Skip to main content

Configuration Reference

This page documents every configurable setting in OrbisID, grouped by category.

Environment Variables

These are set in the .env file and passed to Docker containers.

Image and Registry

VariableDefaultDescription
ORBISID_VERSIONSet by releaseDocker image version tag
ORBISID_REGISTRYorbisidDocker registry prefix

Encryption

VariableDefaultDescription
ENCRYPTION_KEYnone (required)AES-256-GCM key for encrypting credentials at rest. Generate with openssl rand -base64 32. Must be kept safe - if lost, encrypted data cannot be recovered.

Database (All-in-One)

VariableDefaultDescription
POSTGRES_DBorbisidDatabase name
POSTGRES_USERorbisidDatabase username
POSTGRES_PASSWORDnone (required)Database password

Database (External)

VariableDefaultDescription
DB_HOST-PostgreSQL hostname or IP
DB_PORT5432PostgreSQL port
DB_NAMEorbisidDatabase name
DB_USERNAMEorbisidDatabase username
DB_PASSWORD-Database password

Spring Profile

VariableDefaultDescription
SPRING_PROFILES_ACTIVEdockerSpring Boot profile. Use docker for containerised deployments.

Application Settings (UI)

These settings are configured through the OrbisID web interface at Administration > Settings. They are stored in the database and take effect immediately.

Date and Time

SettingDefaultDescription
Date Formatyyyy-MM-ddFormat for displaying dates throughout the application. Uses Java DateTimeFormatter patterns.
DateTime Formatyyyy-MM-dd HH:mm:ssFormat for displaying timestamps.

Connection

SettingDefaultDescription
Connection Timeout60Default timeout (in seconds) when testing connections to target systems.

Password Policy (UI)

Configured at Administration > Users > Password Policy tab. These control password requirements for all local users.

SettingDefaultDescription
Minimum Length8Minimum number of characters in a password.
Require UppercaseOffRequire at least one uppercase letter (A-Z).
Require LowercaseOffRequire at least one lowercase letter (a-z).
Require NumberOffRequire at least one digit (0-9).
Require Special CharacterOffRequire at least one special character (!@#$%^&* etc.).
Password Expiry (days)0 (disabled)Force users to change their password after this many days. Set to 0 to disable.
Password History0 (disabled)Number of previous passwords to remember. Users cannot reuse a password that appears in their history. Set to 0 to disable.

Session Settings

These are configured in the backend application properties and cannot be changed at runtime.

SettingValueDescription
Inactivity Timeout60 minutesSession expires after 60 minutes of no API activity.
Absolute Timeout8 hoursSession expires 8 hours after login, regardless of activity.
Max Login Attempts5Account is locked after 5 consecutive failed login attempts.
Lockout Duration30 minutesLocked accounts are automatically unlocked after 30 minutes.
Password Work Factor12BCrypt work factor for password hashing.

OIDC / SSO Configuration (UI)

Configured at Administration > Authentication. Requires the Enterprise edition.

SettingDescription
Issuer URLThe OpenID Connect issuer URL (e.g., https://login.microsoftonline.com/<tenant>/v2.0). OrbisID discovers endpoints from /.well-known/openid-configuration.
Client IDThe OAuth 2.0 client ID registered with your identity provider.
Client SecretThe OAuth 2.0 client secret. Encrypted at rest.
Redirect URIThe callback URL OrbisID uses for the OIDC flow. Typically https://your-orbisid-domain/oidc-callback.
Role ClaimThe JWT claim name that maps to an OrbisID role. The claim value should match an OrbisID role name (e.g., ADMINISTRATOR, IAM_GOVERNANCE_ANALYST).

When OIDC is configured, a Sign in with SSO button appears on the login page. Users can still log in with local credentials.

Users with the role INHERIT_FROM_OIDC_CLAIM will have their effective role determined by the SSO role claim on each login.

Nginx Configuration

The nginx.conf file controls the reverse proxy. Key settings:

SettingValueDescription
client_max_body_size50mMaximum upload size for CSV imports and script uploads. Increase if you import very large CSV files.
proxy_read_timeout300sBackend read timeout. Increase if scans of very large systems time out.
proxy_connect_timeout10sBackend connection timeout.
Security headersEnabledX-Frame-Options, X-Content-Type-Options, X-XSS-Protection, Referrer-Policy are set by default.

Restricting Actuator Access

The /actuator/ endpoint exposes health check information. In production, restrict access to internal networks by uncommenting the allow/deny rules in nginx.conf:

location /actuator/ {
proxy_pass http://backend;
allow 10.0.0.0/8;
allow 172.16.0.0/12;
allow 192.168.0.0/16;
deny all;
}

Connection Pool Settings

The backend uses HikariCP for database connection pooling. Default values are suitable for most deployments.

SettingValueDescription
Maximum Pool Size20Maximum number of database connections.
Minimum Idle5Minimum idle connections kept open.
Connection Timeout30sMaximum time to wait for a connection from the pool.
Idle Timeout10mTime before an idle connection is removed.
Max Lifetime30mMaximum lifetime of a connection in the pool.

Scan Agent Configuration

If you deploy Scan Agents, they are configured via their own config.yml. See Scan Agent for details.