Properties
Overview
Universal Controller contains three types of configurable properties:
Universal Controller start-up properties are the default properties contained in the uc.properties file when the Controller is installed. These properties are required for Controller start-up and operation. | |
Universal Controller system properties define Controller system information and performance. They have their values set during installation. Note In a High Availability environment, all Universal Controller cluster nodes share the same database; therefore, updating Universal Controller System Properties for one cluster node applies to all cluster nodes. | |
CLI provides a sample configuration file, |
Note
Properties for Universal Message Service (OMS) are installed as configuration file options when OMS is installed as a component of Universal Agent. The values for these options are set during the installation. There are several configuration methods available for changing these values.
Universal Controller Start-up Properties (uc.properties)
The uc.properties file is read by the Controller, which is started by Tomcat.
The uc.properties file resides here:
[tomcat directory]\conf
Note
The backslash character in a property value must be escaped as a double backslash.
For example:
example.path=c:\\stonebranch\\uc
Property Name | Description | Default |
|---|---|---|
For MySQL: | ||
| Allows the retrieval of output with extended unicode characters. If the property is not set, character encoding will not be used in the JDBC URL.
| |
| Database type. Specify this property if you are using a MySQL database. | |
| JDBC connect URL. Specify this property if you are using a MySQL database. By default, the controller automatically refreshes the | |
For SQLServer | ||
| Database type. Specify this property if you are using a SQLServer database. | |
| JDBC connect URL. Specify this property if you are using a SQLServer database. By default, the controller automatically refreshes the | |
For Oracle | ||
| Database type. Specify this property if you are using an Oracle database. | |
| JDBC connect URL. Specify this property if you are using an Oracle database. By default, the controller automatically refreshes the | |
For PostgreSQL | ||
| Database type. Specify this property if you are using a PostgreSQL database. | |
| JDBC connect URL. Specify this property if you are using a PostgreSQL database. By default, the controller automatically refreshes the | |
For All Databases | ||
| IMPORTANT If you specify a database name in this property and in uc.db.url, the names must be the same. Name for the Controller database. | uc |
| Database password that will be replaced by By default, the controller automatically refreshes the | (none) |
| Encrypted version of | (none) |
| Sets the minimum number of idle connections to maintain in the Server connection pool, or zero to create none. | 1 |
| Sets the minimum number of idle connections to maintain in the Auxiliary connection pool, or zero to create none. The Auxiliary connection pool is used only when at least one of the following properties are
| 1 |
| Sets the minimum number of idle connections to maintain in the Client connection pool, or zero to create none. | 1 |
| Sets the maximum number of connections that can be allocated by the Server connection pool at a given time. Note The installer overrides the default by configuring a maximum number of 40 in the | 30 |
| Sets the maximum number of connections that can be allocated by the Auxiliary connection pool at a given time. The Auxiliary connection pool is used only when at least one of the following properties are
| 40 |
| Sets the maximum number of connections that can be allocated by the Client connection pool at a given time. | 30 |
| Sets the maximum number of connections that can be allocated by the Reserved connection pool at a given time. | 30 |
| Specifies that the Universal Controller should use the Auxiliary connection pool when launching workload. | false |
| Specifies that the Universal Controller should use the Auxiliary connection pool when triggering workload. | false |
| Sets the minimum number of idle connections to maintain in the Reserved connection pool, or zero to create none. | 1 |
| Specifies which secrets provider to use for the password. If left unspecified, Universal Controller is assumed to be the provider, and the controller will continue to load the password from the uc.properties using one of the following properties. Note Property uc.db.password is immediately saved back as uc.db.password.encrypted with an encrypted value. If property
The controller will then load all the properties associated with the specified provider. See Secrets Provider Properties for the properties associated with each provider. By default, the controller automatically refreshes the | (none) |
| Allows additional options to be appended to the JDBC URL generated by Universal Controller. HTML | (none) |
| Login ID that the Controller will use to log in to your database. By default, the controller automatically refreshes the | root |
For LDAP: | ||
| When this property is set to true, any Groups synchronized indirectly (that is, through a User's memberOf attribute) will honor the Group search filter and Group OU filters under the LDAP Advanced Settings section. Note The code default for this property, which is used if this property is not set, is false. | true |
| IMPORTANT This property should be set to true only if your Groups being synchronized from AD have at most one parent Group. When synchronizing Groups, the default behavior in the Controller is to copy the members of a Sub Group into the Parent Group. | false |
| IMPORTANT This property should be set to false only when synchronizing Groups from AD, and the number of values for the member attribute exceeds the When synchronizing Groups, the default behavior in the Controller is to use the multi-valued member attribute to update the members for a Group; however, AD limits the number of values returned for an attribute, which can result in Group members being removed unexpectedly. This limit is determined by the | true |
| IMPORTANT This property is set to false by default to disable range-based searches. This assumes paging is supported by the directory server. This property should be set to true only if your LDAP server does not support paged results. | false |
| IMPORTANT This property should be set to true only if your LDAP server does not support the User Membership Attribute (for example, memberOf). Synchronizes LDAP users indirectly based on group membership. This only applies to groups that users are direct members of.
Note The Note There is currently no support for nested groups if the User Membership Attribute is not supported by the LDAP server. | false |
| IMPORTANT This property should not be set to true if group membership for users is static, since there is extra overhead to process the groups, which may impact login performance. When this property is set to true, LDAP group memberships for existing LDAP users are updated upon successful login. Note When dynamically creating a new LDAP user at login, the user will be added only to groups that it is a direct member of. Likewise, when updating an existing LDAP user at login, the user will be removed from any groups that it is not a direct member of. Therefore, it is not recommended that you enable this property if a group hierarchy exists, since the user will be removed from any parent groups when logging in. (Group membership for the parent groups will be restored the next time the LDAP refresh runs; however, this can take up to 24 hours.) | false |
For OAuth Single Sign-On: | ||
| Specifies if a user authenticating through OAuth Single Sign-On can be updated using the Access / ID Token if the user was created manually. | false |
| Specifies if a user authenticating through OAuth Single Sign-On can be updated using the Access / ID Token of a provider that differs from the provider the user was originally provisioned by. | false |
| The saml.log.level property is used to configure the log level when OAuth Single Sign-On or SAML Single Sign-On is enabled. | INFO |
For SAML Single Sign-On: | ||
| Configures the log level for the Spring SAML2 Service Provider framework. Options are
For backwards compatibility, property | INFO |
| The Identity Provider Metadata refresh interval in milliseconds; minimum = 30000, maximum = 2147483647. | 120000 |
| By default, the saml2:AuthnRequest will be signed using rsa-sha256, though some Identity Providers will require a different algorithm. To configure the algorithm automatically based on the Identity Provider’s metadata, do not specify this property. Alternatively, you can manually override the default configuration by specifying this property. | http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 or as specified by the Identity Provider’s metadata. |
| Specifies (true of false) whether the Identity Provider should force the user to reauthenticate. | false |
| Set the WantAuthnRequestsSigned setting, indicating (true or false) the Identity Provider's preference that Service Providers should sign the AuthnRequest before sending. To configure the setting automatically based on the Identity Provider’s metadata, do not specify the property. | Specified by the Identity Provider’s metadata. |
| Specifies if a user authenticating through SAML Single Sign-On can be updated using the SAML Assertion if the user was created manually. | false |
| Specifies if a user authenticating through SAML Single Sign-On can be updated using the SAML Assertion of a provider that differs from the provider the user was originally provisioned by. | false |