Skip to content

Configuration Variables

This page provides an overview of configuration variables that can be used to customize your deployment of Accurids. These variables are read from the environment when Accurids is started. There are two possible ways to start Accurids described at Installation with Docker or Installation with Kubernetes.

Variable default value Description
accurids.instance FQDN where the Accurids deployment can be reached
accurids.scheme https Whether Accurids is served with TLS
accurids.max-parallel-imports-per-node 2 Limit of concurrently running ingest pipelines
accurids.from-email Adress used in the From header field of sent mails
accurids.confirm-user-email true Determines whether new accounts must be confirmed by clicking a link in a mail sent to the registered address (only applicable for local authentication)
accurids.tree-view-child-limit 200000 Limit for the number of entities returned per level for the tree view as returned by the API
accurids.max-property-count 100 Maximum number of properties rendered on the entity details page
accurids.root-url none Path of the Accurids deployment if not at domain root
working.dir ./working-dir Working directory used for storing the database The hostname of the mail server used for sending email
spring.mail.username none Username used for authenticating with the mail server
spring.mail.password none Password used for authentication with the mail server
spring.datasource.url depending on profile Specify a JDBC URL to connect to the relational database
spring.datasource.driverClassName depending on profile Must be set to org.postgresql.Driver in cluster deployment
spring.datasource.username none Set to database username
spring.datasource.password none Set to database password localhost Elasticsearch instance to connect to
elasticsearch.cluster docker-cluster Name of the cluster as configured in Elasticsearch oauth2 See more for OAuth2 Setup
security.oauth2.token-uri none OAuth2 provider token URI
security.oauth2.auth-uri none OAuth2 provider authentication URI
security.oauth2.client-id none Application client id
security.oauth2.jwks-uri none OAuth2 provider JSON Web Key Set (JWKS) URI
security.oauth2.auth-claim authorities Claims-based identity name. Example: roles for Azure AD, authorities for Ping Identity
security.role.user ACCURIDS_USER USER role name specified during security configuration of OAuth2 application configuration
security.role.contributor ACCURIDS_CONTRIBUTOR CONTRIBUTOR role name specified during security configuration of OAuth2 application configuration
security.role.admin ACCURIDS_ADMIN ADMIN role name specified during security configuration of OAuth2 application configuration