error, grant_consent, grant_consent_error, identity_provider_first_login, identity_provider_first_login_error, identity_provider_link_account, identity_provider_link_account_error, identity_provider_login, identity_provider_login_error, identity_provider_post_login, identity_provider_post_login_error, identity_provider_response, identity_provider_response_error, identity_provider_retrieve_token, identity_provider_retrieve_token_error, impersonate, impersonate_error, introspect_token, introspect_token_error, invalid_signature, invalid_signature_error, invite_org, invite_org_error, jwt_authorization_grant, jwt_authorization_grant_error, login, login_error, logout, logout_error, oauth2_device_auth, oauth2_device_auth_error, oauth2_device_code_to_token, oauth2_device_code_to_token_error, oauth2_device_verify_user_code, oauth2_device_verify_user_code_error, oauth2_extension_grant, oauth2_extension_grant_error, permission_token, permission_token_error, pushed_authorization_request, pushed_authorization_request_error, refresh_token, refresh_token_error, register, register_error, register_node, register_node_error, remove_credential, remove_credential_error, remove_federated_identity, remove_federated_identity_error, remove_totp, remove_totp_error, reset_password, reset_password_error, restart_authentication, restart_authentication_error, revoke_grant, revoke_grant_error, send_identity_provider_link, send_identity_provider_link_error, send_reset_password, send_reset_password_error, send_verify_email, send_verify_email_error, token_exchange, token_exchange_error, unregister_node, unregister_node_error, update_consent, update_consent_error, update_credential, update_credential_error, update_email, update_email_error, update_password, update_password_error, update_profile, update_profile_error, update_totp, update_totp_error, user_disabled_by_permanent_lockout, user_disabled_by_permanent_lockout_error, user_disabled_by_temporary_lockout, user_disabled_by_temporary_lockout_error, user_info_request, user_info_request_error, user_session_deleted, user_session_deleted_error, validate_access_token, validate_access_token_error, verifiable_credential_create_offer, verifiable_credential_create_offer_error, verifiable_credential_nonce_request, verifiable_credential_nonce_request_error, verifiable_credential_offer_request, verifiable_credential_offer_request_error, verifiable_credential_pre_authorized_grant, verifiable_credential_pre_authorized_grant_error, verifiable_credential_request, verifiable_credential_request_error, verify_email, verify_email_error, verify_profile, verify_profile_error | |
spi-events-listener--email--include-eventsA comma-separated list of events that should be sent via email to the user’s account. CLI: --spi-events-listener--email--include-eventsEnv: KC_SPI_EVENTS_LISTENER__EMAIL__INCLUDE_EVENTS | authreqid_to_token, authreqid_to_token_error, client_delete, client_delete_error, client_info, client_info_error, client_initiated_account_linking, client_initiated_account_linking_error, client_login, client_login_error, client_register, client_register_error, client_update, client_update_error, code_to_token, code_to_token_error, custom_required_action, custom_required_action_error, delete_account, delete_account_error, execute_action_token, execute_action_token_error, execute_actions, execute_actions_error, federated_identity_link, federated_identity_link_error, federated_identity_override_link, federated_identity_override_link_error, grant_consent, grant_consent_error, identity_provider_first_login, identity_provider_first_login_error, identity_provider_link_account, identity_provider_link_account_error, identity_provider_login, identity_provider_login_error, identity_provider_post_login, identity_provider_post_login_error, identity_provider_response, identity_provider_response_error, identity_provider_retrieve_token, identity_provider_retrieve_token_error, impersonate, impersonate_error, introspect_token, introspect_token_error, invalid_signature, invalid_signature_error, invite_org, invite_org_error, jwt_authorization_grant, jwt_authorization_grant_error, login, login_error, logout, logout_error, oauth2_device_auth, oauth2_device_auth_error, oauth2_device_code_to_token, oauth2_device_code_to_token_error, oauth2_device_verify_user_code, oauth2_device_verify_user_code_error, oauth2_extension_grant, oauth2_extension_grant_error, permission_token, permission_token_error, pushed_authorization_request, pushed_authorization_request_error, refresh_token, refresh_token_error, register, register_error, register_node, register_node_error, remove_credential, remove_credential_error, remove_federated_identity, remove_federated_identity_error, remove_totp, remove_totp_error, reset_password, reset_password_error, restart_authentication, restart_authentication_error, revoke_grant, revoke_grant_error, send_identity_provider_link, send_identity_provider_link_error, send_reset_password, send_reset_password_error, send_verify_email, send_verify_email_error, token_exchange, token_exchange_error, unregister_node, unregister_node_error, update_consent, update_consent_error, update_credential, update_credential_error, update_email, update_email_error, update_password, update_password_error, update_profile, update_profile_error, update_totp, update_totp_error, user_disabled_by_permanent_lockout, user_disabled_by_permanent_lockout_error, user_disabled_by_temporary_lockout, user_disabled_by_temporary_lockout_error, user_info_request, user_info_request_error, user_session_deleted, user_session_deleted_error, validate_access_token, validate_access_token_error, verifiable_credential_create_offer, verifiable_credential_create_offer_error, verifiable_credential_nonce_request, verifiable_credential_nonce_request_error, verifiable_credential_offer_request, verifiable_credential_offer_request_error, verifiable_credential_pre_authorized_grant, verifiable_credential_pre_authorized_grant_error, verifiable_credential_request, verifiable_credential_request_error, verify_email, verify_email_error, verify_profile, verify_profile_error | All events |
jboss-logging
| Option | Type or Values | Default |
|---|---|---|
spi-events-listener--jboss-logging--error-levelThe log level for error messages. CLI: --spi-events-listener--jboss-logging--error-levelEnv: KC_SPI_EVENTS_LISTENER__JBOSS_LOGGING__ERROR_LEVEL | debug, error, fatal, info, trace, warn | warn |
spi-events-listener--jboss-logging--include-representationWhen "true" the "representation" field with the JSON admin object is also added to the message. The realm should be also configured to include representation for the admin events. CLI: --spi-events-listener--jboss-logging--include-representationEnv: KC_SPI_EVENTS_LISTENER__JBOSS_LOGGING__INCLUDE_REPRESENTATION | true, false | false |
spi-events-listener--jboss-logging--quotesThe quotes to use for values, it should be one character like " or '. Use "none" if quotes are not needed. CLI: --spi-events-listener--jboss-logging--quotesEnv: KC_SPI_EVENTS_LISTENER__JBOSS_LOGGING__QUOTES | string | " |
spi-events-listener--jboss-logging--sanitizeIf true the log messages are sanitized to avoid line breaks. If false messages are not sanitized. CLI: --spi-events-listener--jboss-logging--sanitizeEnv: KC_SPI_EVENTS_LISTENER__JBOSS_LOGGING__SANITIZE | true, false | true |
spi-events-listener--jboss-logging--success-levelThe log level for success messages. CLI: --spi-events-listener--jboss-logging--success-levelEnv: KC_SPI_EVENTS_LISTENER__JBOSS_LOGGING__SUCCESS_LEVEL | debug, error, fatal, info, trace, warn | debug |
export
dir
| Option | Type or Values | Default |
|---|---|---|
spi-export--dir--dirDirectory to export to CLI: --spi-export--dir--dirEnv: KC_SPI_EXPORT__DIR__DIR | string | |
spi-export--dir--realm-nameRealm to export CLI: --spi-export--dir--realm-nameEnv: KC_SPI_EXPORT__DIR__REALM_NAME | string | |
spi-export--dir--users-export-strategyUsers export strategy CLI: --spi-export--dir--users-export-strategyEnv: KC_SPI_EXPORT__DIR__USERS_EXPORT_STRATEGY | string | DIFFERENT_FILES |
spi-export--dir--users-per-fileUsers per exported file CLI: --spi-export--dir--users-per-fileEnv: KC_SPI_EXPORT__DIR__USERS_PER_FILE | int | 50 |
single-file
| Option | Type or Values | Default |
|---|---|---|
spi-export--single-file--fileFile to export to CLI: --spi-export--single-file--fileEnv: KC_SPI_EXPORT__SINGLE_FILE__FILE | string | |
spi-export--single-file--realm-nameRealm to export CLI: --spi-export--single-file--realm-nameEnv: KC_SPI_EXPORT__SINGLE_FILE__REALM_NAME | string |
group
jpa
| Option | Type or Values | Default |
|---|---|---|
spi-group--jpa--escape-slashes-in-group-pathIf true slashes / in group names are escaped with the character ~ when converted to paths. CLI: --spi-group--jpa--escape-slashes-in-group-pathEnv: KC_SPI_GROUP__JPA__ESCAPE_SLASHES_IN_GROUP_PATH | true, false | false |
spi-group--jpa--searchable-attributesThe list of attributes separated by comma that are allowed in client attribute searches. CLI: --spi-group--jpa--searchable-attributesEnv: KC_SPI_GROUP__JPA__SEARCHABLE_ATTRIBUTES | string |
import
dir
| Option | Type or Values | Default |
|---|---|---|
spi-import--dir--dirDirectory to import from CLI: --spi-import--dir--dirEnv: KC_SPI_IMPORT__DIR__DIR | string | |
spi-import--dir--realm-nameRealm to export CLI: --spi-import--dir--realm-nameEnv: KC_SPI_IMPORT__DIR__REALM_NAME | string | |
spi-import--dir--strategyStrategy for import: IGNORE_EXISTING, OVERWRITE_EXISTING CLI: --spi-import--dir--strategyEnv: KC_SPI_IMPORT__DIR__STRATEGY | string |
single-file
| Option | Type or Values | Default |
|---|---|---|
spi-import--single-file--fileFile to import from CLI: --spi-import--single-file--fileEnv: KC_SPI_IMPORT__SINGLE_FILE__FILE | string | |
spi-import--single-file--realm-nameRealm to export CLI: --spi-import--single-file--realm-nameEnv: KC_SPI_IMPORT__SINGLE_FILE__REALM_NAME | string | |
spi-import--single-file--strategyStrategy for import: IGNORE_EXISTING, OVERWRITE_EXISTING CLI: --spi-import--single-file--strategyEnv: KC_SPI_IMPORT__SINGLE_FILE__STRATEGY | string |
jgroups-mtls
default
| Option | Type or Values | Default |
|---|---|---|
spi-jgroups-mtls--default--enabledEncrypts the network communication between NQRust-Identity servers. If no additional parameters about a keystore and truststore are provided, ephemeral key pairs and certificates are created and rotated automatically, which is recommended for standard setups. CLI: --spi-jgroups-mtls--default--enabledEnv: KC_SPI_JGROUPS_MTLS__DEFAULT__ENABLED | true, false | true |
spi-jgroups-mtls--default--keystore-fileThe Keystore file path. The Keystore must contain the certificate to use by the TLS protocol. By default, it looks up cache-mtls-keystore.p12 under conf/ directory.CLI: --spi-jgroups-mtls--default--keystore-fileEnv: KC_SPI_JGROUPS_MTLS__DEFAULT__KEYSTORE_FILE | String | |
spi-jgroups-mtls--default--keystore-passwordThe password to access the Keystore. CLI: --spi-jgroups-mtls--default--keystore-passwordEnv: KC_SPI_JGROUPS_MTLS__DEFAULT__KEYSTORE_PASSWORD | Password | |
spi-jgroups-mtls--default--rotationRotation period in days of automatic JGroups MTLS certificates. CLI: --spi-jgroups-mtls--default--rotationEnv: KC_SPI_JGROUPS_MTLS__DEFAULT__ROTATION | Integer | 30 |
spi-jgroups-mtls--default--truststore-fileThe Truststore file path. It should contain the trusted certificates or the Certificate Authority that signed the certificates. By default, it lookup cache-mtls-truststore.p12 under conf/ directory.CLI: --spi-jgroups-mtls--default--truststore-fileEnv: KC_SPI_JGROUPS_MTLS__DEFAULT__TRUSTSTORE_FILE | String | |
spi-jgroups-mtls--default--truststore-passwordThe password to access the Truststore. CLI: --spi-jgroups-mtls--default--truststore-passwordEnv: KC_SPI_JGROUPS_MTLS__DEFAULT__TRUSTSTORE_PASSWORD | Password |
load-balancer-check
remote
| Option | Type or Values | Default |
|---|---|---|
spi-load-balancer-check--remote--poll-intervalThe Remote caches poll interval, in milliseconds, for connection availability CLI: --spi-load-balancer-check--remote--poll-intervalEnv: KC_SPI_LOAD_BALANCER_CHECK__REMOTE__POLL_INTERVAL | int | 5000 |
login-protocol
openid-connect
| Option | Type or Values | Default |
|---|---|---|
spi-login-protocol--openid-connect--add-req-params-fail-fastWhether the fail-fast strategy should be enforced in case if the limit for some standard OIDC parameter or additional OIDC parameter is not met for the parameters sent to the OIDC authentication or token endpoints. If false, then all additional request parameters to not meet the configuration are silently ignored. If true, an exception will be raised and request to the OIDC authentication or token endpoints will not be allowed. CLI: --spi-login-protocol--openid-connect--add-req-params-fail-fastEnv: KC_SPI_LOGIN_PROTOCOL__OPENID_CONNECT__ADD_REQ_PARAMS_FAIL_FAST | true, false | false |
spi-login-protocol--openid-connect--add-req-params-max-numberMaximum number of additional request parameters sent to the OIDC authentication or token endpoints. As 'additional request parameter' is meant some custom parameter not directly treated as standard OIDC/OAuth2 protocol parameter. Additional parameters might be useful for example to add custom claims to the OIDC token (in case that also particular protocol mappers are configured). CLI: --spi-login-protocol--openid-connect--add-req-params-max-numberEnv: KC_SPI_LOGIN_PROTOCOL__OPENID_CONNECT__ADD_REQ_PARAMS_MAX_NUMBER | int | 5 |
spi-login-protocol--openid-connect--add-req-params-max-overall-sizeMaximum size of all additional request parameters values together. See add-req-params-max-number for more details about additional request parametersCLI: --spi-login-protocol--openid-connect--add-req-params-max-overall-sizeEnv: KC_SPI_LOGIN_PROTOCOL__OPENID_CONNECT__ADD_REQ_PARAMS_MAX_OVERALL_SIZE | int | 2147483647 |
spi-login-protocol--openid-connect--add-req-params-max-sizeMaximum size of single additional request parameter value See add-req-params-max-number for more details about additional request parameters CLI: --spi-login-protocol--openid-connect--add-req-params-max-sizeEnv: KC_SPI_LOGIN_PROTOCOL__OPENID_CONNECT__ADD_REQ_PARAMS_MAX_SIZE | int | 2000 |
spi-login-protocol--openid-connect--req-params-default-max-sizeMaximum default length of the standard OIDC parameter sent to the OIDC authentication or token endpoints. This applies to most of the standard parameters like for example state, nonce etc. The exception is login_hint parameter, which has maximum length of 255 characters.CLI: --spi-login-protocol--openid-connect--req-params-default-max-sizeEnv: KC_SPI_LOGIN_PROTOCOL__OPENID_CONNECT__REQ_PARAMS_DEFAULT_MAX_SIZE | int | 4000 |
spi-login-protocol--openid-connect--req-params-max-size--login_hintMaximum length of the standard parameter sent to OIDC authentication or token endpoints overriden for the specified parameter. Useful if some standard OIDC parameter should have different limit than req-params-default-max-size. It is needed to add the name of the parameter after this prefix into the configuration. In this example, the login_hint parameter is used, but this format is supported for any known standard OIDC/OAuth2 parameter.CLI: --spi-login-protocol--openid-connect--req-params-max-size--login_hintEnv: KC_SPI_LOGIN_PROTOCOL__OPENID_CONNECT__REQ_PARAMS_MAX_SIZE__LOGIN_HINT | int |
saml
| Option | Type or Values | Default |
|---|---|---|
spi-login-protocol--saml--max-inflating-sizeThe maximum inflating size in bytes for the REDIRECT binding. CLI: --spi-login-protocol--saml--max-inflating-sizeEnv: KC_SPI_LOGIN_PROTOCOL__SAML__MAX_INFLATING_SIZE | long | 131072 |
login-failure
remote
| Option | Type or Values | Default |
|---|---|---|
spi-login-failure--remote--max-retriesThe maximum number of retries if an error occurs. A value of zero or less disable any retries. CLI: --spi-login-failure--remote--max-retriesEnv: KC_SPI_LOGIN_FAILURE__REMOTE__MAX_RETRIES | int | 10 |
spi-login-failure--remote--retry-base-timeThe base back-off time in milliseconds. CLI: --spi-login-failure--remote--retry-base-timeEnv: KC_SPI_LOGIN_FAILURE__REMOTE__RETRY_BASE_TIME | int | 10 |
mapped-diagnostic-context
default
| Option | Type or Values | Default |
|---|---|---|
spi-mapped-diagnostic-context--default--mdc-keysComma-separated list of MDC keys to add to the Mapped Diagnostic Context. CLI: --spi-mapped-diagnostic-context--default--mdc-keysEnv: KC_SPI_MAPPED_DIAGNOSTIC_CONTEXT__DEFAULT__MDC_KEYS | realmName, clientId, userId, ipAddress, org, sessionId, authenticationSessionId, authenticationTabId |
password-hashing
argon2
| Option | Type or Values | Default |
|---|---|---|
spi-password-hashing--argon2--cpu-coresMaximum parallel CPU cores to use for hashing CLI: --spi-password-hashing--argon2--cpu-coresEnv: KC_SPI_PASSWORD_HASHING__ARGON2__CPU_CORES | int | |
spi-password-hashing--argon2--hash-lengthHash length CLI: --spi-password-hashing--argon2--hash-lengthEnv: KC_SPI_PASSWORD_HASHING__ARGON2__HASH_LENGTH | int | 32 |
spi-password-hashing--argon2--iterationsIterations CLI: --spi-password-hashing--argon2--iterationsEnv: KC_SPI_PASSWORD_HASHING__ARGON2__ITERATIONS | int | 5 |
spi-password-hashing--argon2--memoryMemory size (KB) CLI: --spi-password-hashing--argon2--memoryEnv: KC_SPI_PASSWORD_HASHING__ARGON2__MEMORY | int | 7168 |
spi-password-hashing--argon2--parallelismParallelism CLI: --spi-password-hashing--argon2--parallelismEnv: KC_SPI_PASSWORD_HASHING__ARGON2__PARALLELISM | int | 1 |
spi-password-hashing--argon2--typeType CLI: --spi-password-hashing--argon2--typeEnv: KC_SPI_PASSWORD_HASHING__ARGON2__TYPE | id, d, i | id |
spi-password-hashing--argon2--versionVersion CLI: --spi-password-hashing--argon2--versionEnv: KC_SPI_PASSWORD_HASHING__ARGON2__VERSION | 1.3, 1.0 | 1.3 |
password-policy
password-blacklist
| Option | Type or Values | Default |
|---|---|---|
spi-password-policy--password-blacklist--check-interval-secondsInterval in number of seconds when the server should check the password file for changes and reload it. Set to 0 to disable reloading. CLI: --spi-password-policy--password-blacklist--check-interval-secondsEnv: KC_SPI_PASSWORD_POLICY__PASSWORD_BLACKLIST__CHECK_INTERVAL_SECONDS | string | 60 |
spi-password-policy--password-blacklist--false-positive-probabilityFalse positive probability of the bloom filter to reject a valid password. CLI: --spi-password-policy--password-blacklist--false-positive-probabilityEnv: KC_SPI_PASSWORD_POLICY__PASSWORD_BLACKLIST__FALSE_POSITIVE_PROBABILITY | string | 0.0001 |
public-key-storage
infinispan
| Option | Type or Values | Default |
|---|---|---|
spi-public-key-storage--infinispan--max-cache-timeMaximum interval in seconds that keys are cached when they are retrieved via all keys methods. When all keys for the entry are retrieved there is no way to detect if a key is missing (different to the case when the key is retrieved via ID for example). In that situation this option forces a refresh from time to time. This time can be overriden by the protocol (for example using cacheDuration or validUntil in the SAML descriptor). Default 24 hours. CLI: --spi-public-key-storage--infinispan--max-cache-timeEnv: KC_SPI_PUBLIC_KEY_STORAGE__INFINISPAN__MAX_CACHE_TIME | int | 86400 |
spi-public-key-storage--infinispan--min-time-between-requestsMinimum interval in seconds between two requests to retrieve the new public keys. The server will always try to download new public keys when a single key is requested and not found. However it will avoid the download if the previous refresh was done less than 10 seconds ago (by default). This behavior is used to avoid DoS attacks against the external keys endpoint. CLI: --spi-public-key-storage--infinispan--min-time-between-requestsEnv: KC_SPI_PUBLIC_KEY_STORAGE__INFINISPAN__MIN_TIME_BETWEEN_REQUESTS | int | 10 |
required-action
CONFIGURE_RECOVERY_AUTHN_CODES
| Option | Type or Values | Default |
|---|---|---|
spi-required-action--CONFIGURE_RECOVERY_AUTHN_CODES--max_auth_ageConfigures the duration in seconds this action can be used after the last authentication before the user is required to re-authenticate. This parameter is used just in the context of AIA when the kc_action parameter is available in the request, which is for instance when user himself updates his password in the account console. CLI: --spi-required-action--CONFIGURE_RECOVERY_AUTHN_CODES--max_auth_ageEnv: KC_SPI_REQUIRED_ACTION__CONFIGURE_RECOVERY_AUTHN_CODES__MAX_AUTH_AGE | String | 300 |
spi-required-action--CONFIGURE_RECOVERY_AUTHN_CODES--warning_thresholdWhen user has smaller amount of remaining recovery codes on his account than the value configured here, account console will show warning to the user, which will recommend him to setup new set of recovery codes. CLI: --spi-required-action--CONFIGURE_RECOVERY_AUTHN_CODES--warning_thresholdEnv: KC_SPI_REQUIRED_ACTION__CONFIGURE_RECOVERY_AUTHN_CODES__WARNING_THRESHOLD | Integer | 4 |
CONFIGURE_TOTP
| Option | Type or Values | Default |
|---|---|---|
spi-required-action--CONFIGURE_TOTP--add-recovery-codesIf this option is enabled, the user will be required to configure recovery codes following the OTP configuration. If the user already has recovery codes configured, NQRust-Identity will not ask for setting them up. As a prerequisite, enable the recovery codes required action and enable recovery codes in your authentication flow. CLI: --spi-required-action--CONFIGURE_TOTP--add-recovery-codesEnv: KC_SPI_REQUIRED_ACTION__CONFIGURE_TOTP__ADD_RECOVERY_CODES | true, false | false |
spi-required-action--CONFIGURE_TOTP--max_auth_ageConfigures the duration in seconds this action can be used after the last authentication before the user is required to re-authenticate. This parameter is used just in the context of AIA when the kc_action parameter is available in the request, which is for instance when user himself updates his password in the account console. CLI: --spi-required-action--CONFIGURE_TOTP--max_auth_ageEnv: KC_SPI_REQUIRED_ACTION__CONFIGURE_TOTP__MAX_AUTH_AGE | String | 300 |
TERMS_AND_CONDITIONS
| Option | Type or Values | Default |
|---|---|---|
spi-required-action--TERMS_AND_CONDITIONS--max_auth_ageConfigures the duration in seconds this action can be used after the last authentication before the user is required to re-authenticate. This parameter is used just in the context of AIA when the kc_action parameter is available in the request, which is for instance when user himself updates his password in the account console. CLI: --spi-required-action--TERMS_AND_CONDITIONS--max_auth_ageEnv: KC_SPI_REQUIRED_ACTION__TERMS_AND_CONDITIONS__MAX_AUTH_AGE | String | 300 |
UPDATE_EMAIL
| Option | Type or Values | Default |
|---|---|---|
spi-required-action--UPDATE_EMAIL--email-resend-cooldown-secondsMinimum delay in seconds before another email verification email can be sent. CLI: --spi-required-action--UPDATE_EMAIL--email-resend-cooldown-secondsEnv: KC_SPI_REQUIRED_ACTION__UPDATE_EMAIL__EMAIL_RESEND_COOLDOWN_SECONDS | String | 30 |
spi-required-action--UPDATE_EMAIL--max_auth_ageConfigures the duration in seconds this action can be used after the last authentication before the user is required to re-authenticate. This parameter is used just in the context of AIA when the kc_action parameter is available in the request, which is for instance when user himself updates his password in the account console. CLI: --spi-required-action--UPDATE_EMAIL--max_auth_ageEnv: KC_SPI_REQUIRED_ACTION__UPDATE_EMAIL__MAX_AUTH_AGE | String | 300 |
spi-required-action--UPDATE_EMAIL--verify-emailIf enabled, the user will be forced to verify the email regardless if email verification is enabled at the realm level or not. Otherwise, verification will be based on the realm level setting. CLI: --spi-required-action--UPDATE_EMAIL--verify-emailEnv: KC_SPI_REQUIRED_ACTION__UPDATE_EMAIL__VERIFY_EMAIL | true, false | false |
UPDATE_PASSWORD
| Option | Type or Values | Default |
|---|---|---|
spi-required-action--UPDATE_PASSWORD--max_auth_ageConfigures the duration in seconds this action can be used after the last authentication before the user is required to re-authenticate. This parameter is used just in the context of AIA when the kc_action parameter is available in the request, which is for instance when user himself updates his password in the account console. CLI: --spi-required-action--UPDATE_PASSWORD--max_auth_ageEnv: KC_SPI_REQUIRED_ACTION__UPDATE_PASSWORD__MAX_AUTH_AGE | String | 300 |
UPDATE_PROFILE
| Option | Type or Values | Default |
|---|---|---|
spi-required-action--UPDATE_PROFILE--max_auth_ageConfigures the duration in seconds this action can be used after the last authentication before the user is required to re-authenticate. This parameter is used just in the context of AIA when the kc_action parameter is available in the request, which is for instance when user himself updates his password in the account console. CLI: --spi-required-action--UPDATE_PROFILE--max_auth_ageEnv: KC_SPI_REQUIRED_ACTION__UPDATE_PROFILE__MAX_AUTH_AGE | String | 300 |
VERIFY_EMAIL
| Option | Type or Values | Default |
|---|---|---|
spi-required-action--VERIFY_EMAIL--email-resend-cooldown-secondsMinimum delay in seconds before another email verification email can be sent. CLI: --spi-required-action--VERIFY_EMAIL--email-resend-cooldown-secondsEnv: KC_SPI_REQUIRED_ACTION__VERIFY_EMAIL__EMAIL_RESEND_COOLDOWN_SECONDS | String | 30 |
spi-required-action--VERIFY_EMAIL--max_auth_ageConfigures the duration in seconds this action can be used after the last authentication before the user is required to re-authenticate. This parameter is used just in the context of AIA when the kc_action parameter is available in the request, which is for instance when user himself updates his password in the account console. CLI: --spi-required-action--VERIFY_EMAIL--max_auth_ageEnv: KC_SPI_REQUIRED_ACTION__VERIFY_EMAIL__MAX_AUTH_AGE | String | 300 |
VERIFY_PROFILE
| Option | Type or Values | Default |
|---|---|---|
spi-required-action--VERIFY_PROFILE--max_auth_ageConfigures the duration in seconds this action can be used after the last authentication before the user is required to re-authenticate. This parameter is used just in the context of AIA when the kc_action parameter is available in the request, which is for instance when user himself updates his password in the account console. CLI: --spi-required-action--VERIFY_PROFILE--max_auth_ageEnv: KC_SPI_REQUIRED_ACTION__VERIFY_PROFILE__MAX_AUTH_AGE | String | 300 |
delete_credential
| Option | Type or Values | Default |
|---|---|---|
spi-required-action--delete_credential--max_auth_ageConfigures the duration in seconds this action can be used after the last authentication before the user is required to re-authenticate. This parameter is used just in the context of AIA when the kc_action parameter is available in the request, which is for instance when user himself updates his password in the account console. CLI: --spi-required-action--delete_credential--max_auth_ageEnv: KC_SPI_REQUIRED_ACTION__DELETE_CREDENTIAL__MAX_AUTH_AGE | String | 300 |
idp_link
| Option | Type or Values | Default |
|---|---|---|
spi-required-action--idp_link--max_auth_ageConfigures the duration in seconds this action can be used after the last authentication before the user is required to re-authenticate. This parameter is used just in the context of AIA when the kc_action parameter is available in the request, which is for instance when user himself updates his password in the account console. CLI: --spi-required-action--idp_link--max_auth_ageEnv: KC_SPI_REQUIRED_ACTION__IDP_LINK__MAX_AUTH_AGE | String | 300 |
update_user_locale
| Option | Type or Values | Default |
|---|---|---|
spi-required-action--update_user_locale--max_auth_ageConfigures the duration in seconds this action can be used after the last authentication before the user is required to re-authenticate. This parameter is used just in the context of AIA when the kc_action parameter is available in the request, which is for instance when user himself updates his password in the account console. CLI: --spi-required-action--update_user_locale--max_auth_ageEnv: KC_SPI_REQUIRED_ACTION__UPDATE_USER_LOCALE__MAX_AUTH_AGE | String | 300 |
verifiable_credential_offer
| Option | Type or Values | Default |
|---|---|---|
spi-required-action--verifiable_credential_offer--max_auth_ageConfigures the duration in seconds this action can be used after the last authentication before the user is required to re-authenticate. This parameter is used just in the context of AIA when the kc_action parameter is available in the request, which is for instance when user himself updates his password in the account console. CLI: --spi-required-action--verifiable_credential_offer--max_auth_ageEnv: KC_SPI_REQUIRED_ACTION__VERIFIABLE_CREDENTIAL_OFFER__MAX_AUTH_AGE | String | 300 |
webauthn-register
| Option | Type or Values | Default |
|---|---|---|
spi-required-action--webauthn-register--max_auth_ageConfigures the duration in seconds this action can be used after the last authentication before the user is required to re-authenticate. This parameter is used just in the context of AIA when the kc_action parameter is available in the request, which is for instance when user himself updates his password in the account console. CLI: --spi-required-action--webauthn-register--max_auth_ageEnv: KC_SPI_REQUIRED_ACTION__WEBAUTHN_REGISTER__MAX_AUTH_AGE | String | 300 |
webauthn-register-passwordless
| Option | Type or Values | Default |
|---|---|---|
spi-required-action--webauthn-register-passwordless--max_auth_ageConfigures the duration in seconds this action can be used after the last authentication before the user is required to re-authenticate. This parameter is used just in the context of AIA when the kc_action parameter is available in the request, which is for instance when user himself updates his password in the account console. CLI: --spi-required-action--webauthn-register-passwordless--max_auth_ageEnv: KC_SPI_REQUIRED_ACTION__WEBAUTHN_REGISTER_PASSWORDLESS__MAX_AUTH_AGE | String | 300 |
resource-encoding
gzip
| Option | Type or Values | Default |
|---|---|---|
spi-resource-encoding--gzip--excluded-content-typesA space separated list of content-types to exclude from encoding. CLI: --spi-resource-encoding--gzip--excluded-content-typesEnv: KC_SPI_RESOURCE_ENCODING__GZIP__EXCLUDED_CONTENT_TYPES | string | image/png image/jpeg |
security-profile
default
| Option | Type or Values | Default |
|---|---|---|
spi-security-profile--default--nameName for the security configuration file to use. File name.json is searched in classapth and conf installation folder.CLI: --spi-security-profile--default--nameEnv: KC_SPI_SECURITY_PROFILE__DEFAULT__NAME | string |
single-use-object
infinispan
| Option | Type or Values | Default |
|---|---|---|
spi-single-use-object--infinispan--persist-revoked-tokensIf revoked tokens are stored persistently across restarts CLI: --spi-single-use-object--infinispan--persist-revoked-tokensEnv: KC_SPI_SINGLE_USE_OBJECT__INFINISPAN__PERSIST_REVOKED_TOKENS | true, false | true |
remote
| Option | Type or Values | Default |
|---|---|---|
spi-single-use-object--remote--persist-revoked-tokensIf revoked tokens are stored persistently across restarts CLI: --spi-single-use-object--remote--persist-revoked-tokensEnv: KC_SPI_SINGLE_USE_OBJECT__REMOTE__PERSIST_REVOKED_TOKENS | true, false | true |
sticky-session-encoder
infinispan
| Option | Type or Values | Default |
|---|---|---|
spi-sticky-session-encoder--infinispan--should-attach-routeIf the route should be attached to cookies to reflect the node that owns a particular session. CLI: --spi-sticky-session-encoder--infinispan--should-attach-routeEnv: KC_SPI_STICKY_SESSION_ENCODER__INFINISPAN__SHOULD_ATTACH_ROUTE | true, false | true |
remote
| Option | Type or Values | Default |
|---|---|---|
spi-sticky-session-encoder--remote--should-attach-routeIf the route should be attached to cookies to reflect the node that owns a particular session. CLI: --spi-sticky-session-encoder--remote--should-attach-routeEnv: KC_SPI_STICKY_SESSION_ENCODER__REMOTE__SHOULD_ATTACH_ROUTE | true, false | true |
storage
ldap
| Option | Type or Values | Default |
|---|---|---|
spi-storage--ldap--secure-referralAllow only secure LDAP referrals (deprecated) CLI: --spi-storage--ldap--secure-referralEnv: KC_SPI_STORAGE__LDAP__SECURE_REFERRAL | true, false | true |
truststore
file
| Option | Type or Values | Default |
|---|---|---|
spi-truststore--file--fileDEPRECATED: The file path of the trust store from where the certificates are going to be read from to validate TLS connections. CLI: --spi-truststore--file--fileEnv: KC_SPI_TRUSTSTORE__FILE__FILE | string | |
spi-truststore--file--hostname-verification-policyDEPRECATED: The hostname verification policy. CLI: --spi-truststore--file--hostname-verification-policyEnv: KC_SPI_TRUSTSTORE__FILE__HOSTNAME_VERIFICATION_POLICY | ANY, WILDCARD, STRICT, DEFAULT | DEFAULT |
spi-truststore--file--passwordDEPRECATED: The trust store password. CLI: --spi-truststore--file--passwordEnv: KC_SPI_TRUSTSTORE__FILE__PASSWORD | string | |
spi-truststore--file--typeDEPRECATED: Type of the truststore. If not provided, the type would be detected based on the truststore file extension or platform default type. CLI: --spi-truststore--file--typeEnv: KC_SPI_TRUSTSTORE__FILE__TYPE | string |
user-profile
declarative-user-profile
| Option | Type or Values | Default |
|---|---|---|
spi-user-profile--declarative-user-profile--admin-read-only-attributesArray of regular expressions to identify fields that should be treated read-only so administrators can’t change them. CLI: --spi-user-profile--declarative-user-profile--admin-read-only-attributesEnv: KC_SPI_USER_PROFILE__DECLARATIVE_USER_PROFILE__ADMIN_READ_ONLY_ATTRIBUTES | MultivaluedString | |
spi-user-profile--declarative-user-profile--max-email-local-part-lengthTo set user profile max email local part length CLI: --spi-user-profile--declarative-user-profile--max-email-local-part-lengthEnv: KC_SPI_USER_PROFILE__DECLARATIVE_USER_PROFILE__MAX_EMAIL_LOCAL_PART_LENGTH | String | |
spi-user-profile--declarative-user-profile--read-only-attributesArray of regular expressions to identify fields that should be treated read-only so users can’t change them. CLI: --spi-user-profile--declarative-user-profile--read-only-attributesEnv: KC_SPI_USER_PROFILE__DECLARATIVE_USER_PROFILE__READ_ONLY_ATTRIBUTES | MultivaluedString |
user-session-persister
jpa
| Option | Type or Values | Default |
|---|---|---|
spi-user-session-persister--jpa--expiration-batchSets the size of the expiration batch, i. e., the number of expired sessions to remove per delete statement. CLI: --spi-user-session-persister--jpa--expiration-batchEnv: KC_SPI_USER_SESSION_PERSISTER__JPA__EXPIRATION_BATCH | Integer | 512 |
user-sessions
infinispan
| Option | Type or Values | Default |
|---|---|---|
spi-user-sessions--infinispan--max-batch-sizeMaximum size of a batch (only applicable to persistent sessions CLI: --spi-user-sessions--infinispan--max-batch-sizeEnv: KC_SPI_USER_SESSIONS__INFINISPAN__MAX_BATCH_SIZE | int | 4 |
spi-user-sessions--infinispan--offline-client-session-cache-entry-lifespan-overrideOverride how long offline client sessions should be kept in memory in seconds (deprecated, to be removed in NQRust-Identity 27) CLI: --spi-user-sessions--infinispan--offline-client-session-cache-entry-lifespan-overrideEnv: KC_SPI_USER_SESSIONS__INFINISPAN__OFFLINE_CLIENT_SESSION_CACHE_ENTRY_LIFESPAN_OVERRIDE | int | |
spi-user-sessions--infinispan--offline-session-cache-entry-lifespan-overrideOverride how long offline user sessions should be kept in memory in seconds (deprecated, to be removed in NQRust-Identity 27) CLI: --spi-user-sessions--infinispan--offline-session-cache-entry-lifespan-overrideEnv: KC_SPI_USER_SESSIONS__INFINISPAN__OFFLINE_SESSION_CACHE_ENTRY_LIFESPAN_OVERRIDE | int | |
spi-user-sessions--infinispan--session-expiration-periodSets the expiration task run period, to remove the expired session. CLI: --spi-user-sessions--infinispan--session-expiration-periodEnv: KC_SPI_USER_SESSIONS__INFINISPAN__SESSION_EXPIRATION_PERIOD | int | |
spi-user-sessions--infinispan--use-batchesEnable or disable batch writes to the database. Enabled by default with the persistent-user-sessions Feature CLI: --spi-user-sessions--infinispan--use-batchesEnv: KC_SPI_USER_SESSIONS__INFINISPAN__USE_BATCHES | true, false | false |
spi-user-sessions--infinispan--use-cachesEnable or disable caches. Enabled by default unless the external feature to use only external remote caches is used CLI: --spi-user-sessions--infinispan--use-cachesEnv: KC_SPI_USER_SESSIONS__INFINISPAN__USE_CACHES | true, false |
remote
| Option | Type or Values | Default |
|---|---|---|
spi-user-sessions--remote--batch-sizeBatch size when streaming session from the remote cache CLI: --spi-user-sessions--remote--batch-sizeEnv: KC_SPI_USER_SESSIONS__REMOTE__BATCH_SIZE | int | 1024 |
spi-user-sessions--remote--max-retriesThe maximum number of retries if an error occurs. A value of zero or less disable any retries. CLI: --spi-user-sessions--remote--max-retriesEnv: KC_SPI_USER_SESSIONS__REMOTE__MAX_RETRIES | int | 10 |
spi-user-sessions--remote--retry-base-timeThe base back-off time in milliseconds. CLI: --spi-user-sessions--remote--retry-base-timeEnv: KC_SPI_USER_SESSIONS__REMOTE__RETRY_BASE_TIME | int | 10 |
well-known
oauth-authorization-server
| Option | Type or Values | Default |
|---|---|---|
spi-well-known--oauth-authorization-server--include-client-scopesIf client scopes should be used to calculate the list of supported scopes. CLI: --spi-well-known--oauth-authorization-server--include-client-scopesEnv: KC_SPI_WELL_KNOWN__OAUTH_AUTHORIZATION_SERVER__INCLUDE_CLIENT_SCOPES | true, false | true |
spi-well-known--oauth-authorization-server--openid-configuration-overrideThe file path from where the metadata should be loaded from. You can use an absolute file path or, if the file is in the server classpath, use the classpath: prefix to load the file from the classpath.CLI: --spi-well-known--oauth-authorization-server--openid-configuration-overrideEnv: KC_SPI_WELL_KNOWN__OAUTH_AUTHORIZATION_SERVER__OPENID_CONFIGURATION_OVERRIDE | string |
openid-configuration
| Option | Type or Values | Default |
|---|---|---|
spi-well-known--openid-configuration--include-client-scopesIf client scopes should be used to calculate the list of supported scopes. CLI: --spi-well-known--openid-configuration--include-client-scopesEnv: KC_SPI_WELL_KNOWN__OPENID_CONFIGURATION__INCLUDE_CLIENT_SCOPES | true, false | true |
spi-well-known--openid-configuration--openid-configuration-overrideThe file path from where the metadata should be loaded from. You can use an absolute file path or, if the file is in the server classpath, use the classpath: prefix to load the file from the classpath.CLI: --spi-well-known--openid-configuration--openid-configuration-overrideEnv: KC_SPI_WELL_KNOWN__OPENID_CONFIGURATION__OPENID_CONFIGURATION_OVERRIDE | string |
workflow
default
| Option | Type or Values | Default |
|---|---|---|
spi-workflow--default--executor-task-timeoutThe time in milliseconds before a workflow task is marked as timed out . CLI: --spi-workflow--default--executor-task-timeoutEnv: KC_SPI_WORKFLOW__DEFAULT__EXECUTOR_TASK_TIMEOUT | long | 5000 |