Configuration

The on-premises installation has two major configuration points:

  1. The location of the Structurizr data directory.
  2. Configuration of the on-premises installation itself via a file named structurizr.properties inside the Structurizr data directory.

Structurizr data directory

The location of the Structurizr data directory can be configured in a number of ways:

  • An environment variable named STRUCTURIZR_DATA_DIRECTORY
  • A JVM system property named structurizr.dataDirectory

If unset, the Structurizr data directory location will default to /usr/local/structurizr.

structurizr.properties

The following parameters can be set in a text file named structurizr.properties in your Structurizr data directory. Changing these parameters requires a restart of the on-premises installation.

Values can either be static strings, or references to environment variables (e.g. structurizr.redis.password=${REDIS_PASSWORD}).

Name Description
structurizr.url If you are running the on-premises installation behind a load balancer and/or reverse-proxy (e.g. SSL termination is being handled upstream), or the pages served by the on-premises installation don’t look right (e.g. styles are not loading, images are oversized, etc), you will likely need to set this property to explicitly tell the on-premises installation the URL you are using to access it. This should be a full URL, such as https://structurizr.example.com.
structurizr.encryption By default, workspace data is stored as plaintext on disk. Setting this property will enable server-side encryption. For better security (and to keep the encryption passphrase away from the encrypted files), you can specify this property as an environment variable (STRUCTURIZR_ENCRYPTION) or a JVM system property (structurizr.encryption), rather than putting this in the structurizr.properties file.
structurizr.authentication The name of the authentication implementation to use: file (default), ldap, or saml.
structurizr.apiKey A bcrypt encoded value to use as an API key for the admin API.
structurizr.session The name of the HTTP session storage implementation to use: local (default) or redis. See HTTP sessions for more details.
structurizr.admin By default, any authenticated user can create and delete workspaces. If you would like to restrict who can create and delete workspaces, set this property to a comma-separated list of usernames or roles that should have “admin” access.
structurizr.data The name of the data storage implementation to use: file (default) or aws-s3 (see Amazon Web Services S3 for more details).
structurizr.search The name of the search implementation to use: lucene (default), none, or elasticsearch (see Elasticsearch for more details).
structurizr.maxWorkspaceVersions The number of workspace versions to retain when using file-based data storage (default; 30).
structurizr.feature.ui.dslEditor Enables/disables the browser-based DSL editor: true or false (default).
structurizr.feature.ui.workspaceUsers Enables/disables the ability to manage workspace users via the UI (i.e. the “Users” link on the workspace summary pages): true (default) or false.
structurizr.feature.ui.workspaceSettings Enables/disables the workspace settings page: true (default) or false.
structurizr.feature.workspace.archiving Enables/disables workspace archiving to prevent the workspace from being deleted from storage when the workspace is deleted via the UI/API: true or false (default)
structurizr.feature.workspace.scope Sets the workspace scope validation mode (see Workspaces for more details): strict or relaxed (default).
structurizr.feature.diagramReviews Enables/disables the diagram reviews feature: true (default) or false.

HTTPS

There are several options for running the on-premises installation over HTTPS, including:

If, after configuring HTTPS, you find that the on-premises installation is still trying to use some HTTP URLs or the web pages don’t look right (e.g. styles are not loading correctly, images are oversize, etc), you will likely need to specify the correct HTTPS URL via the structurizr.url property (see above).

Logging

The log4j2 framework is used for logging and, by default, the logging level is set to info. If you’re having an issue and would like to change the logging level:

  1. Copy the log4j2.properties file into your Structurizr data directory.
  2. Modify the logging levels as needed.
  3. Restart your on-premises installation.

If you’re specifically having issues with authentication via SAML, you can make the following changes:

  1. Change line 13 to logger.app.level = info
  2. Change line 19 to logger.springSecurity.level = debug