Reference Guide

APPENDIX 1: System Config Manager Parameters

Parameter Name

Description

Sample Parameter Value

Restart Required

aioc.alert.notification.mail.address

If this parameter is set, a notification is also sent to specific users. If it’s not set, the notification is only sent to the related manager.

test_user@mail.com

NO

aioc.available.jdbc.drivers

This parameter is used to set requested database types separated by a "," comma.

oracle.jdbc.driver.OracleDriver,org.postgresql.Driver,com.microsoft.sqlserver.jdbc.SQLServerDriver,com.mysql.jdbc.Driver,org.apache.cassandra.cql.jdbc.CassandraDriver,com.teradata.jdbc.TeraDriver,org.apache.hive.jdbc.HiveDriver,org.apache.hive.jdbc.DB2Driver, cdata.jdbc.couchbase.CouchbaseDriver

NO

aioc.backup.backupdir

Backup directory path in Kron PAM. The file path “/u01/backup” must be manually created in Kron PAM before starting backup. The backup file is created in this path first, then it is transferred to the path defined in “aioc.backup.sftp.dirname” parameter.



YES

aioc.backup.sftp.server.ip

Server IP the Backup file will be transferred to.



YES

aioc.backup.sftp.username

Username to connect to the sftp server defined with the “aioc.backup.sftp.server.ip” parameter.



YES

aioc.backup.sftp.password

Password of the user defined with the “aioc.backup.sftp.username” parameter. The parameter must be defined with a “yes” encryption option.



YES

aioc.backup.sftp.dirname

Directory path where the backup file will be sent to in the target sftp server defined with the “aioc.backup.sftp.server.ip” parameter.



YES

aioc.backup.diskspace.min.gbyte

Required disk space for sftp server to transfer backup file. The value should be set according to the size of the database to be backed up.



YES

aioc.command.provisioning.c3p0.PreferredTestQuery

Defines the query that will be executed for all connection tests if the default ConnectionTester is being used. Defining a preferredTestQuery that will execute quickly in the database may dramatically speed up Connection tests.

SELECT 1 FROM DUAL

NO

aioc.device.available.interface.names

This parameter is used to define an interface name for devices with the same IP address, so they can be distinguished during connection.

E.g: interface_1, interface_2

YES

aioc.device.group.property.keys

This parameter is used to define device group properties.

Default value is null. Example values: tag.Name,tag.Region,addDeviceSshKeyToUserSelection

NO

aioc.email.domains

Set this parameter with related email domains. (More than one domain can be added with a comma. Ex: SingleConnect.com, abc.com)

gmail.com, SingleConnect.com

NO

aioc.force.end.user.to.react.interface

Set this parameter to true to force the following users to the new end-user interface. • Users that are not in the system.admins group • Users that are not in a group with the Admin Group flag • Users that are not named admin Defaults to false.

true,false

NO

aioc.instead.of.ad.line.manager

This parameter defines where to direct the approval request to provide the missing AD Line Manager and it will direct all the requests in case the AD Line Manager is not imported to Kron PAM or the AD Line Manager is missing

test_user@mail.com

NO

aioc.languages

This parameter sets the preferred language as options in GUI. More than one language preference can be added with a comma separator.

en_US, ru_RU, ko_KR

NO

aioc.nsso.active

This parameter is used to activate the nsso module in aioc and grant SSH Proxy rights to Kron PAM.

true

NO

aioc.portal.disallow.multi.login

This parameter enables or restricts multi login on the Kron PAM GUI.

true,false

NO

aioc.portal.session.idletime.minute

This parameter defines the time in minutes to disconnect the session if the user is inactive.

45

YES

aioc.portal.session.idletime.warning.before.min

This parameter defines the gives warning before ending the session.

5

NO

aioc.portal.allowed.ip.for.admin.users





This parameter defines the users in the admin group to only be able to access through set IP/s.

10.20.42.55,10.20.42.50



No

aioc.region.field.visibility

If this parameter is set as “true”, the region field is visible in the New Device Discovery Screen in the Device İnventory. If it is set as “false”, the region field is not visible in the New Device Discovery Screen in the Device Inventory. If this parameter is not set, a controller/controlled license is required to visualize the region field.





aioc.show.react.gui.button

If this parameter is set as false, the button for previewing the new GUI doesn’t appear. Defaults to false.

true,false

YES

aioc.timezone

It can be defined as "New York USA" or "GMT-5" or "Etc/GMT-5". For all those 3 definitions, time will show "... (GMT-05:00)". If the parameter is defined, time in emails will be converted to the defined time zone, otherwise, the system zone of the server sending the email will be used.





aioc.user.group.property.keys

This parameter defines the user group properties.

allowSftpInSshDevices

YES

aioc.user.password.algorithm

This parameter sets the preferred algorithm to encode user passwords. Possible algorithms are defined in the examples.

E. g. :MD5(default), SHA256, SHA384, SHA512, and NTLM

YES

aioc.user.group.change.notifier.enabled

When a user group is edited or a user is added/deleted, a notification mail is sent to the group manager. Set this parameter to false to disable sending notification emails. Defaults to true.

false

NO

aioc.user.password.log.check.count

This value checks whether the user's new password matches older passwords. (Ex: If it is 2, it checks last 2 passwords)

2

NO

aioc.users.default.password.strength

This parameter is used to set the preferred User Password Strength Level according to predefined levels: 0-None 1-Password length must be at least 5 characters 2-Password length must be at least 5 characters / Number required 3-Password length must be more than 7 characters/ Upper-Lower Case, Number, Special Character required 4-Password length must be more than 15 characters / Upper-Lower Case, Number, Special Character required .

0

NO

approval.sms.http.encoding

Encoding format.See Approval Workflow SMS Settings .

Alternative Values: UTF-8, UTF-16BE



approval.sms.http.headers

HTTP SMS Header. See Approval Workflow SMS Settings .

Ex: Content-Type:text/xml



approval.sms.http.url

SMS sender HTTP URL. See

Ex: http://api.smsexample.com/v1/send-sms



approval.status.change.to.expire

When the defined time to approve the instant connection ends, changes from Waiting to Expired if not approved/s.

Ex:10



approval.workflow.level.timeout.period.values

The timeout period value alternatives for Approval Workflow settings, are separated by commas. See Approval Workflow for details. Default values are: 30 minutes, 2 hours, 1 day.

Ex: 30m,2h,1d

NO

auto.approve.when.requester.is.approver

When the approver is also the requester, approval is automatically approveedgiven. The default value is false.

true, false

NO

sapm.account.hidden.columns

This parameter can be definedused to hide columns by their column identifiers with a comma separator.

secretType,secretName,approvalStatus,userPermission,approvedByEmail,approvalLevelStep,approvedDate,deviceIp,deviceName,configName,parentSapmGroupName,username,passwordSeenStatus,firstPartSeenUsername,secondPartSeenUsername,validationStatus,changePeriodFormatted,lastChangeTime,nextChangeTime,lastAttemptStatus,createdUser,description

NO

command.approval.sms.http.body

Template for SMS messages to be sent for command approval through HTTP. See Approval Workflow SMS Settings .





command.approval.sms.smpp.body

Template for SMS messages to be sent for command approval through HTTP. See Approval Workflow SMS Settings .





connection.approval.sms.http.body

Template for SMS messages to be sent for command approval through HTTP. See Approval Workflow SMS Settings .





connection.approval.sms.smpp.body

Template for SMS messages to be sent for command approval through HTTP. See Approval Workflow SMS Settings .





device.database.source

This parameter defines the external device database IP addresses. Multiple values must be separated by “;”. The parameter is used to add/discover devices from external device databases.

E.g: 10.10.10.10;20.20.20.20

NO

device.database.url_n

JDBC URL address for database connection. The parameter is used to add/discover devices from external device databases.

E.g: device.database.url_0 = jdbc:postgresql://10.10.10.10:5432/databasename

YES

device.database.user_n

External database username. The parameter is used to add/discover devices from external device databases.

E.g.: DB_1

YES

device.database.password_n

External database password. The parameter is used to add/discover devices from external device databases.

must be set as "yes"

YES

device.database.sql_n

SQL Query to import devices. IP address, hostname, element type specifier, and one of the tag values are mandatory. The parameter is used to add/discover devices from external device databases.

E.g: device.database.sql_0 = SELECT "dynName" AS IP_ADDRESS, server AS HOSTNAME , os AS ELEMENT_TYPE_SPECIFIER , id AS PORT, os as TAG_OS, site as TAG_SITE FROM devicedatabase

YES

device.database.driver_n

Database driver for external database connection. The parameter is used to add/discover devices from external device databases.

E.g: device.database.driver_0 = org.postgresql.Driverdev

YES

export.securecrt.role.groups

This parameter determines whether to include the roles of device groups in the exporting folder. The parameter is used to export device lists for SecureCRT. SecureCRT is a commercial SSH, Telnet client, and terminal emulator.

true

YES

export.securecrt.script.extension

This parameter determines the type of script file of the exporting devices. The parameter is used to export device lists for SecureCRT. SecureCRT is a commercial SSH, Telnet client, and terminal emulator.

is

YES

export.securecrt.shorten.names

If this parameter is saved as true, the parent device group name is discarded from the device group names. The parameter is used to export device lists for SecureCRT. SecureCRT is a commercial SSH, Telnet client, and terminal emulator.

true

YES

export.securecrt.single.script

This parameter determines whether to include a script file in the exporting folder. The parameter is used to export device lists for SecureCRT. SecureCRT is a commercial SSH, Telnet client, and terminal emulator.

true

YES

export.securecrt.templates.dir

This parameter defines the directory folder for devices. The parameter is used to export device lists for SecureCRT. SecureCRT is a commercial SSH, Telnet client, and terminal emulator.

${netright.home}/templates/securecrt

YES

hsm.enabled

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication, and provides crypto processing. Kron PAMan encrypt and decrypt data with the key that HSM provides. Set these parameters according to the Hardware Security Module (HSM) device.

true

YES

hsm.method

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides crypto processing. Kron PAM can encrypt and decrypt data with the key that HSM provides. Set these parameters according to the Hardware Security Module (HSM) device.

Client

YES

hsm.provider.classname

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides crypto processing. Kron PAM can encrypt and decrypt data with the key that HSM provides. Set these parameters according to the Hardware Security Module (HSM) device.

com.ncipher.provider.km.nCipherKM

YES

hsm.keystore.type

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides crypto processing. Kron PAM can encrypt and decrypt data with the key that HSM provides. Set these parameters according to the Hardware Security Module (HSM) device.

nCipher.sworld

YES

hsm.keystore.alias

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides crypto processing. Kron PAM can encrypt and decrypt data with the key that HSM provides. Set these parameters according to the Hardware Security Module (HSM) device.

secureworld

YES

hsm.keystore.load.password

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides crypto processing. Kron PAMt can encrypt and decrypt data with the key that HSM provides. Set these parameters according to the Hardware Security Module (HSM) device.

XXX

YES

hsm.keystore.entry.password

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides crypto processing. Kron PAM can encrypt and decrypt data with the key that HSM provides. Set these parameters according to the Hardware Security Module (HSM) device.

XXX

YES

hsm.secretkey.algorithm

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides crypto processing. Kron PAM can encrypt and decrypt data with the key that HSM provides. Set these parameters according to the Hardware Security Module (HSM) device.

AES

YES

iga.2fa.token.timestep

This parameters are used to adjust MFA Offline/Online Settings.



YES

iga.2fa.sms.http.body

This parameters are used to adjust MFA Offline/Online Settings.



NO

iga.2fa.sms.http.headers

This parameters are used to adjust MFA Offline/Online Settings.



NO

iga.2fa.sms.http.secret.body

This parameters are used to adjust MFA Offline/Online Settings.



YES

iga.2fa.sms.http.url

This parameters are used to adjust MFA Offline/Online Settings.



NO

iga.2fa.sms.smpp.body

This parameters are used to adjust MFA Offline/Online Settings.



NO

iga.2fa.sms.smpp.secret.body

This parameters are used to adjust MFA Offline/Online Settings.



NO

iga.2fa.use.external.mobile.app

Allows MFA Client applications such as Google Authenticator or Microsoft Authenticator to run. Default value is false

True

YES

kron.cripto.aes.key

This parameter defines the key to hide sensitive data.

IQtn5Fh70qhOeKnEDNKLcIZREHoWwhWdfmG0uOyKMtc=

YES

legal.notice.enabled

Customers can set up a legal disclaimer message to appear at the start of RDP or VNC sessions. This parameter must be set as “true” to show the message. This parameter is used to set up a legal disclaimer message. Restart of the web portal service is needed after configurations.

true,false

NO

legal.notice.text

The text to be shown as a legal disclaimer message. This parameter is used to set up a legal disclaimer message. Restart of the web portal service is needed after configurations.

<text>

NO

mail.templates.dir

This parameter defines the default mail template directory. Kron PAM sends emails to group admins to notify them of new user requests, password manager actions, command authorization requests, etc. Kron PAM also sends password reset emails and MFA activation token emails. In order to achieve these actions, email settings have to be configured on Kron PAM using the Mail Config screen in the System Config Manager menu.

${netright.home}/templates/mail

YES

max.push.count.to.send.in.one.time

This parameter limits the notifications to be sent in the Mobile App. to prevent overactivity of the notification system.

10

NO

mobile.application.otp.enabled

This parameter is used to enable or disable multi-factor authentication (MFA) for the mobile application login for its online functions. The default value is false.

true, false

NO

mobile.tomcat.url

This parameter defines the Kron PAM Mobile Application Server address.

NO

multitenancy.enabled

This parameter enables Kron PAM’s multitenancy function.

true

NO

multitenancy.tacacs.port.range

The port range to be used for the TACACS devices for the tenants should be defined with this parameter.

50000-50100

NO

netright.alias

This parameter determines which modules to use in AIOC. You can set the system as Kron PAM, Single Monitor or Single Command using this parameter.

sc

NO

netright.auth.ldap

This parameter enables or disables LDAP/AD authentication.

false

YES

netright.auth.ldap.baseDN

This parameter defines the LDAP Base DN. Base DN is the section of the directory where the application will start searching for Users and Groups.

DC=example,DC=com

NO

netright.auth.ldap.principal

Security principal of context set from the expression defined as uid.

uid=?,DC=example,DC=com

NO

netright.auth.ldap.url

This parameter determines the Active Directory/LDAP hostname/ip address, port number and LDAP/LDAPS protocol. If more than one URL is used, the parameters should be separated by “,”. (e.g., ldap://10.10.10.10:389, ldaps://10.10.10.20:636)

NO

netright.auth.ldap.timeout

Timeout duration for a response from the AD/LDAP server.

1000(default value in ms)

NO

netright.auth.ldap.socket.timeout

Timeout period for socket connection with the AD/LDAP server.

5000(default value in ms)

NO

netright.auth.tacacs

This parameter determines the use of the TACACS+ authorization.

true

YES

netright.auth.tacacs.server

This parameter defines the address of the TACACS+ server.

127.0.0.1

NO

netright.auth.tacacs.server.key

This parameter defines the key of the TACACS+ server.

z7i/Z15wXHgEJRwGFAQO3A==

NO

netright.autoddl

This parameter is set as true while upgrading Kron PAM. The value of this parameter remains false while using the system.

false

YES

netright.baseurl

This parameter is used to configure the base URL to provide a connection from a proxy service.

NO

netright.cache.enable

This parameter determines whether the User Interface has a cache.

false

YES

netright.content.root

This parameter defines the folder of the root content.

${netright.home}/filerepo

YES

netright.hidden.property.keys

This parameter stores the hidden properties.

.*.password

NO

netright.home

This parameter defines the netright.home directory.

/u01/netright-tomcat/netright

YES

netright.instancename

This parameter defines the Kron PAM instance name. You can use different names if you use more than one instance.

SingleConnect

NO

netright.jdbc.database

This parameter defines the type of Kron PAM database.

postgresql

NO

netright.jdbc.password

This parameter defines the password of the Kron PAM database.

*****

NO

netright.jdbc.url

This parameter defines the address of the Kron PAM database.

jdbc:postgresql://localhost:5444/aioc

NO

netright.jdbc.username

This parameter defines the name of the Kron PAM database.

aoic

NO

netright.licence.file.path

This parameter defines the path of the license file.

${netright.home}/licence.properties

NO

netright.name

This parameter defines the header in the Kron PAM GUI.

SingleConnect

YES

netright.version

This parameter defines the version shown in GUI.

2.14.3

NO

nsso.nsso.ssl.port

This parameter defines the SSL port of the link between the SSH Proxy and Kron PAM.

4443

NO

nsso.remote.desktop.base.dir

This parameter defines the folder in Kron PAM where files transferred during an RDP session are stored.

/tmp

NO

nsso.remote.desktop.daemon.host

This parameter defines the host address of the RDP Proxy.

127.0.0.1

NO

nsso.remote.desktop.daemon.port

This parameter defines the port of the RDP Proxy.

4822

NO

nsso.remote.desktop.drive.sharing.enabled

This parameter is used to transfer files between RDP endpoints. When this property is set, a special folder on Kron PAM (/tmp/) is shared with all the RDP endpoints as a shared drive named “G on SC RDP”.

true,false

NO

nsso.remote.desktop.idle.threshold

Time limit to start the calculation of idle time (millisecond). If the “nsso.remote.desktop.idle.threshold” property is not set in the System Config Mang., this property value is set at 30000ms(30seconds) by default.

Example:40000

NO

nsso.remote.desktop.key.logger.enabled

This parameter grants rights to see the RDP session logs as Key Logger. Mouse and keyboard inputs during RDP sessions can be accessed in this page.

true

NO

nsso.remote.desktop.key.logger.hidden.key.

The Key logger of RDP sessions logs all the key motions in clear text. This feature must be stopped to obscure certain data. When the users press the defined key twice in a session, the key logger hides the key motions by the limit defined in this parameter. If “nsso.remote.desktop.key.logger.hidden.key.limit” is not defined manually in the System Config Man., the hidden key limit is 15 keys by default.

15

YES

nsso.remote.desktop.key.logger.key.hiding.shortcut

This parameter is used to define the key that will disable key logging for the defined hidden limited keys. The default key is "ESC".

"ESC"

YES

nsso.remote.desktop.ocr.enabled

This parameter grants rights to see the RDP session logs as OCR Logs. You can see the activities performed by the user during an RDP session.

true

NO

nsso.remote.desktop.ocr.lang

This parameter is used to get OCR logs in the required language. Codes for the supported languages can be found in the Admin Guide. Multiple languages must be separated by "+".

eng+kor+tur+spa

NO

nsso.remote.desktop.ocr.threads

This parameter defines the maximum number of threads allocated to OCR processes in multitenant environments. The default value is 2.

Ex:2

NO

nsso.remote.desktop.session.duration.limit.warning.before.min

This parameter is used to determine the time a warning is shown before the session times out.

Example:4

NO

otp.rest.url

This parameter is used to enable MFA. The rest URL should be set as the Kron PAM Public IP and port.

Ex:http://127.0.0.1

NO

rdp.idle.session.timeout

User sessions can be terminated based on their idle duration. This parameter is used to set a timeout limit (minute).

Example:5

NO

sapm.job.password.change.thread.count”

This parameter is used to change the number of threads running the SAPM Auto Import jobs. The default value is 5.

5

YES

sapm.show.password.expiration.time.values

This parameter defines the password reservation times of SAPM Accounts. When a user makes a password reservation for an SAPM account, these time options are presented to reserve a time.

5m,30m,2h,24h

NO

sc.aaa.freeradius.password

This parameter defines the password to connect to the RADIUS server.

*****

NO

sc.aaa.freeradius.url

This parameter defines the URL address of the RADIUS server.

jdbc:postgresql://127.0.0.1:5444/aioc

NO

sc.aaa.freeradius.username

This parameter defines the username to connect to the RADIUS server.

aioc

NO

sc.aaa.radius.ldap.conf.path

This parameter is used to set the path of the RADIUS configuration file to insert Active Directory/LDAP parameters.

/etc/raddb/mods-available/ldap

NO

sc.aaa.radius.restart.command

This parameter defines the command to restart the RADIUS server. The server needs to be restarted with this command to apply changes

systemctl restart radiusd

NO

sc.aaa.tacacs.conf.path

This parameter is used to set the path of theTACACS+ configuration file to insert Active Directory/LDAP parameters.

/u01/kron/etc/kron_tacacs.conf

NO

sc.aaa.tacacs.restart.command

This parameter defines the command to restart the TACACS+ server. The server needs to be restarted with this command to apply changes

systemctl restart kron_tacacs

NO

sc.freeradius.server

This parameter defines the address of the Free RADIUS Server. If this parameter is not equal to the requested remote address, the program will return an authorization error.

127.0.0.1

YES

sc.policy.xml.dir

This parameter defines the location of the policy.xml file.

/u01/nssoapp/conf/xml

YES

sc.portal.otp.enabled

This parameter is used to enable or disable multi-factor authentication (MFA) for the Kron PAM GUI login.

true, false

NO

sc.rdp.connection.otp.enabled

This parameter is used to enable or disable multi-factor authentication(MFA) for RDP connections. (true=enabled, false=disabled)

false

NO

sc.rdp.otp.cache.enabled

If this parameter is saved as true, the user will not be asked for OTP during the cache duration after entering OTP.

true

YES

sc.rdp.otp.cache.seconds

This parameter defines the cache time in seconds.

300

YES

sc.user.group.manager.obligated.member.of.group

This parameter is used to determine whether managers will belong to the user group or not. The default value is “true”.

true, false

NO

smpp.addressRange

The destination address range to be served by this ESME account. This parameter is optional, and SMSC settings will be applied if it is not defined.

Example: 1* (for numbers starting with 1

YES

smpp.addrNpi

Numeric Plan Indicator (NPI) to be used for address range parameters. This parameter is optional, and SMSC settings will be applied if it is not defined.

Alternative values: 0: Unknown 1: ISDN (E163/E164) 3: Data (X.121) 4: Telex (F.69) 6: Land Mobile (E212) 8: National 9: Private 10: ERMES 14: Internet (IP) 18: WAP Client ID

YES

smpp.addrTon

Type of Number (TON) to be used for address range parameter. This parameter is optional, and SMSC settings will be applied if it is not defined.

Alternative values: 0: Unknown 1: International 2: National 3: Network Specific 4: Subscriber Number 5: Alphanumeric 6: Abbreviated

YES

smpp.bindMode

Bind mode for the ESME account. This parameter is mandatory for sending/receiving SMS over SMPP.

Alternative values: t: transmitter r: receiver tr: transceiver (transmitter and receiver)

YES

smpp.destinationNpi

Numeric Plan Indicator (NPI) parameter to be used for the destination address. This parameter is optional, and SMSC settings will be applied if it is not defined.

Alternative values: 0: Unknown 1: ISDN (E163/E164) 3: Data (X.121) 4: Telex (F.69) 6: Land Mobile (E212) 8: National 9: Private 10: ERMES 14: Internet (IP) 18: WAP Client ID

YES

smpp.destinationTon

Type of Number (TON) parameter to be used for the destination address. This parameter is optional, and SMSC settings will be applied if it is not defined.

Alternative values: 0: Unknown 1: International 2: National 3: Network Specific 4: Subscriber Number 5: Alphanumeric 6: Abbreviated

YES

smpp.enquireLinkPeriodMs

The period in milliseconds to make EnquireLink requests to the SMSC. EnquireLink requests are used to check the health of the status of the connection between the ESME and target SMSC. Any value less than or equal to “0” will be defaulted to 5000 ms (5 seconds). The SMPP connection will be automatically re-established in case of SMPP connection failures during Enquire Link requests.

Ex: 10000 (In milliseconds

YES

smpp.ip

IP address of the SMSC. This parameter is mandatory for sending/receiving SMS over SMPP.

Ex: 10.20.40.95

YES

smpp.password

The password used to authenticate an ESME account is defined in SMSC. This parameter is mandatory for sending/receiving SMS over SMPP.

Ex: netright

YES

smpp.port

Binding port for SMPP listened on SMSC. This parameter is mandatory for sending/receiving SMS over SMPP.

Ex: 16000

YES

smpp.receiveTimeout

Timeout duration for trying to receive a message from the SMSC. This parameter is optional.

Alternative values: -1 (Infinite wait until a PDU is received. 1,2,3…. (number of seconds)

YES

smpp.serviceType

SMS Application service associated with the message. This parameter is optional and sent as Default, if not defined.

Alternative values: (NULL): Default CMT: Cellular Messaging CPT: Cellular Paging VMN: Voice Mail Notification VMA: Voice Mail Alerting WAP: Wireless Application Protocol USSD: Unstructured Supplementary Services Data

YES

smpp.sourceAddress

The source address is to be used when sending messages. This parameter is mandatory for sending/receiving SMS over SMPP.

Ex: PAM, +12348372939

YES

smpp.sourceNpi

Numeric Plan Indicator (NPI) to be used in the SME source address parameters. This parameter is mandatory for sending/receiving SMS over SMPP. It should be defined as Unknown (0) , if an alphanumeric source address is to be used to send messages (Ex: SingleCon)

Alternative values: 0: Unknown 1: ISDN (E163/E164) 3: Data (X.121) 4: Telex (F.69) 6: Land Mobile (E212) 8: National 9: Private 10: ERMES 14: Internet (IP) 18: WAP Client ID

YES

smpp.sourceTon

Type of Number (TON) to be used in the SME source address parameters. This parameter is mandatory for sending/receiving SMS over SMPP. It should be defined as Alphanumeric, if an alphanumeric source address is to be used to send messages (Ex: SingleCon)

Alternative values: 0: Unknown 1: International 2: National 3: Network Specific 4: Subscriber Number 5: Alphanumeric 6: Abbreviated

YES

smpp.syncMode

Receiving mode. If set to sync, the application waits for a response after sending a request PDU. If set to async, the application doesn't wait for responses, rather they are passed to and implemenation by ServerPDUListener by the Receiver. The listener is also passed every request PDU received from the SMSC. This is an optional parameter and the default value is sync.

Alternative values: sync – Synchronous async - Asynchronous

YES

smpp.systemId

The system ID is used to identify an ESME defined in SMSC. It is used for SMPP sender authentication. This parameter is mandatory for sending/receiving SMS over SMPP.

Ex: netright

YES

smpp.systemType

The system type is used to categorize the type of ESME binding to the SMSC. This parameter is optional for sending/receiving SMS over SMPP, and if not defined the system type is sent as null.

Alternative values: VMS: Voice Mail System OTA: Over-the-air Activation system (NULL): Default

YES

sms.channel

Which channel is to be used to send SMS? The default value is http.

Alternative values: http: for using http-based SMS Proxy smpp: for using SMPP towards SMPP

YES

sso.geosites

This parameter defines the location of the server.



NO

sso.ip

This parameter defines the IP address of the SSH proxy.

127.0.0.1

NO

sso.port

This parameter defines the port of the IP address of the SSH proxy.

2222

NO

sql.proxy.bind.port.range

This parameter defines the port range for auto assigning sql.proxy.bind.port parameter.

6000-7000

NO

sql.proxy.oracle.local.bind.port.tenant_aioc

This parameter defines the port number of Oracle devices. All Oracle database connections are made through this port. For multitenant environments, the tenant name should be entered instead of the aioc.

5000

NO

syslog.message.rfcFormat

RFC_5424 and RFC_3164 formats are supported in SIEM configuration. This parameter determines the RFC format and must be set as one of these values.

RFC_5424,RFC_3164

YES

syslog.message.content.format

This parameter is used to determine the content format.

KEY_VALUE, CEF

YES

syslog.server.hostName

Kron PAM can send logs to SIEM systems. This parameter is used to set the SIEM Host IP address.



YES

syslog.server.port

This parameter is used to set the port of the SIEM host. The default value is "514".

514

YES

tfa.otp.issuer

The name of the MFA server. This string is shown on top of the Offline Token value on the mobile app, when a QR code that is issued from the server is scanned on a mobile app.

String

NO

user.forceManagerUserInGroup

If this parameter is saved as true, you must define a manager for a user group. Otherwise, user groups can be created without a manager.

true

NO

user.lock.afterFailedLoginAttempts

Users are locked after a certain number of failed login attempts. This parameter defines the number of failed login attempts before locking the user account.

20

YES

user.lock.afterInactiveMillis

Kron PAM locks inactive users. This parameter defines the maximum inactive time before locking a user. The user password must be reset to unlock the user account.

2629743000

NO

user.mail.from

This parameter defines the sender mail address for MFA.

YES

user.suspend.afterFailedLoginAttempts

Users are suspended after a certain number of failed login attempts. This parameter defines the number of failed login attempts before suspending the user.

10

YES

user.suspend.forMillis

After a certain amount of failed login attempts, users are suspended for the time determined in this parameter. This value is in milliseconds.

60

NO

windows.auth.keytab.path

These parameters are used to configure the settings of the Kron PAM Application.

= /u01/netright-tomcat/conf/sc.keytab

NO

windows.auth.spn

These parameters are used to configure the settings of the Kron PAM Application.

=HTTP/ Single Connect ServerName

NO

aioc.auth.windows

These parameters are used to configure the settings of the Kron PAM Application.

true

YES

rdp.idle.session.timeout.warning.before.min

This parameter is used to configure the warning pop-up display.

5

YES









rdp.hide.top.menu.by.default

When this parameter is true, the bar in the RDP connections will be hidden by default.

true

NO

aioc.portal.client.ip.header

The property will be available. The default value is null, so no header will be checked to detect client IP (TCP source IP will be used as current). You can define it with the value "X-Forwarded-For".

X-Forwarded-For

YES

session.record.encryption.enabled

This parameter allows RDP/VNC and SSH video recordings to be securely stored in an encrypted format in a database. The recordings remain encrypted until the user replays them, ensuring data protection and confidentiality.

true

NO

sc.rdp.reason.mail.recipient

If the reasonRequiredForConnection parameter is set and if this parameter is avaible in systemconfig, the written reason will be mailed to the recipients. More than one email address can be used, with a comma separator.

kron@krontech.com,

pam@kron.com

N

cloud.rap.server

This parameter defines the Remote Access Portal address.

YES

rap.token.expiration.period

This parameter indicates the lifespan of a token and is used to prevent the creation of long-term invitation links

1

YES