Configuration Overview
Understanding how IdentitySuite stores and manages configuration settings
Property Tooltips
Many configuration properties include an informational icon that provides additional context. Hovering over the icon reveals a tooltip containing a detailed explanation of the property, its default value, and—when applicable—its impact on the system’s behavior.
What You Will Find in Tooltips:
- A clear description of the property’s purpose
- The default value applied when no configuration is provided
- Behavioral implications and interactions with related settings
- Notes on prerequisites or dependencies when relevant
Important Notice
Tooltip descriptions are generated using AI assistance. While they are designed to be accurate and helpful, they may occasionally contain incomplete or incorrect information. Always validate critical configuration details using the official documentation or by reviewing the underlying system behavior.
Configuration File Management
IdentitySuite automatically manages configuration settings through environment-specific JSON files. When you modify settings through the web interface, these changes are saved to the appropriate configuration file based on your current running environment.
Configuration File Structure:
IdentitySuite
folder located in the root directory of your project or publication folder.
IdentitySuite.[Environment].json
where [Environment] corresponds to your application's current running environment.
Default Environment Files:
Custom Environments:
IdentitySuite.[YourEnvironmentName].json and IdentitySuite will automatically
recognize and use it when running in that environment.
Automatic Synchronization:
Changes made through the IdentitySuite web interface are written to the appropriate configuration file only
after you click the Save button. It's important
to note that you must restart the application for the changes to take effect, as some settings are read and
applied during application startup.
Sensitive Data Encryption
IdentitySuite provides built-in encryption capabilities for sensitive configuration data such as API keys, client secrets, and connection strings. This feature helps protect confidential information stored in configuration files from casual exposure.
How Encryption Works:
Encryption States:
Security Considerations:
- Protection Level: This encryption provides protection against casual access to configuration files
- Certificate Storage: Encryption certificates are stored within the project directory
- Intended Use: Designed as a deterrent for shared or less secure deployment environments
- Not Absolute Security: This feature does not provide complete security against determined attackers with server access
Best Practices:
Configuration Workflow
Understanding the configuration workflow helps ensure smooth deployment and maintenance of your IdentitySuite installation across different environments.
Configuration Process:
Benefits of This Approach:
- • Environment-specific configurations ensure proper settings for each deployment
- • Automatic file management eliminates manual configuration file editing
- • Built-in encryption provides protection for sensitive data
- • Transparent decryption process requires no additional configuration
- • Easy backup and version control of configuration settings