Specifying custom configuration with an options file
You can configure the Policy Editor by editing and implementing the options file.
About this task
You must run setup in non-interactive command-line mode instead of interactive mode if you need to do any of the following:
-
Configure the Policy Editor with a policy configuration key. A policy configuration key is an arbitrary key-value pair that can be referenced by name in the policy Trust Framework. This allows the policy trust store to be defined without hard-coding environment-specific data, such as host names and credentials in the trust store.
-
Configure a key store for a policy information provider. This defines a client certificate that the policy engine can use for MTLS connections to a policy information provider.
-
Configure a trust store for a policy information provider. This defines the set of certificates or root certificates that the policy engine uses to determine whether it trusts the server certificate presented by a policy information provider.
-
Customize the Policy Editor’s logging behavior.
-
Configure private JSON Web Token (JWT) claims. This allows an organization to convey specific claims about an identity.
|
If the server detects existing configuration files when running the
To reconfigure the server while preserving the values in |
Steps
-
Make a copy of the default options file provided at
config/options.ymland customize the copy to suit your needs.The
setuptool supports configuring these options through the use of a YAML options file.When you customize your options file, do not remove or alter the logging section. For guidance about customizing logging behavior, contact Ping Identity Support.
-
Configure the Policy Editor with an options file:
-
Stop the Policy Editor:
$ bin/stop-server -
Run the
setuptool. -
Provide the options file using the
--optionsFileargument.For example, the following
setupcommand configures a Policy Editor in demo mode using an options file namedmy-options.yml:$ bin/setup demo \ --adminUsername admin \ --generateSelfSignedCertificate \ --decisionPointSharedSecret pingauthorize \ --hostname <pap-hostname> \ --port <pap-port> \ --adminPort <admin-port> \ --licenseKeyFile <path-to-license> \ --optionsFile my-options.yml
-
-
Start the Policy Editor:
$ bin/start-server