Deploy-time Configuration
You can configure properties in conf/signserver_deploy.properties, which are used when deploying SignServer to the application server. The properties include settings used by the deployment script to find the application server, the database type to use, and other settings included in the deployment of the application.
The Deploy-time Configuration feature is only available for the SignServer Software Stack and Container deployments. See Installation.
See the sample configuration script conf/signserver_deploy.properties.sample for available options and default values.
To ensure that changes in signserver_deploy.properties and databasprotection.properties take effect, the application needs to be deployed again using bin/ant deploy. It is however not necessary to run bin/ant clean.
CryptoToken Configuration
Property | Default | Description |
|---|---|---|
cryptotoken.disablekeygeneration | false | Disable the key generation functionality for all crypto tokens. With this property set to true, worker key renewal and key generation operations in crypto tokens are being denied with the error message "Key generation has been disabled". Additionally, the key generation pages in Admin Web are disabled. |
Database Configuration
Property | Default | Description |
|---|---|---|
database.hibernate.disable.cache | false | Disable the hibernate L2 (Second-level) and query cache. With this property set to true, the SignServerJPA and EJBCA persistence units will be deployed with some extra elements to disable the L2 and query cache. The elements added are:
CODE
The results of disabling the L2 and query cache have not been tested, but it is expected to have a negative impact on performance. |
Allowlist Configuration
Property | Description |
|---|---|
pdfsigner.archive.path.allowed.X | There is the possibility of archiving signed documents in the local file system, see the ARCHIVETODISK properties in PDF Signer. To do so, you must also configure the Example:
CODE
|
pdfsigner.image.path.allowed.X | There is the possibility of specifying a visible signature image using a file path (for example, using VISIBLE_SIGNATURE_CUSTOM_IMAGE_PATH or VISIBLE_SIGNATURE_IMAGE_PATH) in the PDF Signer or AdES Signer. To do so, you must also configure the Example:
CODE
|
signerstatusreportworker.outputfile.path.allowed.X | Specify the path entry to use for the Signer Status Report Timed Service. Configure the outputfile path where the report is stored:
|
keystorecryptotoken.keystore.path.allowed.X | Specify the path entry to use for the Keystore Crypto Token. Configure the keystore path where the keystore file is stored:
|
renewalworker.truststore.path.allowed.X | Specify the path entry to use for the Renewal Worker. Configure the truststore path where the CA’s SSL server certificate is stored:
|
legacypkcs11cryptotoken.attributesfile.path.allowed.X | Specify the path entry to use for the PKCS#11 Crypto Token. Configure the attributesfile path where the file with PKCS#11 attributes is stored:
|
Worker ID Configuration
Property | Default | Description |
|---|---|---|
workerids.genid.start | 1 | Specifies the starting number for auto-generated worker IDs. When adding a new worker using a placeholder (such as This property is useful for reserving specific ID ranges for manual assignment while allowing auto-generated workers to start from a higher, non-conflicting offset. Example:
CODE
|
workerids.readonly | Empty | Enables workers to be read-only through the remote interfaces such as REST API, Admin WS, or the Admin Web. Setting this property means that the worker IDs listed cannot be edited. This includes removing or adding a worker within the specified range. Changes using Admin CLI are still allowed. This property allows multiple ranges which can be specified using a comma as the delimiter. Example:
CODE
|
Allow Any Configuration
Property | Default | Description |
|---|---|---|
admin.allowany.enabled | true | Enables or disables using ALLOW ANY as an authorization mode for administrators. Setting this property to true, or unconfigured, permits ALLOW ANY usage in the SignServer deployment. When the use of ALLOW ANY is enabled, users can perform admin actions without being listed as an administrator. Setting this property to false disables ALLOW ANY and any associated functionality with its configuration. This includes editing the Global Configuration value of ALLOW ANY to true, switching from ONLY LISTED to ALLOW ANY on the Administrators Page, or removing the ALLOW ANY configuration. For more information on ALLOW ANY, see Administrators Page. |