Skip to main content
Skip table of contents

Configuration Reference

This Reference covers information on configuration options, peer systems, and the developer reference.

Highlights

Deploy-time Configuration

Information on Deploy-time Configuration properties used when deploying SignServer to the application server.

Logging

SignServer uses Log4j for debug logging and the security events logger from CESeCore for system/audit logging. In addition, the worker logger (transaction log) can be configured to use Log4j and/or the security events logger. See Logging.

Authentication and Authorization

Client Authentication and Authorization can be configured per-worker and occurs in different components as the request comes in. 

Health Check

The Health Check service is used for health monitoring and is useful for clusters.

SignServer TimeMonitor

ENTERPRISE

The external SignServer TimeMonitor application can be used together with the StatusReadingLocalComputerTimeSource for monitoring the local time and informing SignServer about its state. For more information, see SignServer TimeMonitor Application.

Peer Systems

ENTERPRISE

For more information on the SignServer support for incoming peer connections, see Peer Systems.

Key Wrapping

ENTERPRISE

Key wrapping allows solving issues arising when the number of keys you need to handle exceeds the amount that can be stored in a limited storage space for an HSM. The feature enables exporting the key material in a protected manner and storing the wrapped, encrypted key in an external database.

Developer Reference

For instructions needed for building and developing SignServer, see Developer Reference.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.