Configuration Reference
This Reference covers information on configuration options, peer systems, and the developer reference.
Highlights
Deploy-time Configuration
Information on Deploy-time Configuration properties used when deploying SignServer to the application server.
Logging
SignServer uses Log4j for debug logging and the security events logger from CESeCore for system/audit logging. In addition, the worker logger (transaction log) can be configured to use Log4j and/or the security events logger. See Logging.
Authentication and Authorization
Client Authentication and Authorization can be configured per-worker and occurs in different components as the request comes in.
Health Check
The Health Check service is used for health monitoring and is useful for clusters.
SignServer TimeMonitor
ENTERPRISE
The external SignServer TimeMonitor application can be used together with the StatusReadingLocalComputerTimeSource for monitoring the local time and informing SignServer about its state. For more information, see SignServer TimeMonitor Application.
Peer Systems
ENTERPRISE
For more information on the SignServer support for incoming peer connections, see Peer Systems.
Key Wrapping
ENTERPRISE
Key wrapping allows solving issues arising when the number of keys you need to handle exceeds the amount that can be stored in a limited storage space for an HSM. The feature enables exporting the key material in a protected manner and storing the wrapped, encrypted key in an external database.
Developer Reference
For instructions needed for building and developing SignServer, see Developer Reference.