· 6 years ago · Oct 24, 2019, 11:22 AM
1<?xml version="1.0" encoding="ISO-8859-1"?>
2<!--
3 Copyright (c) 2017, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
4
5 Licensed under the Apache License, Version 2.0 (the "License");
6 you may not use this file except in compliance with the License.
7 You may obtain a copy of the License at
8
9 http://www.apache.org/licenses/LICENSE-2.0
10
11 Unless required by applicable law or agreed to in writing, software
12 distributed under the License is distributed on an "AS IS" BASIS,
13 WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 See the License for the specific language governing permissions and
15 limitations under the License.
16-->
17
18<!--
19 This is the main server configuration file
20
21 ${carbon.home} represents the carbon.home system property.
22 Other system properties can be specified in a similar manner.
23-->
24<Server xmlns="http://wso2.org/projects/carbon/carbon.xml">
25
26 <!--
27 Product Name
28 -->
29 <Name>WSO2 Identity Server</Name>
30
31 <!--
32 machine readable unique key to identify each product
33 -->
34 <ServerKey>IS</ServerKey>
35
36 <!--
37 Product Version
38 -->
39 <Version>5.7.0</Version>
40
41 <!--
42 Host name or IP address of the machine hosting this server
43 e.g. www.wso2.org, 192.168.1.10
44 This is will become part of the End Point Reference of the
45 services deployed on this server instance.
46 -->
47 <HostName>13.81.169.167</HostName>
48
49 <!--
50 Host name to be used for the Carbon management console
51 -->
52 <MgtHostName>13.81.169.167</MgtHostName>
53
54 <!--
55 The URL of the back end server. This is where the admin services are hosted and
56 will be used by the clients in the front end server.
57 This is required only for the Front-end server. This is used when seperating BE server from FE server
58 -->
59 <ServerURL>local:/${carbon.context}/services/</ServerURL>
60 <!--
61 <ServerURL>https://localhost:${carbon.management.port}${carbon.context}/services/</ServerURL>
62 -->
63 <!--
64 The URL of the index page. This is where the user will be redirected after signing in to the
65 carbon server.
66 -->
67 <!-- IndexPageURL>/carbon/admin/index.jsp</IndexPageURL-->
68
69 <!--
70 For cApp deployment, we have to identify the roles that can be acted by the current server.
71 The following property is used for that purpose. Any number of roles can be defined here.
72 Regular expressions can be used in the role.
73 Ex : <Role>.*</Role> means this server can act any role
74 -->
75 <ServerRoles>
76 <Role>IdentityServer</Role>
77 </ServerRoles>
78
79 <!-- uncommnet this line to subscribe to a bam instance automatically -->
80 <!--<BamServerURL>https://bamhost:bamport/services/</BamServerURL>-->
81
82 <!--
83 The fully qualified name of the server
84 -->
85 <Package>org.wso2.carbon</Package>
86
87 <!--
88 Webapp context root of WSO2 Carbon management console.
89 -->
90 <WebContextRoot>/</WebContextRoot>
91
92 <!--
93 Proxy context path is a useful parameter to add a proxy path when a Carbon server is fronted by reverse proxy. In addtion
94 to the proxy host and proxy port this parameter allows you add a path component to external URLs. e.g.
95 URL of the Carbon server -> https://10.100.1.1:9443/carbon
96 URL of the reverse proxy -> https://prod.abc.com/appserver/carbon
97
98 appserver - proxy context path. This specially required whenever you are generating URLs to displace in
99 Carbon UI components.
100 -->
101 <!--
102 <MgtProxyContextPath></MgtProxyContextPath>
103 <ProxyContextPath></ProxyContextPath>
104 -->
105
106 <!-- In-order to get the registry http Port from the back-end when the default http transport is not the same-->
107 <!--RegistryHttpPort>9763</RegistryHttpPort-->
108
109 <!--
110 Number of items to be displayed on a management console page. This is used at the
111 backend server for pagination of various items.
112 -->
113 <ItemsPerPage>15</ItemsPerPage>
114
115 <!-- The endpoint URL of the cloud instance management Web service -->
116 <!--<InstanceMgtWSEndpoint>https://ec2.amazonaws.com/</InstanceMgtWSEndpoint>-->
117
118 <!--
119 Ports used by this server
120 -->
121 <Ports>
122
123 <!-- Ports offset. This entry will set the value of the ports defined below to
124 the define value + Offset.
125 e.g. Offset=2 and HTTPS port=9443 will set the effective HTTPS port to 9445
126 -->
127 <Offset>0</Offset>
128
129 <!-- The JMX Ports -->
130 <JMX>
131 <!--The port RMI registry is exposed-->
132 <RMIRegistryPort>9999</RMIRegistryPort>
133 <!--The port RMI server should be exposed-->
134 <RMIServerPort>11111</RMIServerPort>
135 </JMX>
136
137 <!-- Embedded LDAP server specific ports -->
138 <EmbeddedLDAP>
139 <!-- Port which embedded LDAP server runs -->
140 <LDAPServerPort>10389</LDAPServerPort>
141 <!-- Port which KDC (Kerberos Key Distribution Center) server runs -->
142 <KDCServerPort>8000</KDCServerPort>
143 </EmbeddedLDAP>
144
145 <!--
146 Override datasources JNDIproviderPort defined in bps.xml and datasources.properties files
147 -->
148 <!--<JNDIProviderPort>2199</JNDIProviderPort>-->
149 <!--Override receive port of thrift based entitlement service.-->
150 <ThriftEntitlementReceivePort>10500</ThriftEntitlementReceivePort>
151
152 <!--
153 This is the proxy port of the worker cluster. These need to be configured in a scenario where
154 manager node is not exposed through the load balancer through which the workers are exposed
155 therefore doesn't have a proxy port.
156 <WorkerHttpProxyPort>80</WorkerHttpProxyPort>
157 <WorkerHttpsProxyPort>443</WorkerHttpsProxyPort>
158 -->
159
160 </Ports>
161
162 <!--
163 JNDI Configuration
164 -->
165 <JNDI>
166 <!--
167 The fully qualified name of the default initial context factory
168 -->
169 <DefaultInitialContextFactory>org.wso2.carbon.tomcat.jndi.CarbonJavaURLContextFactory</DefaultInitialContextFactory>
170 <!--
171 The restrictions that are done to various JNDI Contexts in a Multi-tenant environment
172 -->
173 <Restrictions>
174 <!--
175 Contexts that will be available only to the super-tenant
176 -->
177 <!-- <SuperTenantOnly>
178 <UrlContexts>
179 <UrlContext>
180 <Scheme>foo</Scheme>
181 </UrlContext>
182 <UrlContext>
183 <Scheme>bar</Scheme>
184 </UrlContext>
185 </UrlContexts>
186 </SuperTenantOnly> -->
187 <!--
188 Contexts that are common to all tenants
189 -->
190 <AllTenants>
191 <UrlContexts>
192 <UrlContext>
193 <Scheme>java</Scheme>
194 </UrlContext>
195 <!-- <UrlContext>
196 <Scheme>foo</Scheme>
197 </UrlContext> -->
198 </UrlContexts>
199 </AllTenants>
200 <!--
201 All other contexts not mentioned above will be available on a per-tenant basis
202 (i.e. will not be shared among tenants)
203 -->
204 </Restrictions>
205 </JNDI>
206
207 <!--
208 Property to determine if the server is running an a cloud deployment environment.
209 This property should only be used to determine deployment specific details that are
210 applicable only in a cloud deployment, i.e when the server deployed *-as-a-service.
211 -->
212 <IsCloudDeployment>false</IsCloudDeployment>
213
214 <!--
215 Property to determine whether usage data should be collected for metering purposes
216 -->
217 <EnableMetering>false</EnableMetering>
218
219 <!-- The Max time a thread should take for execution in seconds -->
220 <MaxThreadExecutionTime>600</MaxThreadExecutionTime>
221
222 <!--
223 A flag to enable or disable Ghost Deployer. By default this is set to false. That is
224 because the Ghost Deployer works only with the HTTP/S transports. If you are using
225 other transports, don't enable Ghost Deployer.
226 -->
227 <GhostDeployment>
228 <Enabled>false</Enabled>
229 </GhostDeployment>
230
231
232 <!--
233 Eager loading or lazy loading is a design pattern commonly used in computer programming which
234 will initialize an object upon creation or load on-demand. In carbon, lazy loading is used to
235 load tenant when a request is received only. Similarly Eager loading is used to enable load
236 existing tenants after carbon server starts up. Using this feature, you will be able to include
237 or exclude tenants which are to be loaded when server startup.
238
239 We can enable only one LoadingPolicy at a given time.
240
241 1. Tenant Lazy Loading
242 This is the default behaviour and enabled by default. With this policy, tenants are not loaded at
243 server startup, but loaded based on-demand (i.e when a request is received for a tenant).
244 The default tenant idle time is 30 minutes.
245
246 2. Tenant Eager Loading
247 This is by default not enabled. It can be be enabled by un-commenting the <EagerLoading> section.
248 The eager loading configurations supported are as below. These configurations can be given as the
249 value for <Include> element with eager loading.
250 (i)Load all tenants when server startup - *
251 (ii)Load all tenants except foo.com & bar.com - *,!foo.com,!bar.com
252 (iii)Load only foo.com & bar.com to be included - foo.com,bar.com
253 -->
254 <Tenant>
255 <LoadingPolicy>
256 <LazyLoading>
257 <IdleTime>30</IdleTime>
258 </LazyLoading>
259 <!-- <EagerLoading>
260 <Include>*,!foo.com,!bar.com</Include>
261 </EagerLoading>-->
262 </LoadingPolicy>
263 </Tenant>
264
265 <!--
266 Caching related configurations
267 -->
268 <Cache>
269 <!-- Default cache timeout in minutes -->
270 <DefaultCacheTimeout>15</DefaultCacheTimeout>
271 <!-- Force all caches to act as local -->
272 <ForceLocalCache>false</ForceLocalCache>
273 </Cache>
274
275 <!--
276 Axis2 related configurations
277 -->
278 <Axis2Config>
279 <!--
280 Location of the Axis2 Services & Modules repository
281
282 This can be a directory in the local file system, or a URL.
283
284 e.g.
285 1. /home/wso2wsas/repository/ - An absolute path
286 2. repository - In this case, the path is relative to CARBON_HOME
287 3. file:///home/wso2wsas/repository/
288 4. http://wso2wsas/repository/
289 -->
290 <RepositoryLocation>${carbon.home}/repository/deployment/server/</RepositoryLocation>
291
292 <!--
293 Deployment update interval in seconds. This is the interval between repository listener
294 executions.
295 -->
296 <DeploymentUpdateInterval>15</DeploymentUpdateInterval>
297
298 <!--
299 Location of the main Axis2 configuration descriptor file, a.k.a. axis2.xml file
300
301 This can be a file on the local file system, or a URL
302
303 e.g.
304 1. /home/repository/axis2.xml - An absolute path
305 2. conf/axis2.xml - In this case, the path is relative to CARBON_HOME
306 3. file:///home/carbon/repository/axis2.xml
307 4. http://repository/conf/axis2.xml
308 -->
309 <ConfigurationFile>${carbon.home}/repository/conf/axis2/axis2.xml</ConfigurationFile>
310
311 <!--
312 ServiceGroupContextIdleTime, which will be set in ConfigurationContex
313 for multiple clients which are going to access the same ServiceGroupContext
314 Default Value is 30 Sec.
315 -->
316 <ServiceGroupContextIdleTime>30000</ServiceGroupContextIdleTime>
317
318 <!--
319 This repository location is used to crete the client side configuration
320 context used by the server when calling admin services.
321 -->
322 <ClientRepositoryLocation>${carbon.home}/repository/deployment/client/</ClientRepositoryLocation>
323 <!-- This axis2 xml is used in createing the configuration context by the FE server
324 calling to BE server -->
325 <clientAxis2XmlLocation>${carbon.home}/repository/conf/axis2/axis2_client.xml</clientAxis2XmlLocation>
326 <!-- If this parameter is set, the ?wsdl on an admin service will not give the admin service wsdl. -->
327 <HideAdminServiceWSDLs>true</HideAdminServiceWSDLs>
328
329 <!--WARNING-Use With Care! Uncommenting bellow parameter would expose all AdminServices in HTTP transport.
330 With HTTP transport your credentials and data routed in public channels are vulnerable for sniffing attacks.
331 Use bellow parameter ONLY if your communication channels are confirmed to be secured by other means -->
332 <!--HttpAdminServices>*</HttpAdminServices-->
333
334 </Axis2Config>
335
336 <!--
337 The default user roles which will be created when the server
338 is started up for the first time.
339 -->
340 <ServiceUserRoles>
341 <Role>
342 <Name>admin</Name>
343 <Description>Default Administrator Role</Description>
344 </Role>
345 <Role>
346 <Name>user</Name>
347 <Description>Default User Role</Description>
348 </Role>
349 </ServiceUserRoles>
350
351 <!--
352 Configurations related to Carbon Crypto Service which is a crypto framework used inside Carbon products.
353 -->
354 <CryptoService>
355
356 <Enabled>true</Enabled>
357
358 <!-- The crypto provider which is used for internal data encryption and decryption -->
359 <InternalCryptoProviderClassName>org.wso2.carbon.crypto.provider.KeyStoreBasedInternalCryptoProvider</InternalCryptoProviderClassName>
360
361 <!--
362 The crypto provider which is used for the crypto needs which come when communicating with external parties.
363 e.g. Signing, Decrypting.
364 -->
365 <ExternalCryptoProviderClassName>org.wso2.carbon.core.encryption.KeyStoreBasedExternalCryptoProvider</ExternalCryptoProviderClassName>
366
367 <!--
368 The list of key resolvers which will be used based on the context when handling crypto with external parties.
369
370 e.g. Resolving the public key of an external entity.
371 -->
372 <KeyResolvers>
373 <KeyResolver className="org.wso2.carbon.crypto.defaultProvider.resolver.ContextIndependentKeyResolver" priority="-1"/>
374 </KeyResolvers>
375
376 </CryptoService>
377
378 <!--
379 Enable following config to allow Emails as usernames.
380 -->
381 <!--EnableEmailUserName>true</EnableEmailUserName-->
382
383 <!--
384 Security configurations
385 -->
386 <Security>
387 <!--
388 KeyStore which will be used for encrypting/decrypting passwords
389 and other sensitive information.
390 -->
391 <KeyStore>
392 <!-- Keystore file location-->
393 <Location>${carbon.home}/repository/resources/security/wso2carbon.jks</Location>
394 <!-- Keystore type (JKS/PKCS12 etc.)-->
395 <Type>JKS</Type>
396 <!-- Keystore password-->
397 <Password>wso2carbon</Password>
398 <!-- Private Key alias-->
399 <KeyAlias>wso2carbon</KeyAlias>
400 <!-- Private Key password-->
401 <KeyPassword>wso2carbon</KeyPassword>
402 </KeyStore>
403
404 <!--
405 The KeyStore which is used for encrypting/decrypting internal data.
406 This block is read by Carbon Crypto Service.
407 -->
408 <InternalKeyStore>
409 <!-- Keystore file location-->
410 <Location>${carbon.home}/repository/resources/security/wso2carbon.jks</Location>
411 <!-- Keystore type (JKS/PKCS12 etc.)-->
412 <Type>JKS</Type>
413 <!-- Keystore password-->
414 <Password>wso2carbon</Password>
415 <!-- Private Key alias-->
416 <KeyAlias>wso2carbon</KeyAlias>
417 <!-- Private Key password-->
418 <KeyPassword>wso2carbon</KeyPassword>
419 </InternalKeyStore>
420
421 <!--
422 System wide trust-store which is used to maintain the certificates of all
423 the trusted parties.
424 -->
425 <TrustStore>
426 <!-- trust-store file location -->
427 <Location>${carbon.home}/repository/resources/security/client-truststore.jks</Location>
428 <!-- trust-store type (JKS/PKCS12 etc.) -->
429 <Type>JKS</Type>
430 <!-- trust-store password -->
431 <Password>wso2carbon</Password>
432 </TrustStore>
433
434 <!--
435 The Authenticator configuration to be used at the JVM level. We extend the
436 java.net.Authenticator to make it possible to authenticate to given servers and
437 proxies.
438 -->
439 <NetworkAuthenticatorConfig>
440 <!--
441 Below is a sample configuration for a single authenticator. Please note that
442 all child elements are mandatory. Not having some child elements would lead to
443 exceptions at runtime.
444 -->
445 <!-- <Credential> -->
446 <!--
447 the pattern that would match a subset of URLs for which this authenticator
448 would be used
449 -->
450 <!-- <Pattern>regularExpression</Pattern> -->
451 <!--
452 the type of this authenticator. Allowed values are:
453 1. server
454 2. proxy
455 -->
456 <!-- <Type>proxy</Type> -->
457 <!-- the username used to log in to server/proxy -->
458 <!-- <Username>username</Username> -->
459 <!-- the password used to log in to server/proxy -->
460 <!-- <Password>password</Password> -->
461 <!-- </Credential> -->
462 </NetworkAuthenticatorConfig>
463
464 <!--
465 The Tomcat realm to be used for hosted Web applications. Allowed values are;
466 1. UserManager
467 2. Memory
468
469 If this is set to 'UserManager', the realm will pick users & roles from the system's
470 WSO2 User Manager. If it is set to 'memory', the realm will pick users & roles from
471 CARBON_HOME/repository/conf/tomcat/tomcat-users.xml
472 -->
473 <TomcatRealm>UserManager</TomcatRealm>
474
475 <!--Option to disable storing of tokens issued by STS-->
476 <DisableTokenStore>false</DisableTokenStore>
477
478 <STSCallBackHandlerName>org.wso2.carbon.identity.provider.AttributeCallbackHandler</STSCallBackHandlerName>
479
480 <!--
481 Security token store class name. If this is not set, default class will be
482 org.wso2.carbon.security.util.SecurityTokenStore
483 -->
484 <TokenStoreClassName>org.wso2.carbon.identity.sts.store.DBTokenStore</TokenStoreClassName>
485
486 <XSSPreventionConfig>
487 <Enabled>true</Enabled>
488 <Rule>allow</Rule>
489 <Patterns>
490 <!--Pattern></Pattern-->
491 </Patterns>
492 </XSSPreventionConfig>
493 </Security>
494<HideMenuItemIds>
495<HideMenuItemId>claim_mgt_menu</HideMenuItemId>
496<HideMenuItemId>identity_mgt_emailtemplate_menu</HideMenuItemId>
497<HideMenuItemId>identity_security_questions_menu</HideMenuItemId>
498</HideMenuItemIds>
499
500 <!--
501 The temporary work directory
502 -->
503 <WorkDirectory>${carbon.home}/tmp/work</WorkDirectory>
504
505 <!--
506 House-keeping configuration
507 -->
508 <HouseKeeping>
509
510 <!--
511 true - Start House-keeping thread on server startup
512 false - Do not start House-keeping thread on server startup.
513 The user will run it manually as and when he wishes.
514 -->
515 <AutoStart>true</AutoStart>
516
517 <!--
518 The interval in *minutes*, between house-keeping runs
519 -->
520 <Interval>10</Interval>
521
522 <!--
523 The maximum time in *minutes*, temp files are allowed to live
524 in the system. Files/directories which were modified more than
525 "MaxTempFileLifetime" minutes ago will be removed by the
526 house-keeping task
527 -->
528 <MaxTempFileLifetime>30</MaxTempFileLifetime>
529 </HouseKeeping>
530
531 <!--
532 Configuration for handling different types of file upload & other file uploading related
533 config parameters.
534 To map all actions to a particular FileUploadExecutor, use
535 <Action>*</Action>
536 -->
537 <FileUploadConfig>
538 <!--
539 The total file upload size limit in MB
540 -->
541 <TotalFileSizeLimit>100</TotalFileSizeLimit>
542
543 <Mapping>
544 <Actions>
545 <Action>keystore</Action>
546 <Action>certificate</Action>
547 <Action>*</Action>
548 </Actions>
549 <Class>org.wso2.carbon.ui.transports.fileupload.AnyFileUploadExecutor</Class>
550 </Mapping>
551
552 <Mapping>
553 <Actions>
554 <Action>jarZip</Action>
555 </Actions>
556 <Class>org.wso2.carbon.ui.transports.fileupload.JarZipUploadExecutor</Class>
557 </Mapping>
558 <Mapping>
559 <Actions>
560 <Action>dbs</Action>
561 </Actions>
562 <Class>org.wso2.carbon.ui.transports.fileupload.DBSFileUploadExecutor</Class>
563 </Mapping>
564 <Mapping>
565 <Actions>
566 <Action>tools</Action>
567 </Actions>
568 <Class>org.wso2.carbon.ui.transports.fileupload.ToolsFileUploadExecutor</Class>
569 </Mapping>
570 <Mapping>
571 <Actions>
572 <Action>toolsAny</Action>
573 </Actions>
574 <Class>org.wso2.carbon.ui.transports.fileupload.ToolsAnyFileUploadExecutor</Class>
575 </Mapping>
576 </FileUploadConfig>
577
578 <!-- FileNameRegEx is used to validate the file input/upload/write-out names.
579 e.g.
580 <FileNameRegEx>^(?!(?:CON|PRN|AUX|NUL|COM[1-9]|LPT[1-9])(?:\.[^.])?$)[^<>:"/\\|?*\x00-\x1F][^<>:"/\\|?*\x00-\x1F\ .]$</FileNameRegEx>
581 -->
582 <!--<FileNameRegEx></FileNameRegEx>-->
583
584 <!--
585 Processors which process special HTTP GET requests such as ?wsdl, ?policy etc.
586
587 In order to plug in a processor to handle a special request, simply add an entry to this
588 section.
589
590 The value of the Item element is the first parameter in the query string(e.g. ?wsdl)
591 which needs special processing
592
593 The value of the Class element is a class which implements
594 org.wso2.carbon.transport.HttpGetRequestProcessor
595 -->
596 <HttpGetRequestProcessors>
597 <Processor>
598 <Item>info</Item>
599 <Class>org.wso2.carbon.core.transports.util.InfoProcessor</Class>
600 </Processor>
601 <Processor>
602 <Item>wsdl</Item>
603 <Class>org.wso2.carbon.core.transports.util.Wsdl11Processor</Class>
604 </Processor>
605 <Processor>
606 <Item>wsdl2</Item>
607 <Class>org.wso2.carbon.core.transports.util.Wsdl20Processor</Class>
608 </Processor>
609 <Processor>
610 <Item>xsd</Item>
611 <Class>org.wso2.carbon.core.transports.util.XsdProcessor</Class>
612 </Processor>
613 </HttpGetRequestProcessors>
614
615 <!-- Deployment Synchronizer Configuration. Enable value to true when running with "svn based" dep sync.
616 In master nodes you need to set both AutoCommit and AutoCheckout to true
617 and in worker nodes set only AutoCheckout to true.
618 -->
619 <DeploymentSynchronizer>
620 <Enabled>false</Enabled>
621 <AutoCommit>false</AutoCommit>
622 <AutoCheckout>true</AutoCheckout>
623 <RepositoryType>svn</RepositoryType>
624 <SvnUrl>http://svnrepo.example.com/repos/</SvnUrl>
625 <SvnUser>username</SvnUser>
626 <SvnPassword>password</SvnPassword>
627 <SvnUrlAppendTenantId>true</SvnUrlAppendTenantId>
628 </DeploymentSynchronizer>
629
630 <!-- Mediation persistence configurations. Only valid if mediation features are available i.e. ESB -->
631 <!--<MediationConfig>
632 <LoadFromRegistry>false</LoadFromRegistry>
633 <SaveToFile>false</SaveToFile>
634 <Persistence>enabled</Persistence>
635 <RegistryPersistence>enabled</RegistryPersistence>
636 </MediationConfig>-->
637
638 <!--
639 Server intializing code, specified as implementation classes of org.wso2.carbon.core.ServerInitializer.
640 This code will be run when the Carbon server is initialized
641 -->
642 <ServerInitializers>
643 <!--<Initializer></Initializer>-->
644 </ServerInitializers>
645
646 <!--
647 Indicates whether the Carbon Servlet is required by the system, and whether it should be
648 registered
649 -->
650 <RequireCarbonServlet>${require.carbon.servlet}</RequireCarbonServlet>
651
652 <!--
653 Carbon H2 OSGI Configuration
654 By default non of the servers start.
655 name="web" - Start the web server with the H2 Console
656 name="webPort" - The port (default: 8082)
657 name="webAllowOthers" - Allow other computers to connect
658 name="webSSL" - Use encrypted (HTTPS) connections
659 name="tcp" - Start the TCP server
660 name="tcpPort" - The port (default: 9092)
661 name="tcpAllowOthers" - Allow other computers to connect
662 name="tcpSSL" - Use encrypted (SSL) connections
663 name="pg" - Start the PG server
664 name="pgPort" - The port (default: 5435)
665 name="pgAllowOthers" - Allow other computers to connect
666 name="trace" - Print additional trace information; for all servers
667 name="baseDir" - The base directory for H2 databases; for all servers
668 -->
669 <!--H2DatabaseConfiguration>
670 <property name="web" />
671 <property name="webPort">8082</property>
672 <property name="webAllowOthers" />
673 <property name="webSSL" />
674 <property name="tcp" />
675 <property name="tcpPort">9092</property>
676 <property name="tcpAllowOthers" />
677 <property name="tcpSSL" />
678 <property name="pg" />
679 <property name="pgPort">5435</property>
680 <property name="pgAllowOthers" />
681 <property name="trace" />
682 <property name="baseDir">${carbon.home}</property>
683 </H2DatabaseConfiguration-->
684 <!--Disabling statistics reporter by default-->
685 <StatisticsReporterDisabled>true</StatisticsReporterDisabled>
686
687 <!-- Enable accessing Admin Console via HTTP -->
688 <!-- EnableHTTPAdminConsole>true</EnableHTTPAdminConsole -->
689
690 <!--
691 Default Feature Repository of WSO2 Carbon.
692 -->
693 <FeatureRepository>
694 <RepositoryName>default repository</RepositoryName>
695 <RepositoryURL>http://product-dist.wso2.com/p2/carbon/releases/wilkes/</RepositoryURL>
696 </FeatureRepository>
697
698 <!--
699 Configure API Management
700 -->
701 <APIManagement>
702
703 <!--Uses the embedded API Manager by default. If you want to use an external
704 API Manager instance to manage APIs, configure below externalAPIManager-->
705
706 <Enabled>true</Enabled>
707
708 <!--Uncomment and configure API Gateway and
709 Publisher URLs to use external API Manager instance-->
710
711 <!--ExternalAPIManager>
712
713 <APIGatewayURL>http://localhost:8281</APIGatewayURL>
714 <APIPublisherURL>http://localhost:8281/publisher</APIPublisherURL>
715
716 </ExternalAPIManager-->
717
718 <LoadAPIContextsInServerStartup>true</LoadAPIContextsInServerStartup>
719 </APIManagement>
720</Server>