All Downloads are FREE. Search and download functionalities are using the official Maven repository.

schemaorg_apache_xmlbeans.src.gateway-config-201409.xsd Maven / Gradle / Ivy

There is a newer version: 6.1.3
Show newest version



    
        Configuration for the Kaazing gateway.
    

    
        
            This is the top-level element of the gateway
                configuration file.
            
        

        
            
                
                    
                        This is the element for specifying
                            default values for parameters in the services.
                        
                    
                

                
                    
                        
                            This is the element for configuring a
                                service running on the gateway.
                            
                        
                    

                    
                        
                            This is the element for configuring a
                                set of default accept-options, connect-options, mime-mapping for all services running
                                on the gateway.
                            
                        
                    

                    
                        
                            This is the element for configuring
                                gateway security.
                            
                        
                    

                    
                        
                            This is the element for gateway
                                cluster configuration.
                            
                        
                    

                
            
        
    

    
        
            This type describes the configuration of the
                gateway's clustering behavior.
            
        

        
            
                
            

            
                
                    
                        The protocol, network interface (possibly
                        internal), and the port number on which the
                        cluster accepts connections.
                    
                
                
                    
                        
                    
                
            

            
                
                
                    
                        
                    
                
            

            
        
    

    
        
            This type describes a mapping of a document filename extension
                to a MIME content type string. The content type string would
                typically be sent as a Content-Type header in an HTTP or other
                response.
            
        

        
            
                
                    The file extension.
                
            
            
                
                    The MIME-type to send for the given extension.
                
            
        
    

    
        
            This is the element for configuring the user roles
                that are authorized to perform specific
                operations.
            
        

        
            
                
                    
                        The name of the user role to be included in the
                        authorization-constraint.
                    
                
            
            
                
                    
                        
                    
                
            
        
    


    
        
            
                
                    This is the element for configuring the
                        keystore that contains encryption keys for secure
                        communications with the gateway.
                    
                
            

            
                
                    This is the element for configuring the
                        truststore that contains digital certificates for
                        certificate authorities trusted by the
                        gateway.
                    
                
            

            
                
                    This is the element that associates an
                        authenticated user with a set of authorized
                        roles.
                    
                
            
        
    

    
        
            
                
                    
                        
                        
                        
                    
                
            

            

            
        
    

    
        
            
                
                    The name of the realm.
                
            

            
                
                    The description of the
                        realm.
                    
                
            

            
                
                    The name of the class that represents a user
                        principal that an admin is interested in knowing about. When
                        a principal of this class is authenticated, a notification of
                        such will be sent via the management service. If no management
                        service is configured, then this element will be ignored.
                    
                
            

            
                
                    The authentication for a realm defines how users
                        authenticate and become authorized for activity within the realm.
                    
                

            
        
    

    
        
            
                
                    The scheme with which to challenge the client
                        when a service is accessed with missing or invalid credentials.
                    
                
                
                    
                        
                        
                        
                        
                        
                        
                        
                    
                
            

            

            
                
                    
                        The authorization mode under which realm services operate.
                    
                
                
                    
                        
                        
                        
                    
                
            

            
                
                    
                        The interval of time after which the web socket is closed.
                    
                
            

            

        
    

    
        
            
        
    


    
        
            
                
                    
                        One or more headers containing authentication data.
                    
                
            
            
                
                    
                        One or more query parameters containing authentication data.
                    
                
            
            
                
                    
                        One or more cookies containing authentication data.
                    
                
            
        
    


    
        
            
                
                    

                    

                    
                        
                            
                                
                                    
                                        
                                    
                                
                            
                        
                    
                
            
        
    

    
        
            
                
                    

                    

                    
                
            
        
    

    
        
            
                
                    

                    

                    
                
            
        
    

    
        
            
                
                    

                    

                    
                
            
        
    

    
        
            
                
                    
                        
                            
                                
                                
                            
                        
                    

                    

                    
                
            
        
    

    
        
            

            

            

            

            

            

            

            

            

            

            
                
                    The name of the security realm used for
                        authentication or * to indicate any valid
                        user.
                    
                
            

            

            

            


        
    

    
        
            
            
            
        
    

    
        
            
                
                    The protocol scheme, fully qualified host
                        name, and port number of the cross-origin site that is
                        allowed to access this service. Specify the value * if you
                        want to allow access to all cross-site origin sites.
                        Specifying * may be for appropriate for services that
                        restrict HTTP methods or custom headers, but not the
                        origin of the request.
                    
                

                
                    
                        
                            
                                
                                
                            
                        
                    
                
            

            
                
                    A comma-separated list of methods that can
                        be invoked by the cross-origin site.
                    
                
            

            
                
                    A comma-separated list of custom header
                        names that can be sent by the cross-origin site when it
                        accesses the service.
                    
                
            

            
        
    

    
        
            This type of service is used to broadcast
                information from a back-end service.
            
        

        
            
                
                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    
                
            
        
    

    
        
            This type of service is used to load-balance WebSocket
                requests.
            
        

        
            
                
                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    
                
            
        
    

    
        
            This type of service is used to expose directories
                or files hosted on the gateway.
            
        

        
            
                
                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    
                
            
        
    

    
        
            This service provides echoing of input. Useful for
                testing.
            
        

        
            
                
                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    
                
            
        
    

    
        
            Represents extension services.
        

        
            
                
                    

                    

                    

                    

                    

                    
                        
                            
                                
                            
                        
                    

                    

                    

                    

                    
                        
                            
                                The name of the security realm used for
                                authentication or * to indicate any valid user.
                            
                        
                    

                    

                    
                
            
        
    

    
        
            This type of service is used to expose the AMQP proxy
            service.
        

        
            
                
                    

                    

                    

                    

                    

                    

                    

                    

                    

                    
                        
                            
                                The name of the security realm used for
                                authentication or * to indicate any valid user.
                            
                        
                    

                    

                    
                
            
        
    

    
        
            This service provides reverse proxying of http requests.
        

        
            
                
                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    
                
            
        
    

    
        
            This type of service is used to proxy connections
                to a back-end service.
            
        

        
            
                
                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    

                    
                
            
        
    

    
        
            This type of service is used to check for gateway updates
        

        
            
                
                    

                    

                    
                
            
        
    

    
        
            
        
    

    
        
            
            
        
    

    
        
            
                The behavior of the login module at the time it
                validates the user's credentials.
            
        

        
            
            
            
            
            
        
    

    
        
            

            

            
        
    

    
        
            
            
        
    

    
        
            
        
    

    
        
            
                
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                
            
        
    

    
        
            
        
    

    
        
            
                
                    A comma-separated list of
                        SSL/TLS ciphersuite names to be used for this
                        connection.
                    
                
            
            
                
                    A comma-separated list of
                        SSL/TLS protocol names to be used for this
                        connection. The protocols names are SSLv2Hello, SSLv3, TLSv1, TLSv1.1,
                        TLSv1.2. If not specified explicitly, SSLv3 protocol is not
                        enabled by default (as it is known to have vulnerabilities).
                    
                
            
            
                
                    
                        
                        
                        
                    
                
            
            
                
                    
                        
                        
                        
                        
                    
                
            
            
                
            
            
                
            
            
                
            
            
                
            
            
                
            
            
                
            
            
                
            
            
                
            
            
                
            
            
                
            
            
                
            
            
                
            
            
                
            
            
                
                    Specifies an interface to use for udp so that the multicast traffic can be constrained to a
                        specific interface.
                    
                
            
        
    

    
        
            
                
                    A comma-separated list of
                        SSL/TLS ciphersuite names to be used for this
                        connection.
                    
                
            
            
                
                    A comma-separated list of
                        SSL/TLS protocol names to be used for this
                        connection. The protocols names are SSLv2Hello, SSLv3, TLSv1, TLSv1.1,
                        TLSv1.2. If not specified explicitly, SSLv3 protocol is not
                        enabled by default (as it is known to have vulnerabilities).
                    
                
            
            
                
                    
                        
                        
                        
                    
                
            
            
                
            
            
                
            
            
                
            
            
                
            
            
                
            
            
                
            
            
                
            
            
                
                    HTTP keep-alive (or persistent connections) allow reuse of same TCP
                        connection for multiple HTTP request/responses. This will improve HTTP performance
                        esp for services like http proxy. This is enabled by default.
                    
                
                
                    
                        
                        
                        
                    
                
            
            
                
                    HTTP keep-alive (or persistent connections) allow reuse of same TCP
                        connection for multiple HTTP request/responses. If the TCP connection is idle
                        for the specified time, the connection is closed and will not be reused for
                        any further HTTP requests/responses.
                    
                
            
            
                
                    Gateway caches the specified number of idle keep-alive (or persistent) connections
                        to upstream server in the cache of each worker. Those connections will timeout based on
                        keep-alive timeout config option. It is recommended to keep this number small enough to let
                        upstream servers process new incoming connections as well.

                        This config option does not limit the max number of connections to upstream server that
                        the gateway can open.
                    
                
            
            
                
                    Specifies an interface to use for udp so that the multicast traffic can be constrained to a
                        specific interface.
                    
                
            
        
    

    
        
            
                
                    AWS AccessKeyId of the account owner.
                    
                
            
            
                
                    AWS SecretKey.
                    
                
            
        
    

    
        
            
                
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                    
                        
                            
                                
                                
                            
                        
                    
                
            
        
    

    
        
            
                
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                
            
        
    

    
        
            
                
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                
            
        
    

    
        
            
                
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                    
                        
                    
                
            
        
    

    
        
            
        
    

    
        
            
        
    

    
        
            
        
    

    
        
            
            
            
        
    






© 2015 - 2025 Weber Informatics LLC | Privacy Policy