| # Krill settings |
| # |
| krill.indexDir = ../sample-index |
| |
| krill.index.commit.count = 134217000 |
| krill.index.commit.log = log/krill.commit.log |
| krill.index.commit.auto = 500 |
| krill.index.relations.max = 100 |
| # Directory path of virtual corpora to cache |
| krill.namedVC = vc |
| krill.test = true |
| |
| # LDAP configuration file |
| # |
| ldap.config = src/test/resources/test-ldap.conf |
| |
| # Kustvakt versions |
| # |
| # multiple versions separated by space |
| current.api.version = v1.0 |
| supported.api.version = v0.1 v1.0 |
| |
| # Server |
| # |
| server.port=8089 |
| server.host=localhost |
| |
| # Mail settings |
| # |
| mail.enabled = false |
| mail.receiver = test@localhost |
| mail.sender = noreply@ids-mannheim.de |
| mail.address.retrieval = test |
| |
| # Mail.templates |
| # |
| template.group.invitation = notification.vm |
| |
| # Default foundries for specific layers (optional) |
| # |
| default.foundry.partOfSpeech = tt |
| default.foundry.lemma = tt |
| default.foundry.orthography = opennlp |
| default.foundry.dependency = malt |
| default.foundry.constituent = corenlp |
| default.foundry.morphology = marmot |
| default.foundry.surface = base |
| |
| # Delete configuration (default hard) |
| # |
| # delete.auto.group = hard |
| delete.group = soft |
| delete.group.member = soft |
| |
| # Virtual corpus and queries |
| max.user.persistent.queries = 5 |
| |
| # Availability regex only support | |
| # It should be removed/commented when the data doesn't contain availability field. |
| # |
| availability.regex.free = CC-BY.* |
| availability.regex.public = ACA.*|QAO-NC |
| availability.regex.all = QAO.* |
| |
| |
| # Define resource filters for search and match info API |
| # AuthenticationFilter activates authentication using OAuth2 tokens |
| # DemoUserFilter allows access to API without login |
| # |
| # Default values: AuthenticationFilter,DemoUserFilter |
| # |
| search.resource.filters=AuthenticationFilter,DemoUserFilter |
| |
| |
| # options referring to the security module! |
| |
| # OAuth |
| # (see de.ids_mannheim.korap.constant.AuthenticationMethod for possible |
| # oauth.password.authentication values) |
| # |
| oauth2.password.authentication = TEST |
| oauth2.native.client.host = korap.ids-mannheim.de |
| oauth2.max.attempts = 2 |
| # expiry in seconds (S), minutes (M), hours (H), days (D) |
| oauth2.access.token.expiry = 3M |
| oauth2.refresh.token.expiry = 90D |
| oauth2.authorization.code.expiry = 10M |
| # -- scopes separated by space |
| oauth2.default.scopes = search match_info |
| oauth2.client.credentials.scopes = client_info |
| |
| oauth2.initial.super.client=true |
| |
| # OpenId |
| # multiple values are separated by space |
| openid.grant.types = authorization_code |
| openid.response.types = code |
| openid.response.modes = query |
| openid.client.auth.methods = client_secret_basic client_secret_post |
| openid.token.signing.algorithms = RS256 |
| openid.subject.types = public |
| openid.display.types = page |
| openid.supported.scopes = openid email auth_time |
| openid.support.claim.param = false |
| openid.claim.types = normal |
| openid.supported.claims = iss sub aud exp iat |
| openid.ui.locales = en |
| #openid.privacy.policy = |
| #openid.term.of.service = |
| openid.service.doc = https://github.com/KorAP/Kustvakt/wiki |
| |
| # JWK |
| # must be set for openid |
| rsa.private = kustvakt_rsa.key |
| rsa.public = kustvakt_rsa_public.key |
| rsa.key.id = 74caa3a9-217c-49e6-94e9-2368fdd02c35 |
| |
| # see SecureRandom Number Generation Algorithms |
| # optional |
| security.secure.random.algorithm=SHA1PRNG |
| |
| # see MessageDigest Algorithms |
| # default MD5 |
| security.md.algoritm = SHA-256 |
| |
| # secure hash support: BCRYPT |
| security.secure.hash.algorithm=BCRYPT |
| security.encryption.loadFactor = 10 |
| |
| # DEPRECATED |
| # JWT |
| security.jwt.issuer=https://korap.ids-mannheim.de |
| security.sharedSecret=this-is-shared-secret-code-for-JWT-Signing.It-must-contains-minimum-256-bits |
| |
| # token expiration time |
| security.longTokenTTL = 1D |
| security.tokenTTL = 2S |
| security.shortTokenTTL = 1S |
| |
| # Session authentication |
| security.idleTimeoutDuration = 25M |
| security.multipleLogIn = true |
| security.loginAttemptNum = 3 |
| security.authAttemptTTL = 45M |