Skip to content

Table Properties#

Portal#

LDAP/LDAP-S#

Expand

Property Description Example
PORTAL_LDAP_URL Add value as "LDAP_HOST: LDAP_PORT xxx.example.com:983
PORTAL_LDAP_BIND_DN   CN=Bind User,OU=example,DC=ad,DC=example,DC=com
PORTAL_LDAP_BIND_PASSWORD Add the password for LDAP  
PORTAL_LDAP_SEARCH_BASE   ou=example,dc=ad,dc=example,dc=com
PORTAL_LDAP_USER_SEARCH_BASE   ou=example,dc=ad,dc=example,dc=com
PORTAL_LDAP_GROUP_SEARCH_BASE   OU=example_services,OU=example,DC=ad,DC=example,DC=com
PORTAL_LDAP_USERNAME_ATTRIBUTE   sAMAccountName
PORTAL_LDAP_DN_ATTRIBUTE   PORTAL_LDAP_DN_ATTRIBUTE: dc
PORTAL_LDAP_SSL_ENABLED For SSL enabled LDAP server, set this value to true. true
PORTAL_LDAP_SSL_PM_GEN_TS

Set this to true if you want Privacera Manager to generate the truststore for your ldaps server.

Set this to false if you want to manually provide the truststore certificate. To learn how to upload SSL certificates, click here.

true

OKTA#

Expand

Property Description Example
OAUTH_CLIENT_CLIENTSECRET Get it from the Prerequisites section above. OAUTH_CLIENT_CLIENTSECRET: "4hb88P9UZmxxxxxxxxm1WtqsaQRv1FZDZiaOT0Gm"        
OAUTH_CLIENT_CLIENTID Get it from the Prerequisites section above. 0oa63edjkaoNHGYTS357
OAUTH_CLIENT_TOKEN_URI Get it from the Prerequisites section above. https://dev-396511.okta.com/oauth2/default/v1/token
OAUTH_CLIENT_AUTH_URI Get it from the Prerequisites section above. https://dev-396511.okta.com/oauth2/default/v1/authorize
OAUTH_RESOURCE_USER_INFO_URI Get it from the Prerequisites section above. https://dev-396511.okta.com/oauth2/default/v1/userinfo
PORTAL_UI_SSO_ENABLE Property to enable/disable OKTA true

SAML#

Expand

Property Description Example
AAD_SSO_ENABLE Enabled by default.  
SAML_ENTITY_ID Get the value from the Prerequisites section. privacera-portal
SAML_BASE_URL   https://{{app_hostname}}:6868
PORTAL_UI_SSO_BUTTON_LABEL   Azure AD Login
PORTAL_UI_SSO_URL   saml/login
SAML_GLOBAL_LOGOUT
Enabled by default. The global logout for SAML is enabled. Once a logout is initiated, all the sessions you've accessed from the browser would be terminated from the Identity Provider (IDP).
 
META_DATA_XML Browse and select the Federation Metadata XML, which you downloaded in the Prerequisites section.   

AuditServer#

Expand

Property Description Example
AUDITSERVER_AUTH_TYPE

Set this property to enable basic authentication.

Value: None/Basic

basic

AUDITSERVER_AUTH_USER

AUDITSERVER_AUTH_PASSWORD

If the above authentication type is set to basic, assign a username and password. You can assign any user credentials.

Value: True/False

AUDITSERVER_AUTH_USER: "padmin"

AUDITSERVER_AUTH_PASSWORD: "padmin"

AUDITSERVER_SOLR_DESTINATION Enable if the audit destination in Solr.

Aurora DB#

PostgreSQL#

Expand

Property Description

EXTERNAL_DB_HOST

EXTERNAL_DB_NAME

Enter the hostname of the PostgreSQL server, and the name of the database you want to connect to.

EXTERNAL_DB_USER

EXTERNAL_DB_PASSWORD

Enter the credentials of the user who has access to the database.

MySQL#

Expand

Property Description

EXTERNAL_DB_HOST

EXTERNAL_DB_NAME

Enter the hostname of the PostgreSQL server, and the name of the database you want to connect to.

EXTERNAL_DB_USER

EXTERNAL_DB_PASSWORD

Enter the credentials of the user who has access to the database.

Solr#

Expand

Property Description
SOLR_BASIC_AUTH_ENABLED Set this property to true to enable the basic authentication. 

SOLR_BASIC_AUTH_USER

SOLR_BASIC_AUTH_PASSWORD 

Assign the user credentials for the Solr authentication.