diff --git a/master/documentation/configuration/overview/index.html b/master/documentation/configuration/overview/index.html index 56a7710..d492070 100644 --- a/master/documentation/configuration/overview/index.html +++ b/master/documentation/configuration/overview/index.html @@ -90,7 +90,7 @@ url: "" authentication: "" timeout: 10s -

Below you will find sections like core, backend, advanced, database, statistics, mail, auth, web and webhook.
Each section describes the individual configuration keys, their default values, and a brief explanation of their purpose.


Core

These are the primary configuration options that control fundamental WireGuard Portal behavior. More advanced options are found in the subsequent Advanced section.

admin_user

admin_password

disable_admin_user

admin_api_token

editable_keys

create_default_peer

create_default_peer_on_creation

re_enable_peer_after_user_enable

delete_peer_after_user_deleted

self_provisioning_allowed

import_existing

restore_state


Backend

Configuration options for the WireGuard backend, which manages the WireGuard interfaces and peers. The current MikroTik backend is in BETA and may not support all features.

default

local_resolvconf_prefix

ignored_local_interfaces

Mikrotik

The mikrotik array contains a list of MikroTik backend definitions. Each entry describes how to connect to a MikroTik RouterOS instance that hosts WireGuard interfaces.

Below are the properties for each entry inside backend.mikrotik:

id

display_name

api_url

api_user

api_password

api_verify_tls

api_timeout

concurrency

ignored_interfaces

debug

For more details on configuring the MikroTik backend, see the Backends documentation.


Advanced

Additional or more specialized configuration options for logging and interface creation details.

log_level

log_pretty

log_json

start_listen_port

start_cidr_v4

start_cidr_v6

use_ip_v6

config_storage_path

expiry_check_interval

rule_prio_offset

route_table_offset

api_admin_only

limit_additional_user_peers


Database

Configuration for the underlying database used by WireGuard Portal. Supported databases include SQLite, MySQL, Microsoft SQL Server, and Postgres.

If sensitive values (like private keys) should be stored in an encrypted format, set the encryption_passphrase option.

debug

slow_query_threshold

type

dsn