Admin Guide
Admin Guide
3
Administrator
Guide
Moscow
1C Company
2019
THE COPYRIGHT FOR
SOFTWARE AND DOCUMENTATION REPLICATION
BELONGS TO "1C" COMPANY
By purchasing "1C: Entreprise" system you agree to
avoid software and documentation copying
without "1C" company written approval.
© 1C-Soft LLC, 1996 - 2018
1C Company, Moscow, 123056, P.O. box 64, Russia
Sales department: Seleznevskaya st., 21
Phone: +7 (495) 737-92-57
Fax: +7 (495) 681-44-07,
Email: [email protected]
URL: https://1c-dn.com
Product development group- A. Abasov, A. Akimov, R. Aleynikov, A. Alekseev, V.
Andryuschenko, Ya. Batura, M. Begletsov, A. Bezborodov, A. Belyak, D.
Beskorovainov, E. Bobrova, A. Bushnev, P. Vasilets, A. Vinogradov, Ya.
Virkovsky, A. Volkov, I. Golshtein, E. Gornostaev, N. Grebnev, A. Gudnev, S.
Guriev, I. Gusarov, G. Damie, A. Darovskikh, O. Derut, M. Dzjuba, I. Dju-
plischev, N. Evgrafov, B. Evtifeev, A. Zabelinsky, D. Zadorin, I. Zapletnev, D.
Zaretsky, D. Ivashov, A. Kaganovich, M. Kamnev, K. Karmakulov, E. Kirya-
kov, A. Kovalev, Ya. Kovalev, I. Kovalenko, A. Kozhevnikov, S. Kopienko, N.
Korsakov, S. Kravchenko, V. Kudryavtsev, P. Kukushkin, A. Kulinich, A. Kun-
chenko, V. Kupriyanov, R. Kuskov, A. Lakutin, M. Leibovich, G. Leontiev, A.
Lekhan, A. Makeev, S. Malachiev, A. Malyshenok, S. Martynenko, A. Matveev,
A. Machnev, A. Medvedev, D. Mezhuev, S. Melnikov, E. Mitroshkin, A. Moi-
seev, S. Murzin, M. Mukhin, A. Nasibullin, A. Nuraliev, S. Nuraliev, S. Olen-
chuk, L. Onuchin, I. Orlov, M. Otstavnov, D. Pavlenko, I. Pivkin, V. Piskarev,
A. Plyakin, P. Romanov, A. Rukin, D. Rusanov, M. Sablin, E. Silin, S. Sitnikov,
D. Sluzhbin, A. Smirnov, E. Smirnov, Y. Smirnov, A. Sobolev, V. Sokolov, P.
Solodky, A. Solyanik, V. Sosnovsky, E. Storozhenko, G. Suaridze, S. Suvorov,
D. Sysoenkov, S. Sychev, D. Tishkov, A. Toporkov, A. Tretyakevich, A. Tro-
fimchuk, A. Trubkin, V. Tunegov, A. Tyushkin, V. Filippov, A. Khasanov, T.
Khusaenov, A. Tsilyabin, V. Cheskis, V. Cheremisinov, P. Chikov, A.
Chicherin, A. Chkadua, P. Churbanov, S. Shvets, A. Shevchenko, M. Shirokov,
V. Shulga, A. Scherbinin, A. Edemsky.
When you dial the hot line, ensure that you are not far from your computer and you
have this guide and your registration card with you. Be prepared to provide the sup-
port representative with the brand and technical specifications of your computer and
printer.
When you dial the hot line, you will be connected with a technical specialist. Be
ready to provide the name of your company, your software version number (it can be
found on the software distribution CD and on your registration card) and other regis-
tration information. The information that you provide will be verified against the
registration form that you sent to 1C Company.
The technical support specialist might attempt to reproduce your situation on their
computer. They might provide the solution immediately or consult software devel-
opers. Do not worry about contacting a specific expert: we guarantee that all our
support specialists are highly trained. The log of all support calls is maintained, so
when calling about a previous issue you can refer to the date and time of your previ-
ous call.
WE ARE ALWAYS HERE TO HELP YOU!
Contents
Introduction 15
Overview ......................................................................................................... 15
What you need to know ............................................................................... 16
Books included in the documentation......................................................... 16
Update and migration notes delivered with1C:Enterprise ..................... 17
Agreed notations ........................................................................................... 17
Overview
Chapter 1 contains system requirements for 1C:Enterprise deployment and
operation.
Chapter 2 describes installation of 1C:Enterprise.
Chapter 3 describes installation of 1C configurations.
Chapter 4 describes system startup and customization of the startup win-
dow.
Chapter 5 contains information on managing the list of infobases.
Chapter 6 explains 1C:Enterprise administration capabilities.
Chapter 7 describes standalone server starting and managing.
Chapter 8 describes how to configure web servers to work with 1C: Enter-
prise.
Chapter 9 describes how to configure web browsers to run the web client.
Chapter 10 describes the unauthorized use protection system and its set-
tings.
Chapter 11 describes the process of updating the system.
Chapter 12 describes the uninstallation process.
Chapter 13 describes administration of the mobile application.
The appendices contain various auxiliary information:
• Description of the directory structure that will be created after the in-
stallation, and descriptions of some files and directories.
• Description and location of internal files.
• Description of utilities for: infobase testing and correcting, integrity
monitoring, infobase conversion, and ring utility.
• Description of the command line for starting the 1C:Enterprise client
applications and Designer.
• Components and licenses used.
IMPORTANT! Information on administration of the client/server mode of
1C:Enterprise is provided in the 1C: Enterprise 8.3. Client/server mode
Administrator Guide. This book is part of the delivery of 1C:Enterprise
server software.
What you need to know
It is assumed that you are familiar with the operating system of the comput-
er where 1C:Enterprise is installed (Microsoft Windows or Linux, for more
information on compatibility see: https://1c-
dn.com/library/system_requirements/), and possess basic skills of work in
it.
You also need basic operating system administration skills.
Some administration processes might require administrative access rights
and operation system distribution package.
Agreed notations
Keys. Keys Enter, Esc, Del and others are given without quotation marks.
The Arrow keys phrase is used to specify all arrow keys at once. They are
referred individually as Up Arrow, Down Arrow, Right Arrow, and Left
Arrow.
Keyboard shortcuts. When a command requires a keyboard shortcut it will
be stated as Ctrl + F3.
Buttons. Form buttons are given without quotation marks, like OK, Cancel,
Delete and others.
1C:Enterprise language keywords. 1C:Enterprise language keywords are
highlighted by specific font and are given as in modules, for example:
WorkingDate. This manual contains references to some parts of
1C:Enterprise language description (sections, methods, attributes and oth-
ers). For these descriptions, see the application help (1C:Enterprise lan-
guage section).
Menu actions. The menu actions are described as follows: Menu - Sub-
menu - Submenu - … - Menu item. Example: "Use Table - View -
Scope to change the scope of the picture" means: "Use the Scope item of
the View submenu of the Table menu of the application's main menu". If
any menu, other than the main menu, is referred, it is specified explicitly.
1C:Enterprise modes. 1C:Enterprise can run in two modes: configuration
setup and verification (hereinafter - Designer), and configuration execution
(hereinafter - 1C:Enterprise mode).
In the context of this manual, "user" means an expert participating in appli-
cation development or maintenance.
The %SYSTEMROOT% expression means the operating system envi-
ronment variable with the operating system installation directory. If the op-
erating system was installed using default settings, this expression equals to
C:\Windows
1.7.2. On Linux
For Linux, the following libraries must be installed:
• webkitgtk-3.0.0 1.4.3 and later
To use other functions, the following libraries might be required:
• fontconfig:
Library name: libfontconfig
Version: 2.3.0 or later
Purpose:
For the managed mode of the 1C:Enterprise server
When Chart, GraphicalSchema, or
SpreadsheetDocument objects are used on server
When saving to PDF
• Libgsf:
Library name: libgsf-1
Version: 1.10.1 or later
Purpose: Document export from and import to XLS
• Glib:
Library name: libglib-2.0
Version: 2.12.4 or later
Purpose: Document export from and import to XLS
• unixOdbc:
Library name: libodbc
Version: 2.2.11 or later
Purpose: operations with external data sources.
• Kerberos:
Library name: libkrb5
Version: 1.4.2 or later
Purpose: OS authentication
• GSS-API Kerberos:
Library name: libgssapi_krb5.
Version: 1.4.2 or later
Purpose: OS authentication
• Microsoft Core Fonts
1C:Enterprise loads the library with name specified as Li-
braryName.so.X.Y, where:
• LibraryName - one of the values listed above.
• so - library file flag.
• X.Y - current library suffix digits.
Only libraries registered in runtime dynamic linker cache can be loaded.
(You can read this information by running the ldconfig -p command). If
several versions of the library are available, the latest one will be loaded.
1.8. Restrictions
For file infobase collaboration, all client applications must have the same
version. At the same time, the client applications may use any architecture
(32- or 64-bit application) and any operating system (Windows or Linux).
Maximum number of concurrent connections per infobase is 1,024.
Online collaboration using file infobases is only supported for network re-
sources that are accessed via SMB protocol (CIFS). These resources can be
located on both Windows and Linux computers.
Client application running on macOS does not support network infobases.
Please remember that bitness of add-ins and COM objects (on Windows)
must match bitness of the 1C:Enterprise application used (thin or thick cli-
ent, server, or web server). In other words, if a COM object only has 32-bit
version, it cannot be used in the 64-bit version of 1C:Enterprise.
NOTE. If you choose to install the server as a service, you need to specify a
password for the selected user, otherwise the installer will not be able to
start the server.
If 1C:Enterprise is already installed as a Windows service on the computer,
the installer will reinstall the service.
2.3.2.6. Installation start
Click Install to start the installation procedure that:
• Creates the required directories
• Copies files for the selected components
• Creates configuration files
• Registers server software components
• Creates 1C:Enterprise startup shortcut on the desktop
• Starts 1C:Enterprise server if you chose to install the server as a Win-
dows service
2.5.3. On macOS
Client application installer for macOS does not support configurable instal-
lation options. All available components are installed.
2.7.2. On Linux
2.7.2.1. Recommendations for using file
infobases
When using infobases in file mode on a Linux-based computer, please con-
sider the following:
• When connecting a network resource on Linux using mount.cifs
command, do not use nobrl key
(http://www.samba.org/samba/docs/man/manpages-
3/mount.cifs.8.html).
• When granting access to the infobase directory using Samba, do not
specify the locking=no parameter for the published resource in
smb.conf file
(http://www.samba.org/samba/docs/man/manpages-
3/smb.conf.5.html).
• If multiple users are expected to access a file infobase on the same
computer, consider the following:
On Linux, the user that started the file creation process is specified
as the owner of the created file. Files created in 1C:Enterprise have
permission to be read and written only by their owner or the owner
group. As a result, when several concurrent users access a file in-
fobase, only the first user can access the created files. To work
with the infobase concurrently, all users need to be in the same
group and this group needs to be set as the owner of the infobase
directory. After this, you also need to set the set-group-ID
flag for this directory using chmod g+s ib_dir command, where
ib_dir - is the name of the infobase directory. Now, the group that
owns the main infobase directory will be assigned as the owner of
any files to be created in this directory, instead of the main group
of a user that creates the files.
On Linux, 1C:Enterprise creates files with explicit 0660 permis-
sions (read/write privileges for the file owner and owner group).
Manually setting a value for file creation mode mask (umask) in
the environment can only result in clearing some of the permis-
sions, making for stricter file creation rules. Because access per-
mission flags for other users are not set for the platform-created
files, you cannot modify them with umask.
If the infobase is accessed using a Linux-based web server, add the
user on whose behalf Designer is started to www-data group.
Then, make www-data the owner of infobase directory and set
set-group-ID flag for this directory. Next, add umask 002
string to the /etc/apache2/envvars file. Adding this string pre-
vents users from clearing a flag that allows the owning group to
write (g-w) to the files created by Apache web server.
This procedure is also used to configure Linux for shared access to configu-
ration repository; however, the configuration repository directory is used
instead of the infobase directory.
ManagedApplicationDescriptor /home/usr1cv8/www/MyApp/default.vrd
Make sure you specify a valid path to key file. The user on whose behalf
Apache is started must be able to access this file.
IMPORTANT! In a domain with both Windows 2000 and Windows 2003
controllers, Linux-based web servers and Windows-based 1C:Enterprise
servers, Kerberos authentication might not work due to the specifics of Ker-
beros implementation for Windows 2000.
Item Description
1C:Enterprise Starts the 1C:Enterprise launcher
(1cestart)
1C:Enterprise (A.B.C.D) Starts the interactive launcher (1cv8s)
Thin client (A.B.C.D) Starts 1C:Enterprise in thin client mode
Thick client (A.B.C.D) Starts 1C:Enterprise in thick client mode
Designer (A.B.C.D) Starts 1C:Enterprise in Designer mode
Install protection driver Starts installation of the protection driver
Remove protection driver Starts removal of the protection driver
ReadMe -Additional Infor- Additional information not included in the
mation documentation
1C:Enterprise 7.7 infobase Converts infobases from 1C:Enterprise 7.7
converter (A.B.C.D) format
Item Description
1C:Enterprise server admin- Server cluster administration utility (if any
istration 1C:Enterprise server cluster access com-
ponents are installed)
Start server (A.B.C.D) Starts the 1C:Enterprise server as a service
(if the Install 1C:Enterprise 8 server as
Windows service check box was selected
during server installation) or as an appli-
cation (if the Install 1C:Enterprise 8
server as Windows service check box
was cleared during server installation). In
this case, server shutdown is identical to
closing a regular application.
Register server administra- Registers the 1C:Enterprise server admin-
tion utility (A.B.C.D) istration utility (radmin.dll) for a specific
version, so that you can connect to the
servers of this version using the admin-
istration utility.
In this table:
• Specifying the name of an application without specifying a version
means the application or file from the version that was installed latest.
• Specifying (A.B.C.D) next to an application name means that a sepa-
rate menu item is created for each installed version, where A.B.C.D
means the full number of the installed version. For example, if two
versions are installed – 8.3.12.100 and 8.3.12 150 – two menu items
will be created, Thin client (8.3.12.100) and Thin client
(8.3.12.150).
• If the 64-bit version of the 1C:Enterprise is installed, the name of the
menu folder and names of items in this folder will contain x86-64.
4.1.2. On macOS
When installing 1C: Enterprise, the following structure will be created in
the Programs menu:
1C:Enterprise 8 (folder)
1C:Enterprise
A.B.C.D (folder)
1C:Enterprise
1C:Enterprise – Thin client
1C:Enterprise – Thick client
Remove 1C:Enterprise
Item Purpose
1C:Enterprise Starts the 1C:Enterprise launcher
(1cestart)
A.B.C.D Version application directory with full
number A.B.C.D
1C:Enterprise Starts the interactive launcher (1cv8s)
1C:Enterprise - Thin client Starts 1C:Enterprise in thin client mode
1C:Enterprise - Thick client Starts 1C:Enterprise in thick client mode
Remove 1C:Enterprise Removes 1C:Enterprise of the version
number which is the name of the folder to
contain this menu item.
In this table:
• Specifying the name of an application without specifying a version
means the application or file from the version that was installed latest.
4.3.2. Launcher
4.3.2.1. General information
Location of 1cestart file:
• On Windows OS:
32-bit application in the 64-bit OS:
%PROGRAMFILES(x86)%\1cv8\common
Otherwise: %PROGRAMFILES%\1cv8\common
• On Linux:
32-bit OS: /opt/1C/v8.3/i386
64-bit OS: /opt/1C/v8.3/i386
• On macOS:
64-bit OS: /opt/1cv8/A.B.C.D Where A.B.C.D - is the full number
of client application version. For example, for 1C:Enterprise
8.3.7.1000, 1cestart is located in /opt/1cv8/8.3.7.1000.
The launcher starts all types of client applications (thick client, thin client,
web client), as well as Designer.
The launcher can be started without parameters or with a reference to a spe-
cific infobase.
If the client computer is Windows-based:
• The launcher can also be located on a network resource (no additional
software components required). It can be used both for initial installa-
tion of 1C:Enterprise and installation of new versions. If the launcher
finds a shared configuration file in its directory, a link to this configu-
ration file is saved as a value of CommonCfgLocation parameter
of the local configuration file.
• When installing 1C:Enterprise from the launcher, you might be
prompted to restart the operating system.
Example:
This HTML page illustrates a native authentication form of an infobase lo-
cated at http://localhost/demoapp.
<HTML xmlns="http://www.w3.org/1999/xhtml"><HEAD>
<META http-equiv="Content-Type" content="text/html; charset=utf-8"
/>
<BODY>
<FORM action="http://localhost/demoapp/e1cib/start" method="post">
User: <INPUT id="usr" name="usr" /><BR />
Password: <INPUT id="pwd" type="password" value="" name="pwd" />
<BR />Low speed: <INPUT id="lowclientconnectionspeed"
type="checkbox" name="lowclientconnectionspeed" /><BR />
Startup parameter: <INPUT id="launchparameter"
name="launchparameter" /><BR />
Interface language: <SELECT id="systemlanguage"
name="systemlanguage">
<OPTION value="ru" selected="">Russian</OPTION>
<OPTION value="en">English</OPTION>
</SELECT><BR />
Session locale code: <SELECT id="localecode" name="localecode">
<OPTION value="ru" selected="">Russian</OPTION>
<OPTION value="en">English</OPTION>
</SELECT><BR />
Data area: <INPUT id="zone" name="zone" />
<INPUT id="authfailhandling" type="hidden" value="error"
name="authfailhandling" />
<P><INPUT type="submit" value="OK" /> </P>
</FORM>
</BODY>
</HTML>
6.2.8.3. OS authentication
The user can be authenticated implicitly through the operating system func-
tionality. To enable this authentication type, you need to match the
1C:Enterprise user to an operating system user. On startup, 1C:Enterprise
prompts the operating system for information on the currently authenticated
OS user. For this purpose, Windows uses SSPI interface and Linux uses
GSS-API.- Then the match between the operating system user and
1C:Enterprise user is verified. If the matching user is found - 1C:Enterprise
user is authenticated and the authentication dialog box is not displayed.
NOTE 1. Client applications for Linux or macOS do not support operating
system authentication.
NOTE 2. Operating system authentication is not supported if the client ap-
plication connects to the infobase using the Apache web server on Win-
dows.
NOTE 3. To ensure stable OS authentication in Windows for web client or
thin client connection via web server, add the infobase address to the list of
reliable websites using the web browser properties dialog box.
The operating system user is described in the following format:
\\domain_name\ username. The username contains Latin letters on-
ly. The format of domain name and username may depend on domain con-
troller settings and its account settings. Correct name of the operating sys-
tem user can be found in the records of CONN event in the technological log.
Look for Txt property that starts with Srvr: DstUserName2:. For exam-
ple, 30:30.551013-
0,CONN,2,process=rmngr,OSThread=24204,t:clientID=3,Txt=Srvr:
DstUserName2: d1.d2\user1(d1.d2\user1) event means that the OS user
name in the infobase user description must be as follows: \\d1.d2\user1.
When forced 1C:Enterprise authentication is required, specify /WA- com-
mand-line parameter in the startup command line of the client application.
The /WA+ command-line parameter forces OS authentication (enabled by
default).
The first three strings form the HTTP request that will be used by the plat-
form. The remaining strings create the template of the second factor provid-
er, which will send the request using the POST method and have the name
Request- response.
As probably it has already become clear if it is necessary to create a tem-
plate for the provider of the second factor working according to the second
option (all actions are executed by the provider itself, the platform only ini-
tiates the operation start and requests the authentication result), then the
above example should be processed in such a way that:
1. The authentication request met the requirements of the provider used.
2. A request was generated (and set in the template) to check the authen-
tication results. This request will be executed after the user "inform"
the client application that he had passed authentication with the pro-
vider.
After we saved one or several templates for providers, it became possible to
assign one of the templates to the user. Keep in mind that you can assign
multiple templates to one user and specify how they will be processed.
To set up user settings, two properties of the InfobaseUser object are
used:
• SettingSecondAuthenticationFactor- here you need to
assign an array of objects of the
SettingSecondAuthenticationFactor type.
• ProcessingSettingsForTheSecondAuthenticationFac
tor - describes what the platform will do if several providers of the
second factor are specified, and the first (in the traversal order) pro-
vider returned an error.
After specifying the above properties, the object describing the infobase
user should be recorded.
We need to consider the last moment: where will the platform get the values
that will be substituted for the variables in HTTP requests? To do this, we’ll
take a closer look at the SettingSecondAuthenticationFactor
object. This object contains two fields:
• SettingsTemplateName - here you should specify the name of
the template of the setting of the second factor provider, which was
specified in the Name property when setting the provider template.
• Parameters - you need to assign a match to this property. The
match should contain as many elements as the parameters are con-
tained in the setting template of the second factor provider (with the
exception of the &secret parameter). The key of the correspondence
element is the name of the parameter (without the "&" character), and
the value -is the value of the variable.
Now we have all the information in order to indicate to the infobase user the
necessity to execute two-factor authentication when entering the infobase.
ProviderParameters = New Map;
ProviderParameters.Insert("addr", "http://hostname/resource");
UserSettings = New SettingSecondFactorOfAuthentication;
UserSetting.SettingTemplateName = "Question - answer";
UserSetting.Parameters = ProviderParameters;
User = InfobaseUsers.SearchByName("Seller");
User.SettingsOfSecondFactorOfAuthentication = UserSettings;
User.ProcessingOfSettingOfTheSecondFactorOfAuthentication =
TypeOfProcessingOfSettingsOfTheSecondFactorOf
Authentication.UseNextInCaseOfError;
User.Record();
The platform will replace parameter names with the actual values in the
following properties:
• property HTTPRequest.ResourceAddress;
• property HTTPRequest.Headings;
• body of object request HTTPRequest (the method of specifying the
request body does not affect the substitution work);
• property
TemplateOfSettingOfTheSecondFactorOfAuthenticat
ion.HTTPRequestMethodForAuthentication;
• property
TemplateOfSettingOfTheSecondFactorOfAuthenticat
ion.HTTPRequestMethodForCheckingAuthenticationR
esult.
It remains to mention that if the provider of the second factor selected for
the user is "broken",- the user can not get an access to the infobase. In this
case, the term "broken" means any event that does not allow the provider to
complete its task: there is no Internet for access from the server to the pro-
vider, there is no Internet for access from the provider to the user, an error
has occurred on the provider’s side, etc.
It is also necessary to understand that if you plan to use a third-party pro-
vider of the second factor, then the services of this provider may be paid
and the provider may put forward additional conditions and restrictions that
lie outside the 1C:Enterprise system and are not considered in this docu-
mentation.
Software method
In any run mode, session locks can be enabled using the 1C:Enterprise lan-
guage. The SessionsLock object of the 1C:Enterprise language is used
for this purpose. You can create it in constructor and configure the required
properties for locking new connections.
The global context method SetSessionLock() enables the lock and
GetSessionsLlock() method - gets enabled lock.
6.4.2. By default, when password
is under attack
Password attack is one of the methods which can be used to be granted un-
authorized access to infobase data. In this scenario, a malicious user tries to
hack a password using a pre-defined algorithm, until it is cracked and a
password for a selected user becomes available thereto. To avoid the said
manipulations, 1C:Enterprise supports a dedicated mechanism available in
the infobase client/server mode only.
An administrator manages this mechanism by way of entering the following
infobase parameters (this dialog box is displayed, when you run Main
menu - Administration- Infobase parameters command):
• Max number of failed authentication attempts - defines the num-
ber of attempts allowed to be made by a user to enter their password,
before access is blocked. Access is blocked, as soon as the aggregate
number of successive attempts to authenticate which failed becomes
equal to N+1, where N- is a parameter value. In other words, if this
parameter is equal to 2, a user will be blocked as soon as their third at-
tempt to authenticate fails.
If this parameter is equal to 0, this mechanism is disabled, and the ag-
gregate number of failed attempts to authenticate is not monitored by
the platform.
• Blocking duration when the aggregate number of failed at-
tempts to authenticate is exceeded (in seconds) - defines the
time period when a user is unable to authenticate, if they attempt to
enter a wrong password in excess of the number of attempts specified
in Max number of failed authentication attempts.
• User name add-on codes when authentication is blocked - al-
lows it to block authentication attempts made by already blocked user.
Add-on codes are separated by ";". As such, a user name is generated
on the basis of the name of an existing user who have been already
blocked using one of the add-on codes. So far as a user with their
name generated using add-on codes is concerned, the aggregate num-
ber of authentication attempts is equal to that specified for an ordinary
user. As soon as all available attempts to authenticate are made, the
said "extra" user is as well blocked.
The mechanism works as follows:
• A malicious user enters a user name and attempts to hack a password
by way of entering a password expected to be a valid password of a
user. As soon as the aggregate number of failed attempts to authenti-
cate is exceeded, - the user name entered by a malicious user is
blocked.
• If a blocked user attempts to log in using their name and password, - a
warning is displayed specifying that the user has been blocked.
• Whenever add-on codes are specified in an infobase, these can be used
by a user. As such, a user needs to enter their name with an add-on
code. When you use add-on codes, mind the following: an add-on
code is analyzed, only if the user name you enter is not already in-
cluded in the list of infobase users. User name add-on codes specified
in the settings are successively subtracted from a user name. Further,
it is verified whether an infobase user with such name already exists,
or not. The following things should be noted in this description: avoid
using add-on codes which are similar to the end of the name of an ex-
isting user. If such a user is blocked by the mechanism under review,
they will not be able to log in using add-on codes. Moreover, start
each add-on code using the so-called "technical" symbols, which are
unavailable in the user name, for instance "!", "^" etc.
To view a list of blocked users, use a form available in Designer and run
Main menu - Administration - Blocked authentication command. This
form is available to each user with Administration or
DataAdministration rights assigned thereto. For information having
regard to blocked users, see the event log.
Details of blocked users are stored by the server cluster auxiliary function
service. It means that:
1. If a single administrator is blocked, to log in using their user name -,
the server cluster has to be reloaded.
2. Failed log-in attempts are counted from the recent successful log-in
without any time limitation. However, when you reload the server
cluster, all counters for all infobase users are reset.
To manage a blocking mechanism, use AuthenticationBlock global
context object. This object is designed as well to modify mechanism set-
tings (use GetSettings()/SetSettings() methods for that pur-
pose). Moreover, a list of current blocks can be displayed using
GetBlocks() method.
In 1C:Enterprise language you can forcefully unblock all or certain blocked
users. For that purpose, get a list of current blocks displayed as
UserAndInfobaseAuthenticationBlock object array. Further,
you need to make up a list of users to unblock (based on
UserAndInfobaseAuthenticationBlock object properties). Final-
ly, call Unblock() method for this object in relation to blocked users so
selected.
6.5. Regional infobase settings
Regional infobase settings affect the format of date, time, numbers, logical
constants, as well as string order in infobase lists. To start this mode, click
Administration - Regional infobase settings.
Characters Description
D Day of month. Numbers below 10 are displayed without a
leading zero
Dd Day of month. Numbers below 10 are displayed with a lead-
ing zero
M Month number. Month numbers below 10 are displayed
without a leading zero
MM Month number. Month numbers below 10 are displayed with
a leading zero
MMMM Month name (in words)
Y The last two digits of the year. Years below 10 are displayed
without a leading zero
Yy The last two digits of the year. Years below 10 are displayed
with a leading zero
Yyyy All four digits of the year
The above mentioned characters and groups of characters can be entered in
any sequence. You can specify the separators for day, month, and year.
Time format. Specifies the time format. You can use the following charac-
ters in different combinations:
Characters Description
h, H hours, in 12-hour (h) or 24-hour (H) format. Hours below 10
are displayed without a leading zero
Characters Description
hh, HH hours, in 12-hour (hh) or 24-hour (HH) format. Hours below
10 are displayed with a leading zero
m minutes. Minutes below 10 are displayed without a leading
zero
mm minutes. Minutes below 10 are displayed with a leading zero
s seconds. Seconds below 10 are displayed without a leading
zero
ss seconds. Seconds below 10 are displayed with a leading zero
The above mentioned characters and groups of characters can be entered in
any sequence. You can specify the separator characters to separate hours,
minutes, and seconds.
IMPORTANT! When using regional settings to specify format of date in
input field, only choose settings supported by the input field.
False, True. Specifies logical constants. You can choose these from the
drop-down list, or enter manually.
If necessary, you can configure the event log by using a separate configura-
tion file. This file must have logcfg.xml name and be located in the
1C:Enterprise configuration files directory.
NOTE. To enable a technological log on Windows, make sure the user of
the process writing to the technological log has full rights to access the
technological log directory and to read the technological log owner directo-
ry.
Every 60 seconds, 1C:Enterprise automatically polls the configuration files
directories for logcfg.xml file and, if found, analyzes its content. Thus, you
can modify the parameters of the technological log immediately, without
having to restart the 1C:Enterprise applications.
Volume of the technological log can be significant, so it is advisable to
specify retention time for the log file storage. After the retention time ex-
pires, 1C:Enterprise will delete the outdated log files. If the directory in
which these files were located becomes empty after deleting the outdated
files, the directory is also deleted. This ensures that the entire technological
log directory tree does not contain outdated files and directories.
IMPORTANT! If 1C:Enterprise is running on Linux or macOS, the OS
controls the crash dump generation. In this case, the information about the
fact of an emergency termination of the process and the number of the sig-
nal that caused the termination are placed in the technological log.
IMPORTANT! Please take note that the directory of the technological log
is not intended to store any files unrelated to the technological log. Do not
keep dumps in this directory, and do not keep 1C:Enterprise technological
log in a directory with any unrelated files. If any unrelated files are found in
the technological log directory, the directory is considered invalid and the
log is not created.
Each log file contains events for 1 hour and is named yymmddhh.log,
where:
• yy- the last two digits of the year
• mm- month number
• dd- day number
• hh- hour number
Log files are in text format. Information about completion of each event is
recorded on a new line.
Example:
16:08.8750-
9060,CALL,0,process=rphost,p:processName=DebugControlCenter,t:clien
tID=221,t:applicationName=Debugger,t:computerName=COMP1,Interface=5
cf29e71-ec34-4f01-b7d1-3529a3da6a21,Method=0
16:08.8911-
1,DBPOSTGRS,2,process=rphost,p:processName=Database,t:clientID=216,
t:applicationName=1CV8,t:computerName= COMP1,t:connectID=125,Usr=
User2,Trans=1,dbpid=58152,Sql="SELECT 1::INT8 FROM PG_CLASS WHERE
pg_catalog.pg_table_is_visible(OID) AND RELKIND='r' AND
RELNAME='params' LIMIT 1",Result=PGRES_TUPLES_OK
16:08.8913-
1,DBPOSTGRS,2,process=rphost,p:processName=Database,t:clientID=216,
t:applicationName=1CV8,t:computerName=
COMP1,t:connectID=125,Usr=User2,Trans=1,dbpid=58152,Sql="SELECT
Creation,Modified,Attributes,DataSize,BinaryData FROM Params WHERE
FileName = 'ibparams.inf'",Result=PGRES_TUPLES_OK
6.14.5.2. On Linux
This section describes the steps to configure Linux to enable generation of
crash memory dumps.
NOTE. The recommendations in this section are fully applicable to Fedora
Core 4 and similar versions. For other Linux versions, the name and syntax
of the commands described here may be different. For details, refer to the
help system of your Linux version.
By default, crash dumps are disabled. Suppliers of Linux distributions rec-
ommend to include the creation of dumps only on computers intended for
development, but not on production computers.
Where <username>- is the name of the user on whose behalf the applica-
tion of the “1C: Enterprise” system is running.
This setting will be valid until the computer is restarted. In the above exam-
ple, the dumps will be placed in the /tmp directory and the names of the
dumps will be generated from:
• core prefix
• Name of the executable file
• ID of the process that initiated crash dump generation
To apply the name template and the path on the permanent basis, you must
add the following line to the /etc/sysctl.conf file:
kernel.core_pattern=/tmp/core.%e.%p
The path specified in the settings must be allowed for writing for the users
on whose behalf the applications that generate crash dumps are running.
6.14.5.3. On macOS
This configuration file generates a technological log that includes all infor-
mation from the previous example, and information on all operations that
take longer than 10 seconds. This can be useful for detecting user actions
that required a long time to complete, for optimization purposes. The dura-
tion of events is expressed in hundreds of microseconds.
<?xml version="1.0" encoding="UTF-8"?>
<config xmlns="http://v8.1c.ru/v8/tech-log">
<dump create="false"/>
<log location="C:\v8\logs" history="168">
<event>
<eq property="name" value="admin"/>
<gt property="duration" value="100000"/>
</event>
<event>
<eq property="name" value="conn"/>
<gt property="duration" value="100000"/>
</event>
<event>
<eq property="name" value="excp"/>
<gt property="duration" value="100000"/>
</event>
<event>
<eq property="name" value="proc"/>
<gt property="duration" value="100000"/>
</event>
<event>
<eq property="name" value="qerr"/>
<gt property="duration" value="100000"/>
</event>
<event>
<eq property="name" value="scom"/>
<gt property="duration" value="100000"/>
</event>
<property name="all"/>
</log>
</config>
7.3.2. Setting
A standalone server is installed at the same time as the 1C:Enterprise server
cluster. Separate actions to install a standalone server are not required.
When starting this command file, the following parameters are used:
1. The full version number of the 1C:Enterprise system from which a
standalone server will be used.
2. The instance number of the service to register. In the above example,
the existence of a service with the given number is not checked. Due
to the fact that the standalone server serves one database, with this pa-
rameter you can register your OS service for each served infobase.
3. The full path to the configuration file for this instance of the
standalone server (must be enclosed in double quotes). In this configu-
ration file, all parameters with which the standalone server is to be
started (including database parameters) should be placed. Different
service instances must have their own configuration files.
Example of start of the command file (administrator rights are required):
register-ss.bat 8.3.14.1000 2 "d:\1C DB\standalone-
server\demo\demoma.yml"
After starting the command file with these parameters, the following actions
will be executed:
• Service Name: Standalone server 2;
• Displayed Name: 1C:Enterprise 8.3 standalone server. Copy #2;
• Version of 1C:Enterprise: 8.3.14.1000;
• Service start command line: "C:\Program
Files\1cv8\8.3.14.1000\bin\ibsrv.exe" --service --config="d:\1C
DB\standalone-server\demo\demoma.yml";
• Service start mode: Auto.
In this case, the following operating system commands should be used to
manage the service:
• Service start: sc start "Standalone server 2"
• Service stop: sc stop "Standalone server 2"
• Service deletion: sc delete "Standalone server 2"
By the time the service starts, the configuration file must contain all the
necessary parameters for starting the standalone server.
Server start in daemon mode (Linux OS)
To start a standalone server in daemon mode on Linux OS, execute the fol-
lowing command:
ibsrv --daemon --config="configuration file path"
By the time the standalone server starts in daemon mode, the configuration
file should contain all the necessary parameters for starting the standalone
server.
This information can be recorded to the file or with the help of the --out
parameter of the ibcmd utility or using the stdout redirection to the file: >
file.ext.
It is also worth noting that the stand-alone server running with such a con-
figuration file will start the web client when accessing the
http://localhost:8314/webAccess address.
In this case, the output will contain information about updating the database
configuration:
[ INFO] Creating infobase...
[ INFO] Infobase created
[ INFO] Loading configuration...
[ INFO] Configuration loaded
[ INFO] Database configuration update...
[ INFO] Checking the correctness of the metadata...
[ INFO] Database structure processing...
[ INFO] Service Information Collection...
… information on changes in the infobase structure …
[ INFO] The structure of database tables was changed
[ INFO] Acceptance of changes...
[ INFO] Database configuration update is completed successfully
The first command will actually import the configuration into the infor-
mation database, and the second - will update the database configuration
(with implementation of the database restructuring, if necessary).
Commands execution result:
ibcmd infobase config load …
[ INFO] Importing configuration...
[ INFO] Configuration import is completed successfully
ibcmd infobase config apply …
[ INFO] Database configuration update...
[ INFO] Checking the correctness of the metadata...
[ INFO] Acceptance of changes...
[ INFO] Database configuration update is completed successfully
It should be noted that the export file in this command is indicated without
any named parameter, the last value in the command line. All commands
that require a file as an input parameter will have the same feature.
It should be noted that the export file in this command is indicated without
any named parameter, the last value in the command line.
2. Start the standalone server that will work with the necessary debug
server:
ibsrv --dbms=mssqlserver --db-server=dbServerName --db-user=dbUser
--db-pwd=dbUserPassword --db-name=docs-db --name=docs-db --
debug=http://localhost:1970
If this command is specified, the standalone server will wait for the DBMS
user password (dbUser in the example above) from the standard input
stream. It should be remembered that the server will not invite the user to
execute input in any way.
Another option for specifying a password would be to redirect to stdin
some file or output of another program of the stand-alone server:
ibsrv --dbms=mssqlserver --db-server=dbServerName --db-user=dbUser
--name=docsIB -W --db-name=docs-db < sqlpwd.txt
In this example, the <pc-addr> text means specifying one of the network
interfaces of the computer, on which the standalone server is running.
It should also be remembered that the standalone server provides the feature
to serve several publications of the same infobase. This feature is available
only by specifying the appropriate parameters in the standalone server con-
figuration file.
An example of configuration file:
server:
address: localhost
database:
dbms: PostgreSQL
server: dbServerName
name: dbBase
user: postgres
password: postgres
infobase:
name: clusterDbName
distribute-licenses: yes
schedule-jobs: deny
http:
- base: /lk
OData:
publish: true
reuse-sessions:
mode: dontuse
- base: /partner
web-services:
service:
- name: RemoteManagement
alias: RemoteManagment.1cws
publish: true
reuse-sessions:
mode: autouse
OData:
publish: true
reuse-sessions:
mode: dontuse
32-bit 64-bit
web server web server
32-bit 1C:Enterprise Fully Partially
64-bit 1C:Enterprise Not supported. Fully
Publication is fully - supported both using the configurator and the
webinst utility.
Partially-, it is possible to publish a 32-bit 1C:Enterprise application
for use with a 64-bit IIS web server. The webinst utility is called from
the bin directory of the 32-bit version of 1C:Enterprise. Under Linux,
this publication is not supported.
To publish from the Designer, you should use the publish dialog (Admin-
istration - Publishing on web server ...).
-publish by default
The web client is published to the web server.
-delete
Execution of deletion from the specified directory.
NOTE. When deleting a publication, it is sufficient to specify only the -
wsdir parameter. The remaining parameters can be specified to control the
operation.
<web server>
Specifies for which web server the action will be performed (publish or de-
lete publication):
• -iis -is a web server of Microsoft Internet Information Services ver-
sions 5.1, 6.0, 7.x, 8.x, 10.0 (only when used with Windows OS).
• -apache2 - is Apache 2.0 web server.
• -apache22 - is Apache 2.2 web server.
• -apache24 - is Apache 2.4 web server.
When using the Apache 2.4 web server, you can omit the path to the con-
figuration file using the -confpath parameter.
It should be considered that for the Apache web server version 2.2 and 2.4
there are differences between the changes made in the configuration file of
the web server. Therefore, the incorrectly specified version of the web serv-
er will result in the unavailability of the publication.
-wsdir
Name of the virtual directory.
-dir
Name of the physical directory to which the virtual directory of the web
server will be mapped. The directory must already exist.
For IIS 7.x and later web servers, publishing is not supported if the value of
this parameter points to the %SYSTEMDRIVE%\Inetpub\wwwroot direc-
tory.
NOTE. A directory name must not end with a "\" symbol if it is enclosed in
quotes. Correct: "c:\my path", incorrect: "c:\my path\".
-connstr
Infobase connection string.
-confpath only for Apache
The full path to the configuration file (httpd.conf) of the Apache web serv-
er. This parameter is applicable only when using Apache web servers.
-descriptor
Allows to publish according to the template specified by the existing file,
which is specified in this parameter (including the file path). The name of
the template file does not have to be default.vrd. When publishing, the ex-
isting default.vrd file is completely replaced with the template file. If the -
wsdir or -connstr parameters are specified simultaneously with this param-
eter, then the values of these parameters replace the values of the base and
ib (respectively) attributes of the point element.
If the -descriptor parameter is specified simultaneously with the -delete
parameter, then the virtual directory name (the base attribute of the
point element) and the infobase connection string (the ib attribute of the
point element) are used from the template file. The publication will be
deleted only if both values of the deleted publication and the template file
match.
-osauth only for IIS
When publishing, it configures the use of OS authentication on a web serv-
er. This parameter is applicable only when using IIS web servers.
In this example:
• Publication to IIS web server (-publish -iis parameters) is performed.
• Virtual directory: demoMA (-wsdir demoMA parameter)
• The physical directory to which the virtual directory is mapped:
c:\inetpub\wwwroot\demoMA (-dir
"c:\inetpub\wwwroot\demoMA" parameter)
• Infobase connection string Srvr=server:1741;Ref=demo; (-connstr
"Srvr=server:1741;Ref=demo;")
• The remaining publication parameters will be obtained from the tem-
plate.vrd template file (-descriptor template.vrd parameter).
Example of a command for deleting a publication for IIS:
webinst -delete -iis -wsdir DemoWS
8.4.2. On Windows
8.4.2.1. General information
This section describes how to configure the Windows-based web servers for
the web client operation.
To publish a web client, select the Publish thin client and web client
check box.
8.4.2.2. Internet Information Services
8.4.3. On Linux
8.4.3.1. General information
This section describes how to configure the Linux-based web servers for the
web client operation. After the publication is performed, you must provide
the user, on behalf of which Apache operates, the rights to the executable
files directory (/opt/1C/v8.3/i386/ for the 32-bit version or
/opt/1C/v8.3/x86_64/ for 64- bit version) of a specific version of the
1C:Enterprise application (read and execute). In the case of the file mode of
the infobase, you must give the rights to modify the infobase catalog to the
user, on whose behalf the web server was started.
8.5.2. On Windows
8.5.2.1. General information
This section describes the publication of Web services for Windows-based
web servers. It is assumed that the web server is already installed.
NOTE. To install the IIS web server, you may need a distribution package
of the operating system used.
8.5.2.2. Internet Information Services
8.5.3. On Linux
8.5.3.1. General information
This section describes the publication of Web services for Linux-based web
servers. It is assumed that the web server is already installed.
To publish Web services, select the Publish Web services check box on
the Web services tab, and select the services to be published in the table
below the check box.
After the publication is performed, you must provide the user, on behalf of
which Apache operates, the rights to the executable files directory
(/opt/1C/v8.3/i386/ for the 32-bit version or /opt/1C/v8.3/x86_64/ for
64- bit version) of a specific version of the 1C:Enterprise application (read
and execute). In the case of the file mode of the infobase, you must give the
rights to modify the infobase catalog to the user, on whose behalf the web
server was started.
8.6.2. On Windows
8.6.2.1. General information
This section describes the publication of standard OData Interface for Win-
dows-based web servers. It is assumed that the web server is already in-
stalled.
NOTE. To install the IIS web server you may need a distribution package
of the operating system used.
8.6.3. On Linux
8.6.3.1. General information
This section describes the publication of Standard OData Interface for
Linux-based web servers. It is assumed that the web server is already in-
stalled.
After the publication is performed, you must provide the user, on behalf of
which Apache operates, the rights to the executable files directory
(/opt/1C/v8.3/i386/ for the 32-bit version or /opt/1C/v8.3/x86_64/ for
64- bit version) of a specific version of the 1C:Enterprise application (read
and execute). In the case of the file mode of the infobase, you must give the
rights to modify the infobase catalog to the user, on whose behalf the web
server was started.
8.7.2. On Windows
8.7.2.1. General information
This section describes the publication of HTTP services for Windows-based
web servers. It is assumed that the web server is already installed.
NOTE. To install the IIS web server, you may need a distribution package
of the operating system used.
8.7.3. On Linux
8.7.3.1. General information
This section describes the publication of Web services for Linux-based web
servers. It is assumed that the web server is already installed.
To publish HTTP services, select the Publish HTTP services by default
check box on the HTTP services tab, and select the services to be published
in the table below the check box.
After the publication is performed, you must provide the user, on behalf of
which Apache operates, the rights to the executable files directory
(/opt/1C/v8.3/i386/ for the 32-bit version or /opt/1C/v8.3/x86_64/ for
64- bit version) of a specific version of the 1C:Enterprise application (read
and execute). In the case of the file mode of the infobase, you must give the
rights to modify the infobase catalog to the user, on whose behalf the web
server was started.
These elements describe the URL to the OpenID provider that authenticates
the user to the infobase with OpenID authentication. In this example, the
1C:Enterprise infobase, published at https://myserver.org/users-ib, acts
as the OpenID provider.
This parameter can be configured using the publication dialog on the web
server (OpenID tab).
Authentication request
Description:
Performs authentication request.
Syntax:
https://hostname/ProviderIB/e1cib/oid2op?cmd=auth
Parameters:
openid.auth.user mandatory
Username as specified in the OpenID provider's database.
openid.auth.pwd mandatory
User password.
openid.auth.2FCode optional
Second authentication factor code
opeind.auth.short optional
If the parameters is set to true, the authentication is performed within the
session of the web browser, but not more than the lifetime parameter
value of the default.vrd file, which describes the publication of the in-
fobase of the OpenID provider.
openid.auth.check optional
Response to this request must be checked (the parameter is set to true). It
makes sense only if the openid.return_to parameter is specified.
openid.return_to optional
Contains the target URL that is opened after processing the request.
Returns:
If the openid.return_to parameter is not specified, then an empty
document with the HTTP status code is returned:
• 200 - authentication successful
• 400 - authentication failure
• 402 - login and password authentication is completed successfully.
The second factor code is required. The response should have a header
named 2FAType, which can contain one of the following values:
secretCode - for authentication, enter the secret code;
external - the second factor is executed at the provider side.
At the time of receipt of such a response code, a request to execute the
second authentication factor has already been sent by the OpenID-
provider to the provider of the second authentication factor.
It is understood that the OpenID provider will check the username and
the password, but will not create a user session when it detects the
need to execute the second authentication factor. The session will be
created at the next access, checking the login, the password and the
second factor again.
After receiving a response 402, do the following:
In case of authentication using a code (secretCode), - add the
secret code with additional parameter to the request.
In case of authentication on the provider side (external), - add
nothing. The server will send for check the authentication request
and will check the second factor.
If the openid.return_to parameter is specified, then it is redirected to
the address specified in the parameter. If authentication is successful, the
following parameters are added to the URL:
• openid.auth.user with username as value
• openid.auth.uid with a one-time identifier as a value to validate
this response This parameter is specified if the
openid.auth.check parameter is specified in the authentication
request.
In case of unsuccessful authentication, go to the specified URL without add-
ing any parameters.
• For IIS 7.0 and older -, open the application pool's main settings dia-
log: IIS configuration manager - <Specific server> - Application
pools - <Desired application pool> - Advanced parameters. Set
parameter Allow 32-bit applications to True .
8.10.2. Apache
8.10.2.1. General features
In the case of publishing a file mode of the infobase to the Apache 2.2 web
server (running under Windows), it is recommended to add the following
fragment to the Apache web server configuration file (httpd.conf):
<IfModule mpm_winnt_module>
ThreadStackSize 8388608
</IfModule>
If problems occur during the operation of the infobase associated with the
exhaustion of the stack on the web server side, it is recommended to in-
crease the value of the ThreadStackSize parameter. A detailed descrip-
tion of the ThreadStackSize parameter:
http://httpd.apache.org/docs/2.2/mod/mpm_common.html#ThreadS
tackSize.
When using the Apache web server version 2.2 and later, running the Linux
operating system, please use the multi-process worker module. A detailed
description of this module is available at:
http://httpd.apache.org/docs/2.2/mod/worker.html or
http://httpd.apache.org/docs/2.4/mod/worker.html. If the publication
serves a file version of the infobase, it is not recommended that you allow
the web server to create several working processes that serve one publica-
tion. If in the infobase file mode background jobs are used, for correct oper-
ation purposes the number of working processes in the pool you use must be
equal to 1. To manage the number of working processes, set
ServerLimit 1 parameter in the worker module setup section
(<IfModule worker.c> </IfModule> section) of the web server
configuration file. If a multiprocess processing module is different from the
recommended one, for settings of the number of working processes see
documentation for the module you use.
• If an external web site and web client are published on different web
servers, make sure that a configuration file has the following strings:
LoadModule headers_module modules/mod_headers.so
Header set X-Frame-Options "allow-from %WebSite%"
If there is not need to fine-tune the response header, make sure that none of
the following exist in the configuration file:
LoadModule headers_module modules/mod_headers.so
Header set X-Frame-Options "deny"
This chapter describes the settings for web browsers that you need to do to
operate in a web client.
9.5. Safari
To get started, apply the following settings:
• Start a web browser.
• In the menu, click Safari - Settings....
• On the Security tab, select the Enable JavaScript check box.
• On the Privacy tab, in the Cookies and web site data section, clear
the Block all cookies check box.
You should include the request of the location of the file being saved. To do
this:
• Start a web browser.
• In the menu, click Safari - Settings....
• On the Main tab, set the Folder for downloading files to Ask for
each download.
10.2.3. Specifications
One key of series ORGL8, ORGL8A and ORGL8B can simultaneously
work on the same computer. The licenses are searched in the following or-
der:
• In the ORGL8 key
• In the ORG8A key
• In the ORG8B key
The 32-bit server USB security key enables to run an arbitrary number of
32-bit working processes on a single physical computer. The 64-bit server
USB security key enables to run an arbitrary number of 32-bit and 64-bit
working processes on a single physical computer.
There is a function of storing the protection key, which license was obtained
by the user during the last connection. During the next access attempt, a
license will be obtained from this key. If a license cannot be obtained from
the stored key, the search for an available license will be performed as de-
scribed above.
TIP. It is recommended that you first install the HASP Device Driver, and
then attach the key to the USB port.
IMPORTANT! Disconnecting the USB protection key from the USB port
during operation is prohibited!
In case of uselessness the HASP Device Driver can be removed from the
system. To remove HASP Device Driver, select the menu item Start - Pro-
grams - 1C:Enterprise 8 -Additionally - Protection driver removal.
To remove the HASP Device Driver, you can also use the following com-
mand line:
haspdinst -r
10.2.7.2. On Linux
HASP Device Driver for Linux OS is available for download from the man-
ufacturer's website.
To install the HASP Device Driver, perform the following steps (actions
must be performed as administrator):
• Unpack the archive by executing the command:
tar xzf HASP_SRM_LINUX_3.50_Run-time_Installer_script.tar.gz
• Install the driver by executing the command (make sure that you enter
the dot at the end of the command line):
./dinst .
TIP. It is recommended that you first install the HASP Device Driver, and
then attach the key to the USB port.
IMPORTANT! Disconnecting the USB protection key from the USB port
during operation is prohibited!
To remove the driver key, go to the directory with the unpacked driver and
execute the command:
./dunst
10.2.7.3. On macOS
The distribution of the protection driver during installation is copied to the
installation root directory and has the name Sentinel_Runtime- <driver
version>.dmg, where <driver version> - is the version of the protection
driver.
To install the driver, open this archive using the Finder and run the Install
Sentinel Runtime Environment file and follow the instructions of the in-
stallation program.
TIP. It is recommended that you first install the HASP Device Driver, and
then attach the key to the USB port.
NOTE. Disconnecting the USB protection key from the USB port during
operation is prohibited!
To delete the driver, open this archive using the Finder and run the Unin-
stall Sentinel Runtime Environment file and follow the instructions of the
uninstall program.
Fig. 102. Choosing the installation path for HASP License Manager
At the next step of installation, you are prompted to select a group in which
the shortcuts for starting the HASP License Manager and the help file will
be placed. By default, a new group is created with the name HASP License
Manager, but you can select an existing group or change the name of the
group being created.
Or:
nsrvw32 /tcpip
When you start the nhsrvw32.exe program, the following parameters can
be used.
-addrpath=<path>
Specifies where to save the haspaddr.dat file. By default, the file is saved
in the directory where the HASP License Manager was downloaded.
-ipx
Instructs the HASP4 Net application to use the IPX protocol with SAP.
-ipxnosap
Instructs the HASP4 Net application to use the IPX protocol without SAP.
When using the HASP License Manager for Win32, other protocols can be
loaded using the-tcpip or -netbios commands. In this case, the HASP Li-
cense Manager creates a newaddr.dat file that contains the address of the
station where the HASP License Manager is running. When you download
the HASP License Manager with one of these keys, only those protected
applications that have access to the newaddr.dat file will be able to ex-
change data with it.
-ipxsocket num=<number>
Use this parameter if you want to change the socket that is used to exchange
data with HASP License Manager. The default socket is 7483 (hex value).-
-localnet
This parameter should only be used if you want the HASP License Manager
to serve the stations exclusively on the local network. If the HASP License
Manager receives requests from workstations that are not on the local net-
work, they get error code 140.
-nbname=<name>
Assigns a NetBIOS name to the HASP License Manager. The parameter
action is identical to -nethaspnb name.
-netbios
This parameter allows you to use the HASP4 Net application only with
NetBIOS protocol. When using the HASP License Manager for Win32,
other protocols can be loaded using the -tcpip or -ipxnosap commands.
-portnum=<number>
If you use TCP/IP, this parameter allows you to specify a network port that
will use the HASP License Manager. The default port is 475.-
-srvname=<name> [,name]
Assigns one or more IPX, TCP/IP, or NetBIOS names to the HASP License
Manager. A maximum of 6 names can be assigned.
-tcpip
This parameter allows you to use the HASP4 Net application only with
TCP/IP protocol. When using the HASP License Manager for Win32, other
protocols can be loaded using the -ipx or -netbios parameters.
-use lananum=<x> [,x]
Instructs HASP License Manager to operate with specific communication
channel numbers.
-userlist
Limits the number of users serviced by the HASP License Manager. The
default value is 250.-
10.2.8.1.2. Running HASP License Manager as a
Microsoft Windows service
HASP License Manager can be started as a Microsoft Windows service
only if it was installed to operate as a service. And this, as noted above, is
possible only in the Microsoft Windows 2000 and earlier versions of operat-
ing systems.
When you install HASP License Manager as a Microsoft Windows service,
it is installed as a startup, i. e. the HASP License Manager will start every
time you start Microsoft Windows.
If necessary, you can change the startup settings of the service and start and
stop it manually.
To start, stop, and configure the HAPS License Manager service manually,
you should refer to the control menu Start- Setup- Control Panel- Admin-
istrative Tools - Service (Start- Control Panel- Administrative Tools -
Services). In the list of services that appears, you need to find the HASP
Loader service and right-click it. Through the context menu that appears,
you can perform all the necessary actions with the service.
10.2.8.2. On Linux
Download HASP License Manager for Linux before proceeding with the
installation. HASP License Manager also requires you to install HASP De-
vice Driver.
To install the HASP License Manager, perform the following steps (actions
must be performed as administrator):
• Copy the downloaded file to the directory where the HASP License
Manager will be located (for example,/opt/hasplm).
• Unpack the archive by executing the command:
tar xzf hasplm_linux_8.30.tgz
Adding a command to the rc.local file will cause the HASP License
Manager to start automatically when the system restarts.
• Start HASP License Manager by executing the command:
hasplm
If you want to configure the HASP License Manager using the nhsrv. ini
configuration file, the path to the configuration file should be specified in
the HASP License Manager command line:
/opt/hasplm/hasplm -c /etc/nhsrv.ini
[NH_TCPIP]
NH_SERVER_ADDR=192.168.0.12
NH_PORT_NUMBER=475
NH_TCPIP_METHOD=UDP
NH_USE_BROADCAST=Disabled
Single-user, 1 user 1 1 1 3
License
Type Set of PIN codes
Qty
Combined, 5 users 5 1 5 8
5 1 3
Combined, 10 users 10 1 10 14
10 1 3
Combined, 20 users 20 1 20 25
20 1 3
Multi-user, 50 users 50 50 1 3
10.3.7.1. On Windows
In Windows, software license files can be located in the following directo-
ries (directories are listed in the search order):
• Directory of configuration files for a specific platform version. By de-
fault- C:\Program Files\1cv8\8.3.xx. Yyy\bin\conf.
• %USERPROFILE%\Local Settings\1C\1cv8\conf
(%LOCALAPPDATA%\1C\1cv8\conf for Windows Vista and later)
directory of the user, on behalf of which the application operates.
• The directory specified in the Conf.cfg file that is located in the
bin\conf directory of the specific version.
• %ALLUSERSPROFILE%\Application Data\1C\1cv8\conf
(%ALLUSERSPROFILE%\1C\1cv8\conf for Windows Vista and lat-
er) data directory for all users of the computer.
• %ALLUSERSPROFILE%\Application Data\1C\licenses
(%ALLUSERSPROFILE%\1C\licenses for Windows Vista and later)
data directory for all users of the computer.
• %ALLUSERSPROFILE%\1C\licenses (%ProgramDa-
ta%\1C\licenses for Windows Vista and later) data directory for all
users of the computer.
If no license was found in any of these directories, the
%APPDATA%\1C\1cv8\ directory is used for search. If there is a loca-
tion.cfg file in this directory, the directory specified in the location parame-
ter will be used for the search.
10.3.7.2. On Linux
In Linux, software license files can be located in the following directories
(directories are listed in the search order):
• conf directory of the installed version. For the 32-bit version of
1C:Enterprise, the path to this directory will be as follows:
/opt/1c/v8.3/i386/conf, and for the 64-bit version:
/opt/1C/v8.3/x86_64/conf.
• Directory ~/.1cv8/conf (~- home directory of the user, on behalf of
which 1C:Enterprise operates).
• The directory specified in the conf.cfg file that is located in the conf
directory of the specific version.
• Directory /var/1C/licenses.
If no license was found in all of these directories, the ~/.1cv8/1C/1cv8/
directory is used for search. If there is a location.cfg file in this directory,
the directory specified in the location parameter will be used for the search.
10.3.7.3. On macOS
In macOS, software license files can be located in the following directories
(directories are listed in the search order):
• conf directory of the installed version. The path to this directory will
be as follows: /opt/1cv8/a.b.c.d/conf, where A. B. C. D - the full
version number of the 1C:Enterprise application.
• Directory ~/.1cv8/conf (~ - home directory of the user, on behalf of
which 1C:Enterprise operates).
• The directory specified in the conf.cfg file that is located in the conf
directory of the specific version.
• Directory /var/1C/licenses.
If no license was found in all of these directories, the ~/.1cv8/1C/1cv8/
directory is used for search. If there is a location.cfg file in this directory,
the directory specified in the location parameter will be used for the search.
10.4. Determining if
1C:Enterprise can run
10.4.1. When you start the client
application
When starting 1C:Enterprise checks the possibility of running by the fol-
lowing algorithm (if at any step the necessary license is found, further
search stops):
1. On computer with the client application:
An attempt is made to obtain a license from the same type of soft-
ware license file or HASP protection key (series, network, or lo-
cal), from which the license was obtained during the last success-
ful connection
Search for software licenses is performed on the local computer
Search for local HASP key is performed
Search for multi-user HASP key available with the HASP License
Manager is performed.
If the configuration is basic, the client application searches for the
base version license on the local computer.
2. On the cluster manager computer to which the session data service is
assigned:
An attempt is made to obtain a license from the same type of soft-
ware license file or multi-user HASP protection key (series, net-
work, or local), from which the license was obtained during the
last successful connection
Search for software licenses on the computer of the 1C:Enterprise
server cluster manager is performed
Search for multi-user HASP keys installed on the computer of the
1C:Enterprise server cluster manager is performed
Search for multi-user HASP key available with the HASP License
Manager is performed.
3. On the cluster manager computer to which the Licensing Service is
assigned:
An attempt is made to obtain a license from the software license
file, from which the license was obtained during the last successful
connection
Search for software licenses on the computer of the 1C:Enterprise
server cluster manager is performed
If the search for the HASP protection key is disabled
(UseHwLicenses=0) using the 1cestart.cfg configuration file, it does
not search for available licenses in the HASP protection keys located on the
client computer (both local and network) and does not attempt to obtain a
license from the saved key.
11.1. Update
If setup.exe is started from the distribution package directory of the ver-
sion that is already installed on the user's computer, the installed version
will be automatically updated according to the settings specified by
Installcomponents parameter of the configuration files.
Starting setup.exe from a distribution package directory that is not in-
stalled on your computer will install this version, and will not update any of
the previously installed versions.
13.4. Backup
Data backup is performed depending on the mobile application.
If you use a mobile application that is not associated with the remote sys-
tem, you can use the standard tools of your mobile device operating system
for backup. Keep in mind the following features of the behavior of the sys-
tem running iOS: immediately after the infobase created from the template,
it is excluded from the backup process. After the infobase is written using
extensions of object and register forms, the infobase is included in the
backup process.
If the application synchronizes data with a remote system, perform a data
synchronization session. The need to use the built-in backup tools after the
synchronization is performed depends on the presence of data in the mobile
application that are not synchronized with the remote system. If there is no
such data, in case of issues, the application can be recreated, and the initial
data initialization can be performed from the remote system.
You can configure backup to a mobile device.
Appendix 1.
Structure of the
installation directory
and assigning
directories and files
1.1. On Windows
By default, the application will be installed in the
%PROGRAMFILES%\1cv8 directory (we will refer to this directory as the
root installation directory). If you are installing the 32-bit version of the
1C:Enterprise application on a 64-bit version of Windows, the root installa-
tion directory will have the name %PROGRAMFILES(x86)%\1cv8.
The other directories and configuration files are created in the root installa-
tion directory:
• common - this directory contains the common files of 1C:Enterprise.
These include the 1cestart launcher, the security key driver installer,
the Management Console snap-in to administer the 1C:Enterprise
server cluster (1CV8 Servers.msc), the 1C:Enterprise files icon li-
brary for the needs of the operating system.
• conf - this directory contains the configuration files necessary for the
operation of 1C:Enterprise.
• srvinfo - the working directory of the main server. Contains server
cluster data if the 1C:Enterprise server is installed as a Windows ser-
vice.
• A.B.C.D - this directory contains files of a specific 1C:Enterprise ver-
sion. Hereinafter this directory will be called the version directory. In
this name, A.B.C.D - is the full number of the particular version in-
stalled. Installer allows to install simultaneously several versions of
the 1C:Enterprise applications. In this case, multiple version directo-
ries will be located in the root installation directory. So, in case of in-
stallation of versions 8.3.3.100 and 8.3.3.150 (version numbers - con-
ditional) there will be two directories with names 8.3.3.100 and
8.3.3.150. Each version directory contains all the files (except the
1cestart file) specific to this version, namely: executable files, ac-
companying files, software products licenses, etc. The version directo-
ry structure:
bin - contains the executable files of the version (directory of exe-
cutable files).
bin\conf - contains the configuration files of a specific version or
the conf. cfg file, which contains the path to the shared directory
of configuration files (by default, the conf directory of the root in-
stallation directory).
bin\dmf - contains the files necessary for the functioning of the
optimized database configuration update mechanism.
docs - this directory contains the accompanying files in the Rus-
sian and English languages. The components of files may vary
from version to version.
licenses- contains the license agreement for 1C:Enterprise in Rus-
sian (1CEnterpise_ru.htm file) and English
(1CEnterpise_en.htm file), as well as license agreements for
third-party software components used (this list may vary from ver-
sion to version).
readme - this directory contains readme files in the localization
languages of the platform.
Some directories in the installation are always in a fixed place of the file
system, regardless of which directory is selected during the application in-
stallation:
• If you use a version that matches the operating system bitness, the
common and conf directories are located in the
%PROGRAMFILES%\1cv8 directory.
• When using the 32-bit version of the application on the 64-bit OS, the
common and conf directories are located in the
%PROGRAMFILES(x86)%\1cv8 directory.
• srvinfo directory (in addition to the common and conf directories)
will be located:
If the bitness of 1C:Enterprise and operating system match- in
the%PROGRAMFILES%\1cv8 directory.
When using the 32-bit version of the application on the 64-bit OS-
in the %PROGRAMFILES(x86)%\1cv8 directory.
1.2. On Linux
The application will be installed in the root installation directory. Depend-
ing on the bitness of the operating system used, this directory is located:
• In the 32-bit version of Linux: /opt/1C/v8.3/i386
• In the 64-bit version of Linux: /opt/1C/v8.3/i386
The other directories and configuration files are created in this directory:
• conf - this directory contains the configuration files necessary for the
operation of 1C:Enterprise.
• docs - this directory contains the accompanying files in the Russian
and English languages. The components of files may vary from ver-
sion to version.
• dmf - contains the files necessary for the functioning of the optimized
database configuration update mechanism.
• licenses- contains the license agreement for 1C:Enterprise in Russian
(1CEnterpise_ru.htm file) and English (1CEnterpise_en.htm file),
as well as license agreements for third-party software components
used (this list may vary from version to version).
• readme - this directory contains readme files in the localization lan-
guages of the platform.
• ExtDst - contains additional utilities designed for use in conjunction
with the 1C:Enterprise application.
1.3. On macOS
The system will be installed in the /opt/1cv8 directory (hereinafter we will
call this directory as the root installation directory). The other directories
and configuration files are created in the root installation directory:
• common - this directory contains the common files of 1C:Enterprise.
These include the security key driver installer and the 1cescmn.cfg
configuration file.
• conf - this directory contains the configuration files necessary for the
operation of 1C:Enterprise.
• A.B.C.D - this directory contains files of a specific 1C:Enterprise ver-
sion. Hereinafter this directory will be called the version directory. In
this name, A.B.C.D - is the full number of the particular version in-
stalled. Installer allows to install simultaneously several versions of
the 1C:Enterprise applications. In this case, multiple version directo-
ries will be located in the root installation directory. So, in case of in-
stallation of versions 8.3.3.100 and 8.3.3.150 (version numbers - con-
ditional) there will be two directories with names 8.3.3.100 and
8.3.3.150. Each version directory contains all the files (except the
1cestart file) specific to this version, namely: executable files, ac-
companying files, software products licenses, etc. The version directo-
ry structure:
conf - this directory contains the configuration files necessary for
the operation of 1C:Enterprise.
docs - this directory contains the accompanying files in the Rus-
sian and English languages. The components of files may vary
from version to version.
licenses- contains the license agreement for 1C:Enterprise in Rus-
sian (1CEnterpise_ru.htm file) and English
(1CEnterpise_en.htm file), as well as license agreements for
third-party software components used (this list may vary from ver-
sion to version).
readme - this directory contains readme files in the localization
languages of the platform.
1.5.2. On Windows
In Windows, files can be stored in the following locations (in the search
order):
• bin\conf directory of a specific version. For example, the path for the
8.3.3.100 version will look as follows: C:\Program
Files\1cv8\8.3.3.100\bin\conf.
• %USERPROFILE%\Local Settings\Application Data\1C\1cv8\con
f (%LOCALAPPDATA%\1C\1cv8\conf for Windows Vista and later)
directory of the user on whose behalf the application runs.
• The directory specified in the Conf.cfg file that is located in the
bin\conf directory of the specific version.
• %ALLUSERSPROFILE%\Application Data\1C\1cv8\conf
(%ALLUSERSPROFILE%\1C\1cv8\conf for Windows Vista and lat-
er) data directory for all users of the computer.
NOTE. When the application is being installed, the configuration files are
written to the C:\Program Files\1cv8\conf directory, and this path is writ-
ten to the bin\conf\conf.cfg file of the installed version.
This search order of configuration files allows to:
• Generate unified configuration files for all versions and components
installed on the computer. To do this, the configuration files should be
located only in the C:\Program Files\1cv8\conf directory.
• Generate configuration files separately for each version installed on
the computer. To do this, the configuration files should be located on-
ly in the bin\conf directory.
• Generate different configuration files for different components (for the
1C:Enterprise client application and server, operating under another
user of the system) of any version running on the computer. For this
purpose the configuration files should be located only in
the%USERPROFILE%\Local Settings\Application Data\1C\1cv8\c
onf (%LOCALAPPDATA%\1C\1cv8\conf for Windows Vista and
later) directories of the appropriate users.
• Use combinations of these methods for different configuration files.
1.5.3. On Linux
On Linux, files can be located in the following places (in the search order):
• conf directory of the version installed. For example, for the 32-bit
version of 1C:Enterprise, the path to this directory will be as follows:
/opt/1c/v8.3/i386/conf, and for the 64-bit version:
/opt/1C/v8.3/x86_64/conf.
• Directory ~/.1cv8/1C/1cv8/conf (~ - home directory of the user, on
behalf of which the 1C:Enterprise server operates).
• The directory specified in the conf.cfg file that is located in the conf
directory of the specific version.
1.5.4. On macOS
On macOS, files can be located in the following places (in the search order):
• conf directory of the installed version, for example:
/opt/1cv8/A.B.C.D/conf, where A.B.C.D - the full version number of
the 1C:Enterprise application.
• conf directory of the root installation directory: /opt/1cv8/conf.
• Directory ~/.1cv8/1C/1cv8/conf (~ - home directory of the user, on
behalf of which the 1C:Enterprise client application operates).
• The directory specified in the conf.cfg file that is located in the conf
directory of the specific version.
Appendix 2.
Description of the event
log items
This appendix describes the structure of the event log when it is exported in
XML format.
XML document format after event log export:
• Namespace: http://v8.1c.ru/eventLog
• Namespace prefix (default): v8e.
EventLog
The root element of the document. Contains the events of the log (Event
elements).
Event
Contains elements that describe the log event.
Level
Type: Event level enumeration. Event level value.
Date
Type: DateTime. Event date and time value.
Application
Type: String. Name of the application in which the event occurred.
ApplicationPresentation
Type: String. Presentation of the application in which the event occurred.
EventName
Type: String. Name of the event.
EventPresentation
Type: String. Presentation of the event.
UserID
Type: UUID. ID of the user who initiated the event.
UserName
Type: String. Name of the user who initiated the event.
MetadataName
Type: String. Compound name in the English version of the term and
with the metadata names. For events that include a list of metadata (data
access events), it contains a list of Item items, each of which contains the
name of the metadata object.
MetadataPresentation
Type: String. Representation of the metadata object in the language of
user (synonyms). For events that include a list of metadata (data access
events), it contains a list of Item items, each of which contains the presen-
tation of the metadata object.
Comment
Type: String. Comment to the event.
Data
Type: Any. Event data. If the data type cannot be represented as XML, the
Undefined value is written (a blank item with the xsi:nil = "true" attribute).
It may contain structures, arrays, and tables (for data access events, authen-
tication and operation with infobase users).
DataPresentation
Type: String. Presentation of the event data.
TransactionStatus
Type: Transaction status for the event. The transaction status can take the
following values:
• InProgress - transaction not finished;
• Committed - transaction not finished;
• RolledBack - transaction cancelled;
• NotApplicable - record is performed outside the transaction.
TransactionID
Type: String. Transaction ID.
Connection
Type: Number. Connection number.
Session
Type: Number. Session number.
ServerName
Type: String. Working server name.
Port
Type: Number. Main IP port.
SyncPort
Type: Number. Auxiliary IP port.
SessionDataSeparation
Contains a collection of elements that describe the separators used in the
session during the event logging. The element name corresponds to the sep-
arator name, the element value contains the separator value.
SessionDataSeparationPresentation
Contains a collection of Item elements with values of the String type,
which contain the separator presentations in the same order as in the
SessionDataSeparation item.
Appendix 3.
Description and
location of internal files
This appendix contains a description and location of internal files that can
be used when operating 1C:Enterprise.
3.1. *.1ccr
The Web service configuration file for Remote Repository can have an arbi-
trary name (1ccr extension required), an XML format, and contains a single
node with a random name and connectString attribute - this attribute
specifies the repository server address in the TCP diagram.
For example, such a configuration file may have the name repository.1ccr
and the following content:
<?xml version="1.0" encoding="UTF-8"?>
<repository connectString="tcp://RepServ"/>
3.2. *.mft
The file with the mft extension is a manifest file - a special file that de-
scribes the configuration template. The file may have an arbitrary name.
The file is located in the directory of the installed configuration template.
The manifest file has an arbitrary name and mft extension. The internal
format of the manifest file is close to the .ini file format. The manifest file
uses UTF-8 encoding to support multiple languages. The following parame-
ters are specified at the beginning of the manifest file.
Vendor
Solution provider. Matches the one specified in the configuration.
Name
Name of the solution. Matches the one specified in the configuration.
Version
Version of the solution. Matches the one specified in the configuration.
AppVersion
1C:Enterprise version used to build the distribution package.
The following parameters refer to parts of the solution and are separated by
sections names. Sections names are arbitrary and enclosed in square brack-
ets.
Source
The relative path to the configuration file (cf), the update file (cfu), or the
database dump file (dt).
Catalog_<language suffix>
The name of the solution in the solution catalog. There may be several
Catalog_<language suffix> parameters in the manifest file. The
suffix defines the user interface language in 1C:Enterprise 8 (for example,
ru to specify the Russian language). If the language suffix is not specified
(the parameter name is set to Catalog), the value of this parameter is used
for all user interfaces except those, for which the Catalog parameter with
the desired language suffix is specified in this section.
Destination
Recommended directory for infobase creation. This parameter is used when
creating an infobase from a template. The directory represents a partial path.
As one of its parts the directory must include a vendor directory (to avoid a
coincidence of directories names for different solutions).
Multiple cfu files are allowed in the configuration template directory.
Vendor=1C Company
Name=Trade Management
Version=8.10.0.2
[Main]
Source=Main\1cv8.cf
Catalog_en=Trade management/Trade management
Destination=1C\Trade
[Demo]
Source=Demo\1cv8.dt
Catalog_en=Trade management/Trade management (Demo)
Destination=1C\DemoTrd
3.3. *.v8i
This appendix describes the registered infobases description file format.
This list is used by all clients. By default, the file name is ibases.v8i.
File location:
• On Windows: %APPDATA%\1C\1CEStart\ on the local computer.
• On Linux: ~\.1C\1cestart.
• On macOS: ~\.1C\1cestart.
The file is a text document encoded in UTF-8 and consists of sections. Each
section describes one infobase.
Each section describes one infobase.
Infobase description section:
[Section name]
Connect=
ID=
OrderInList=
Folder=
OrderInTree=
External=
ClientConnectionSpeed=
App=
AppArch=
DefaultApp=
WA=
WSA=
Version=
DefaultVersion=
AdditionalParameters=
WebCommonInfoBaseURL=
HttpsCA=
HttpsCert=
HttpsCAFile=
HttpsCertFile=
HttpsCertSelect=
ShowInList=
MobilePublicKey=
WebCommonInfoBases=
DisplayAuthDialog
DisableUseBiometrics
UseBiometrics=
DisableRememberMe
RememberMe=
ID
Infobase internal ID. Generates automatically. Must be unique within a sin-
gle v8i file.
Manually generating the ID is not advised.
Example:
ID=cf9f0d4b-b4a3-11d8-861e-0050baaa2f3f
Connect optional
Infobase connection string. There may be several descriptions of infobases
that have the same start string (but different name). This may be necessary
when you need to start a single infobase in multiple startup modes (such as
thin and thick clients) without changing the properties of the infobase.
Example:
File mode is specified as:
Connect=File=<Path>;
Folder optional
Folder name in the infobases tree.
NOTE. If the folder name is not specified or the parameter is omitted, this
infobase is located in the root of the list of infobases.
Example:
Folder=/CommercialInfobases
OrderInList
The order in the list when presented in the list view. Specified as a number,
which is the sequence count of the infobase in the infobase list (sorting by
name is not set).
Example:
OrderInList=5
OrderInTree
The order in the branch when presented in the tree view.
Example:
OrderInTree=16358
UseProxy optional
Indicates the use of a proxy server for the ws-connection option.
• 0 - proxy server is not used;
• 1 - automatic detection of proxy server settings;
• 2 - explicitly specify proxy server settings.
If the UseProxy parameter is not specified, the proxy server settings are
automatically defined. For file and client/server modes, it is meaningless.
Example:
UseProxy=1
PSrv
String containing the proxy address (required only if the UseProxy pa-
rameter is set to 2).
Example:
PSrv=192.168.0.1
PPort
Port number of the proxy server (required only if the UseProxy parameter
is set to 2).
Example:
PPort=123
PUser optional
Proxy server username.
Example:
PUser=userName
PPasswd optional
Encrypted password for the proxy server.
Example:
PPasswd=XNKxbVEqnXUCwwk1Urovbo7bZFpG/Zpf6cQ10qVtzpk=
ClientConnectionSpeed
Client connection speed (only makes sense for thin and web clients). Can
take values:
• Normal- standard connection speed
• Low - low connection speed
If the parameter is not specified, the client connection speed will be deter-
mined by the Low connection speed check box value of the startup win-
dow (which is equivalent to Select when starting value of the Connection
speed parameter of the window, which contains the infobase startup pa-
rameters).
Example:
ClientConnectionSpeed=Low
WA
Specifies user authentication mode. Can take values:
• 1 - try to authenticate by means of OS. If unsuccessful, the log-
in/password is requested.
• 0 - always use login/password authentication.
Example:
WA=1
WSA
Determines a user authentication mode on a web server if the web server is
used as an intermediate link (a thin client that is connected through a web
server and a web client). Can take values:
• 1 - try to authenticate on the web server by means of OS. If unsuc-
cessful, the login/password is requested.
• 0 - always request login/password.
Example:
WSA=1
App
Specifies the type of client application:
• Auto - client application type selected automatically
• ThinClient - thin client
• ThickClient - thick client
• WebClient - web client
The parameter can be edited in the infobase properties window.
Example:
App=Auto
DefaultApp
The type of client that is defined and placed in this file by the launcher
when the client application type is automatically determined
(/AppAutoCheckMode key):
• ThinClient - thin client
• ThickClient - thick client
If the value of the App parameter equals Auto and the DefaultApp pa-
rameter is not specified, the thin client starts with the/AppAutoCheckMode
command-line parameter.
If the DefaultApp parameter is set, the client specified in it starts with
the /AppAutoCheckMode parameter.
Example:
DefaultApp=ThinClient
Version
1C:Enterprise version, which should be used to start the infobase.
The parameter can be edited in the infobase properties window.
Example:
Version=8.3.3
DefaultVersion
1C:Enterprise version, which was actually used to for the previous start of
the infobase. Automatically detected and placed in this file by the launcher
if the start is performed with /AppAutoCheckVersion parameter.
During the next startups, this version will be used, not the one specified in
the Version parameter.
Example:
DefaultVersion=8.3.3.100
AdditionalParameters
Contains additional startup options that can be entered in the infobase prop-
erties window in the Advanced startup options item.
Example:
AdditionalParameters=/DisplayAllFunctions /LogUI
WebCommonInfoBaseURL
If the infobase is added to the current list using the Internet service for ob-
taining a list of shared infobases, this parameter will contain the address of
the service, which provided the information about the infobase.
If during the interactive start of the launcher (1cv8s) it is detected that the
list of the shared infobases, received by the Internet service, does not re-
quire an update, then the descriptions of all infobases (web service call
WebCommonInfoBases.CheckInfoBases() returned the
InfoBaseChanged parameter equal to False), which are retrieved
from this source, remain in the list until the next start.
If InternetService or WebCommonInfoBases parameters are re-
moved from the 1cestart.cfg file, information about infobases, received
from remote sources, will be removed from the infobases list.
Example:
WebCommonInfoBaseURL=http://info-server/listservice
HttpsCA optional
Type of the certificate source from the certification authorities used to vali-
date the server certificate. Can take values:
• None - certification authorities certificates are used, the server certifi-
cate validation is not performed.
• File - certification authorities certificates are located in the file.
• Windows - certification authorities certificates are located in the
Windows Certificate store.
• Linux - certification authorities certificates are located in the Linux
certificates directory.
• macOS - certification authorities certificates are located in the macOS
Certificate store.
HttpsCert optional
Type of client certificate source and its private key. Can take values:
• None - the client certificate is not used;
• File - the client certificate is in the file;
• Windows - the client certificate is in the Windows Certificate store;
• Linux - the client certificate is in the Linux certificates directory.
• macOS - the client certificate is in the macOS Certificate store.
HttpsCAFile optional
The path to the file that contains the certification authorities certificates. If
the HttpsCA parameter is set to File, and this parameter is missing or
equal to an blank string, then the HttpsCA parameter is considered to be
set to None.
HttpsCertFile optional
The path to the file that contains the client certificate and its private key. If
the HttpsCert parameter is set to File, and this parameter is missing or
equal to an blank string, then the HttpsCert parameter is considered to
be set to None.
HttpsCertSelect optional
How to select a Windows client certificate if more than one certificate is
installed and these certificates are suitable for this connection. Can take
values:
• Recent - use the selected one if there is a remembered one- used it,
if there is no a remembered one - picker dialog box opens and the se-
lected certificate is memorized for later use;
• Choose - always select a certificate. The selected certificate is re-
membered and can be used later if this parameter is set to Recent
value;
• Auto - automatically select the appropriate certificate for this connec-
tion. The picker dialog box does not open.
AppArch optional
Specifies the bitness of the client application that will be used to operate
with this infobase. The bitness value is the same as the /AppArch command
parameters of the client application starting command-line string.
ShowInList mobile client only
Use this parameter to specify that the infobase will be in the main list of
infobases on the mobile device. The parameter can take values:
• 1 - infobase is located in the main list of mobile device bases.
• 0 - infobase is not located in the main list of mobile device bases. To
access this database, use a special menu.
The default value is 0.
Example:
ShowInList=1
This example sets the name of a file with shared infobases list (Ibcom-
mon.v8i), which should be in the same directory as the file with the interac-
tive launcher (1cestart). The directory of distribution packages of applica-
tion versions is also specified: \\server\v8dst.
3.5. 1cestart.cfg
The 1cestart.cfg file contains settings that launchers use (1cestart and
1cv8s), client applications (1cv8 and 1cv8c), and external connections.
File location:
• On Windows OS: .
%APPDATA%\1C\1CEStart - for a specific user. The file changes
when configuring the startup window.
%ALLUSERSPROFILE%\Application Data\1C\1CEStart
(%ALLUSERSPROFILE%\1C\1CEStart for Windows Vista and
later) - for all users of the computer. The file changes only during
the installation of the 1C:Enterprise application.
• On Linux: ~/.1C/1cestart.
• On macOS: ~/.1C/1cestart.
The file is a text document encoded in UTF-16LE and contains the strings
of <Parameter>=<Value> format. The descriptions of the parameters
that can be contained in this file are described below.
Example:
DefaultVersion=8.2-8.2.16
DefaultVersion=8.3-8.3.3
CommonCfgLocation=\\Server\v8\1cescmn.cfg
CommonInfoBases=\\Server\common\common_dblist.v8i
InstalledLocation=C:\Program Files\1cv8
DistributiveLocation=\\server\dst1C\v8
ConfigurationTemplatesLocation=\\server\tmplts
ConfigurationTemplatesLocation=C:\Documents and
Settings\User\Application Data\1C\1cv8\tmplts
InstallComponents=DESIGNERALLCLIENTS=1 THINCLIENT=1 WEBSERVEREXT=1
SERVER=1 CONFREPOSSERVER=0 CONVERTER77=1 SERVERCLIENT=1
LANGUAGES=RU
UseHwLicenses=0
AppAutoInstallLastVersion=0
DefaultVersion
This parameter specifies the default version. Multiple lines with this param-
eter are allowed.
The bitness of the client application to be started can specified in this pa-
rameter. The ";" character is used to separate the version and the bitness of
the client application. The bitness value is the same as the /AppArch com-
mand parameters of the client application starting command-line string.
Values from all configuration files are used.
Example 1:
DefaultVersion=8.3-8.3.3.100
This line means that the 8.3.3.100 version will be used when attempting to
start the infobase with the version 8.3.
Example 2:
DefaultVersion=8.2.15-8.2.15.315
This line means that the 8.2.15.315 version will be used when attempting to
start the infobase with the version 8.2.15.
Example 3:
DefaultVersion=8.3;x86_64_prt
This line means that if you try to start any infobase, you will use the client
application version 8.3 with a priority of 64-bit version.
CommonInfoBases
The parameter specifies the path and name of the file with the shared in-
fobases list.
Values from all configuration files are used.
InstalledLocation
The parameter contains a reference to the directory, in which the installation
of 1C:Enterprise was performed. The default value is C:\Program
Files\1cv8.
The values from all configuration files are used in the following order:
• From the common configuration file
• From the local configuration file for all users
• From the local configuration file
NOTE. It is not recommended to use this parameter in a common configu-
ration file (1cescmn.cfg).
DistributiveLocation
The parameter contains a reference to the directory, in which a new version
will be searched for auto-installing.
Values from all configuration files are used.
The directory with distribution packages of new versions will also be
searched in the directory where the common configuration file
(1cescmn.cfg) is located.
CommonCfgLocation
The parameter specifies the path and name of the common configuration
file. Multiple lines with this parameter are allowed.
Values from all configuration files are used.
NOTE. It is not recommended to use this parameter in a common configu-
ration file (1cescmn.cfg).
InstallComponents
The local configuration file and the local configuration file for all users
(1cestart.cfg) contains a list of installed components.
The common configuration file (1cescmn.cfg) contains a list of compo-
nents to be installed (generated by the system administrator).
The parameter value from one configuration file is used according to the
following priority:
• Local configuration file for all users
• Local configuration file
• Common configuration file
The parameter contains a string of components to be installed, separated by
a space:
• 0 - do not install
• 1 - install
The following components are available:
• DESIGNERALLCLIENTS - all clients and Designer.
• THINCLIENT - thin client for client/server mode operation.
• THINCLIENTFILE - thin client with the ability to operate with file
infobases.
• SERVER - 1C:Enterprise server If Setup starts from a launcher, the
server will be installed as an application.
• WEBSERVEREXT - extension components for web server.
• CONFREPOSSERVER - 1C:Enterprise configuration repository server.
• SERVERCLIENT - components for administrating 1C:Enterprise
servers cluster.
• CONVERTER77 - converter of infobases from 1C:Enterprise version
7.7.
• LANGUAGES - list of installation interface languages. If multiple lan-
guages are specified, they are listed separated by “,”.
NOTE. The language with the EN code will be installed even if it is not
specified in the LANGUAGES parameter or the LANGUAGES parameter is
not specified.
Example:
LANGUAGES=RU,UK,BG
Example parameter:
InstallComponents=DESIGNERALLCLIENTS=0 THINCLIENT=1 WEBSERVEREXT=0
SERVER=0 CONFREPOSSERVER=0 CONVERTER77=0 SERVERCLIENT=1
LANGUAGES=RU,EN
ConfigurationTemplatesLocation
This parameter specifies the path to the configuration templates directory. It
may contain more than one record.
Values from all configuration files are used.
UseHwLicenses
The parameter controls the search for the security key when starting
1C:Enterprise:
• 1 - the protection key is being searched (the default value);
• 0 - the protection key is not being searched.
The parameter value from one configuration file is used according to the
following priority:
• Local configuration file
• Local configuration file for all users
• Common configuration file
This parameter allows to disable the search for a security key when obtain-
ing client licenses is implemented using the Web server extension, the
1C:Enterprise server, or in the case of the base version.
The value of the parameter can be changed by the application in the follow-
ing cases:
• If the search for the security key is enabled, the client application
starts analyzing the security key search time. If the security key was
not found, the start was successful and the search time exceeded 3
seconds, the user is prompted to disable the search for the security key
to speed up subsequent starts. If the user agrees, the
UseHwLicenses=0 parameter is written to the 1cestart.cfg file of
that user.
• If the search for the security key is disabled and at startup it is detect-
ed that the license is not obtained from the 1C:Enterprise server or
from the Web server extension, the user is prompted to enable the
search for the security key. If the user agrees, the
UseHwLicenses=1 parameter is written to the 1cestart.cfg file of
that user, and the client application restarts.
If an external connection is started, an attempt is made to parse the parame-
ter from the 1cestart.cfg file located in the user profile, on behalf of which
the external connection is started. If the user does not have a profile (for
example, a LocalSystem user in Windows), the search for the key is always
performed.
InternetService
URL of the Internet service, which provides a list of shared infobases and
distribution package of the client application.
Initially, an attempt is made to retrieve the required file (with a list of
shared infobases or a distribution package of the client application) by using
an HTTP request, if this attempt fails -an attempt is made to retrieve the file
using a Web service.
The full service URL is generated for the HTTP request as follows: <Ad-
dress obtained from the InternetService parameter>/<Service
name>/<Method name>/?<Method parameters>
For a request using the Web service, the description address (in WSDL
format) is generated as follows: <Address obtained from the Inter-
netService parameter>/<Service name>/?wsdl
WebCommonInfoBases
URL of the Internet service, which provides a shared infobases list.
Initially, an attempt is made to retrieve the shared infobases list by using an
HTTP request, if this attempt fails - an attempt is made to retrieve the file
using a Web service.
The full service URL is generated for the HTTP request as follows: <Ad-
dress obtained from the WebCommonInfoBases parame-
ter>/<Service name>/<Method name>/?<Method parameters>
For a request using the Web service, the description address (in WSDL
format) is generated as follows: <Address obtained from the WebCom-
monInfoBases parameter>/<Service name>/?wsdl
If both the InternetService parameter and the
WebCommonInfoBases parameter are specified, the address specified in
the WebCommonInfoBases parameter is used first, and in case of failure
- the address specified in the InternetService parameter.
WebDistributiveLocation
The URL of the Internet service that provides the distribution package of
the client application.
Initially, an attempt is made to retrieve the client application distribution
package by using an HTTP request, if this attempt fails - an attempt is made
to retrieve the file using a Web service.
The full service URL is generated for the HTTP request as follows: <Ad-
dress obtained from the WebDistributiveLocation parame-
ter>/<Service name>/<Method name>/?<Method parameters>.
For a request using the Web service, the description address (in WSDL
format) is generated as follows: <Address obtained from the WebDis-
tributiveLocation parameter>/<Service name>/?wsdl
If both the InternetService parameter and the
WebDistributiveLocation parameter are specified, the address
specified in the WebDistributiveLocation parameter is used first,
and in case of failure - the address specified in the InternetService
parameter.
AppAutoInstallLastVersion
Specifies the need to automatically install the new version of 1C:Enterprise:
• 0 - disable the automatic installation of the new version;
• 1 - enable the automatic installation of the new version (default val-
ue).
The parameter value from one configuration file is used according to the
following priority:
• Local configuration file
• Local configuration file for all users
• Common configuration file
If no version is installed on the local computer that is required by the server
in the client/server mode or is explicitly specified for the infobase, the value
of the parameter (from the configuration files or command line)
AppAutoInstallLastVersion is ignored and an attempt is made to
install the new version.
3.6. 1CV8Clst.lst
The file is located in the data directory of each working server marked as
central server.
The file contains the cluster registry and stores the following information:
• List of infobases registered in the cluster
• List of working servers in the cluster
• List of working processes in the cluster
• List of cluster managers
• List of cluster services
• List of cluster administrators
Example:
C:\Program Files\1cv8\srvinfo\reg_1541\1CV8Clst.lst
3.7. 1cv8conn.pfl
The file contains a list of cluster main servers in the context of infobases, as
well as other information used by client and server applications of the
1C:Enterprise.
It is required for reliable operation that users, on behalf of which
1C:Enterprise applications are started, have rights to create, read, and modi-
fy data in the directory where the file is located. If 1C:Enterprise is used on
a computer running Windows by different users, it is recommended that all
users, who use the 1C:Enterprise application or the USERS group, have full
access to directory of the file location (listed below), and the CREATOR-
OWNER user (CREATOR OWNER) is removed from the security list of this
directory.
File location:
• On Windows: %ALLUSERSPROFILE%\1C\1cv8.
• On Linux: ~/.1cv8/1C/1cv8.
• On macOS: ~/.1cv8/1C/1cv8.
3.8. 1cv8wsrv.lst
The file is stored on the computer of the working server marked as main, in
the cluster service files directory, and contains a list of the clusters regis-
tered on this computer of the 1C:Enterprise Server. The data it contains is
necessary for the normal operation of applications that use this
1C:Enterprise server.
Example:
C:\Program Files\1cv8\srvinfo\1cv8wsrv.lst
3.9. adminstall.cfg
The adminstall.cfg file indicates that the 1C:Enterprise application was
installed using Windows administration tools.
NOTE. Applies only to the 1C:Enterprise application under Windows OS.
The file is located in the directory of 1C:Enterprise configuration files. It is
a text document encoded in UTF-8.
The file can contain a single line defining the installation mode:
AdmInstall=<Mode>
<Mode>
Describes the installation mode:
• Logon - the installation is done using a logon script during user logon
on to the domain.
• Restart - installation is done using group policies.
The following is an example of an installation script that can be used to in-
stall the 1C:Enterprise application using Windows Administrative Tools.
Option Explicit
End Sub
'processing errors
Sub processError
Dim msg
If Err = 0 Then Exit Sub
msg = Err.Source & " " & Hex(Err) & ": " & Err.Description
Wscript.Echo msg
Wscript.Quit 2
End Sub
'creating a shortcut
Sub createShurtcut
Dim WshShell, oShellLink
Set WshShell = WScript.CreateObject("WScript.Shell")
Dim strDesktop : strDesktop = WshShell.SpecialFolders("Desktop")
Set oShellLink = WshShell.CreateShortcut(strDesktop & "\" &
shortcutName & ".lnk")
oShellLink.TargetPath = shortcutTarget
oShellLink.WindowStyle = 1
oShellLink.Description = shortcutName
oShellLink.Save
Set oShellLink = Nothing
Set WshShell = Nothing
End Sub
3.10. agentbasedir.json
Contains the correspondence of the user name and his (user) working direc-
tory when the configuration agent is running.
The file is located in the working directory of the configurator running in
agent mode. The working directory is set using the /AgentBaseDir
command of the command line for start the configurator in agent mode.
The file has the following structure:
{
"usersInfo": [
{
"name": "username",
"dir": "directory_name"
},
…
]
}
In this file, user_name - is the name of the user working with the agent,
and directory_name - is the name of the service directory of this user.
If several users work with the agent, - the agentbasedir.json file will con-
tain several sections for matching the user name and directory.
3.11. appsrvrs.lst
Contains a list of 1C:Enterprise servers registered in the administration utili-
ty infobases in the client/server mode.
NOTE. Applies only to the 1C:Enterprise application under Windows OS.
Located in the %APPDATA%\1C\1cv8 directory.
Example:
C:/Documents and Settings/User/Local Settings/Application
Data/1C/1cv8/appsrvrs.lst
C:/Users/User/AppData/Roaming/1C/1cv8/appsrvrs.lst
3.12. cfgrepo.conf
The cfgrepo.conf file is used to adjust the location and size of the versions
cache when operating with the configuration repository.
Local cache configuration file location:
• On Windows: %LOCALAPPDATA%\1C\1cv8\<Unique infobase
ID>\cfgrepo.
• On Linux: ~/.1cv8/1C/1cv8/<Unique infobase ID>/cfgrepo.
• On macOS: ~/.1cv8/1C/1cv8/<Unique infobase ID>/cfgrepo.
Global cache configuration file location: in the configuration repository
directory.
The file may contain the following parameters:
cfgrepo.cache.path
Local cache: specifies the path to the directory where the versions cache is
located.
Global cache: specifies the path to the directory where the versions cache is
located, in terms of the file system of the computer where the repository
directory is located or the repository server is installed. In other words, this
is the local path to the versions global cache.
cfgrepo.cache.network.path
Global cache: specifies the UNC path to the directory describing the loca-
tion of the versions global cache. The path specified in this parameter must
be in the same directory as the path specified in the cfgrepo.cache.path
parameter.
cfgrepo.cache.limit
This parameter describes the maximum size of configuration versions
cache.
3.13. comcntrcfg.xml
The comcntrcfg.xml file is used to indicate that the external connection
needs to start in debug mode.
NOTE. Applies only to the 1C:Enterprise application under Windows OS.
The file is located in the directory with the 1C:Enterprise configuration
files. It is optional.
If the file not found, the external connection opens in normal mode.
Example:
<config xmlns="http://v8.1c.ru/v8/comcntrcfg">
<debugconfig debug="true" protocol="tcp"
debuggerURL="tcp://localhost:1560"/>
</config>
protocol
Specifies which debug protocol will be used when operating with this pub-
lication if debugging is enabled:
• protocol="tcp" - TCP/IP protocol is used (default)
• protocol="http" - HTTP protocol is used
debuggerURL
Specifies the address of the debugger, to which you need to automatically
connect for debugging, where localhost specifies the search on the local
computer, "1560" - the network port number. If no port is specified, all
ports in the 1560–1591 port range will be scanned. Specifying tcp:// is
equivalent to tcp://localhost. If debugger address is not specified, the de-
bugging is not performed during 1C:Enterprise language code execution.
If HTTP protocol is used, debugger address must include a port number to
be used: http://pc-name:1561.
If the debugging protocol specified using protocol attribute does not
match the arrangement specified in url attribute, connection to the debug-
ger will not be established and the operation is continued without debug-
ging.
Example:
debuggerURL="http://pc-name:1561"
3.14. conf.cfg
The conf.cfg file specifies the location of the common configuration file
directory and the default application interface language.
File location:
• On Windows:
In the bin\conf directory of a specific version directory of
1C:Enterprise of the appropriate bitness.
32-bit application in the 64-bit OS:
%PROGRAMFILES(x86)%\1cv8\conf.
Otherwise: %PROGRAMFILES%\1cv8\conf.
• On Linux:
In conf directory of the version installed. For example, for the 32-
bit version of 1C:Enterprise, the path to this directory will be as
follows: /opt/1c/v8.3/i386/conf, and for the 64-bit version:
/opt/1C/v8.3/x86_64/conf.
Directory ~/.1cv8/1C/1cv8/conf (~ - home directory of the user,
on behalf of which the 1C:Enterprise server operates).
• On macOS:
conf directory of the installed version, for example:
/opt/1cv8/A.B.C.D/conf, where A.B.C.D - the full version num-
ber of the 1C:Enterprise application.
Directory ~/.1cv8/1C/1cv8/conf (~ - home directory of the user,
on behalf of which the 1C:Enterprise server operates).
The file is a text document encoded in UTF-8.
The file may contain the following parameters:
ConfLocation
The parameter specifies the directory the application will search for config-
uration files (logcfg.xml, nethasp.ini, and so on) if they are not found in
the standard search paths. This parameter makes sense if the file is located
in the conf directory of a particular version.
By default, the parameter value is equal to:
• On Windows:
32-bit application in the 64-bit OS:
%PROGRAMFILES(x86)%\1cv8\conf.
Otherwise: %PROGRAMFILES%\1cv8\conf.
• On Linux:
For the 32-bit version: /opt/1C/v8.3/i386/conf.
For the 64-bit version: /opt/1C/v8.3/x86_64/conf.
• On macOS: /opt/1cv8/A.B.C.D, where A.B.C.D is the full version
number of 1C:Enterprise.-
Example:
ConfLocation=C:\MySettings\v8\conf
SystemLanguage
This parameter specifies the application interface language. The parameter
value can be specified by the interface language codes or the System val-
ue. If a language value is specified, this language will be used. If System
is specified, the interface language will be determined by the localization of
the operating system.
If you specify a language that does not exist, an attempt will be made to use
the localization language according to the operating system regional set-
tings. If the user interface is not installed in the specified language, the Eng-
lish interface will be used.
When using a client application running under Windows, consider the fol-
lowing feature: if the conf.cfg file with the interface language indication is
located in the conf directory of a specific version, the specified interface
language will be used for a specific version, and if this file is located in the
C:\Program Files\1cv8\conf directory, the specified interface language
will be used for all versions installed on this computer.
If the SystemLanguage parameter is not specified in the configuration
file, the mechanism of defining the interface language using the *.res file
will be used. If there is no file with *.res extension, the interface corre-
sponding to the regional operating system settings will be selected at operat-
ing system startup. Specifying an unknown or nonexistent interface lan-
guage code is equivalent to no file specified.
Example:
SystemLanguage=System
Use the interface language according to the regional operating system set-
tings.
SystemLanguage=RU
LicConfigDebugTimeouts
This parameter enables shortened verification periods for interactions with
the licensing center. Depending on the parameter value, the following veri-
fication periods can be used:
• This parameter is set to true value (shortened verification periods):
License verification by server - every 60 seconds;
License verification by clients- every 30 seconds;
License re-verification by clients (if the LC is unavailable or after
entering the license client data) - 15 seconds.
• This parameter is set to false value (standard verification periods):
License verification by server - every 1 hour;
License verification by clients- every 1 hour;
License re-verification by clients (if the LC is unavailable or after
entering the license client data) - 10 minutes.
Default value: false.
DBFormatVersion
This parameter specifies the format used to create new databases while in
the infobase file mode.
Values: 8.2.14 and 8.3.8.
Default value: 8.2.14.
ForceTLS1_0
Controls the use of the TLS 1.0 protocol. Depending on the parameter val-
ue, the following protocols are used:
• The parameter set to true - only the version 1.0 of the TLS protocol
is used.
• The parameter is set to false(or any value other than true) - the
protocol used depends on the settings of the web server, with which
the 1C:Enterprise application communicates. Any TLS protocol ver-
sion may be used, up to version 1.2.
Default value: false.
FileNamesEncodingInZipFile
The parameter controls the encoding used for the names of files in zip ar-
chives generated by 1C:Enterprise.
If the parameter value is set to UTF8, the names of the files containing the
national characters will be displayed incorrectly by the integrated archiving
utility in Windows XP/2003/2008/7 and by the ReadingofZipFile
object in 1C:Enterprise 8.3.6 and earlier. These file names will be displayed
correctly in macOS.
If the parameter value is set to OSEncodingWithUTF8, the file names
containing national characters will be displayed incorrectly by the integrat-
ed macOS archiving utility, but in other cases there will be no issues.
Values: UTF8, OSEncodingWithUTF8.
Default value: UTF8.
DisableUnsafeActionProtection
This option allows to disable protection against unsafe actions for specific
infobases. Infobases are defined by a set of templates (regular expressions)
separated by the semicolon character ";". If the infobase connection string
satisfies any of the regular expressions listed in this parameter, protection
against unsafe actions will be disabled for this infobase.
When editing regular expressions, you should use POSIX Basic Regular
Expressions
(http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/V1_ch
ap09.html#tag_09_03).
This parameter is used by the process that actually performs a potentially
dangerous action:
• Downloading external processings/reports or configuration extensions
- only server (rphost process).
• Downloading external components - client application or server
(rphost process).
• Start an external application - client application or server (rphost pro-
cess).
Example:
DisableUnsafeActionProtection=test_.*;stage_.*;
ExternalResourcesMode
This parameter specifies the components of Internet service resources used
and some details of application behavior.
The parameter can take values:
• D - the default value, and the application functions as follows:
the platform and configuration software licensing system uses
servers located in Russia;
when you use the menu commands Help - Information on the
Internet the access is performed to resources in Russia;
registration in the collaboration system is supported;
use of 1C Company special service for sending PUSH-
notifications is supported.
• A -alternative list of service resources. In this case, the application
functions as follows:
the platform and configuration software licensing system uses
servers located in Europe;
when you use the menu commands Help - Information on the
Internet the access is performed to resources in Europe;
registration in the collaboration system is not supported;
Dedicated 1C service for sending PUSH notifications is not sup-
ported
EnableCheckScriptCircularRefs
Controls detection of circular references during the script execution:
• The parameter is set to true value - search for circular references
during the script execution.
• The parameter is set to false - search for circular references during
the script execution is not performed.
Default value: false.
UpdateDBCfg
Specifies which version of the infobase restructuring component will be
used if this is not explicitly specified. Used in the configuration file on the
computer where Designer runs.
The parameter can take values:
• v1 - usual restructuring mechanism. The only option of restructuring
in 1C:Enterprise version 8.3.10 and later.
• v2 - optimized restructuring mechanism. It is true only for the cli-
ent/server mode of the infobase if Microsoft SQL Server or Post-
greSQL is used as a DBMS. If you plan to use the optimized restruc-
turing mechanism in conjunction with the Microsoft SQL Server data-
base management system, the 1C:Enterprise server must use the
TCP/IP network protocol (in terms of the database management sys-
tem) to connect to the database management system. The work of the
optimized restructuring mechanism is not supported if the
1C:Enterprise server is connected to the Microsoft SQL Server DBMS
using Shared memory or Named pipes network protocols.
Default value: v1.
JavaHome
Specifies the path to the JAVA installation directory. If this parameter is not
specified, the path to the JAVA installation directory is defined in the
JAVA_HOME environment variable. It is used in the configuration file on
the computer where the 1C:Enterprise server cluster is located.
On Windows, if this parameter is not specified in the file conf.cfg and the
JAVA_HOME variable is not set, the path to the Java installation directory
will be defined by the information written into the system registry during
the JRE installation.
JavaOpts
Specifies additional parameters for starting a Java Virtual Machine. The
value of this property must not contain quotation marks. It is used in the
configuration file on the computer where the 1C:Enterprise server cluster
is located.
This property can be used, for example, to set the maximum amount of
RAM available for the Java machine.
Example:
#Setting the maximum amount of available memory for a Java process
JavaOpts=-Xmx2048m
Example:
#Starting JAVA processes with debugger support
JavaOpts=-
agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005
IgnoreServerCertificatesChainRevocationSoftFail
Controls the behavior of the application when the platform cannot explicitly
check the revocation of the certificate:
• Parameter is set to true value - ignore errors that are associated with
the revocation checking of the server certificate.
• Parameter is set to false value- do not ignore errors that are associ-
ated with the revocation checking of the server certificate.
Default value: false.
This parameter affects the following situation: the server has provided the
certificate, the certificate chain is correct, but revocation of the provided
certificate cannot be checked. In this case, the application behaves as fol-
lows, depending on the parameter value:
• The parameter is set to true- the connection will be established.
• The parameter is set to false - the connection will not be estab-
lished, an exception will be generated.
3.15. ConfigDumpInfo.xml
The ConfigDumpInfo.xml version file stores versions of objects that were
contained in the configuration at the moment of dumping. The file is located
in the directory that stores the dumped configuration files.
The version file is an xml-encoded UTF-8 file.
The ConfigDumpInfo root element has a single ConfigVersions
subordinate element. Metadata elements are subordinate to the
ConfigVersions element. The version file contains a Metadata ele-
ment for each object in the dumped configuration. One or more nested
Metadata elements are allowed for each Metadata element. The nested
elements describe subordinate configuration objects that cannot exist sepa-
rately from the parent object. A typical example is object attributes.
This ConfigDumpInfo element contains the following attributes:
format
This attribute specifies the format used for dumping the configuration
whose object versions are specified in this file.
This attribute can take the following values:
• Plain - linear format;
• Hierarchical - hierarchical structure.
version
This attribute contains version number of the configuration dumping format.
The ConfigVersions element does not contain any attributes.
The Metadata element contains the following attributes:
name
The attribute contains the full name of the exported configuration object.
id
The attribute contains the internal ID of the configuration object.
configVersion
The attribute contains the version of the configuration object. This attribute
is used to check whether the configuration object has been modified and
needs to be dumped again.
The values specified in the id and configVersion attributes should be
considered as "magic numbers". These numbers are used exclusively by the
internal components of the platform and are not intended for human users.
3.16. debugcfg.xml
The debugcfg.xml file is designed to configure the additional port range
used when debugging the configurations.
The file is located in the directory with the 1C:Enterprise configuration
files. It is optional.
The file is used only if debugging is performed over TCP/IP.
If the file is not found, ports from the standard range (1560-1591) are used
for communication. Debugging items on the server use the same ports as the
server processes: rmngr and rphost. Additional port ranges for debug items
on the server are not required.
Example:
<config xmlns="http://v8.1c.ru/v8/debugcfg">
<debugports range="1540:1550"/>
</config>
3.17. def.usr
The file contains the name of the user who recently opened this infobase.
File location:
• On Windows: %APPDATA%\1C\1cv8\<Unique infobase ID>.
• On Linux: ~/.1cv8/1C/1cv8/<Unique infobase ID>.
• On macOS: ~/.1cv8/1C/1cv8/<Unique infobase ID>.
Example:
C:\Documents and Settings\User\Application Data\1C\1cv8\4129dbdb-
b495-41cb-99ea-ef315060a03e\def.usr
~/.1cv8/1C/1cv8/4129dbdb-b495-41cb-99ea-ef315060a03e/def.usr
3.18. default.vrd
3.18.1. General information
This file is used to configure the web client and to use Internet services. It is
located in the virtual application directory.
NOTE. The hyperlinks in this file must conform to RFC 1738
(http://tools.ietf.org/html/rfc1738.html), RFC 2396
(http://tools.ietf.org/html/rfc2396.html).
Example:
<?xml version="1.0" encoding="UTF-8"?>
<point xmlns=http://v8.1c.ru/8.2/virtual-resource-system
xmlns:xs=http://www.w3.org/2001/XMLSchema
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
base="/demo"
ib="Srvr="tcp://Server";Ref="demo";"
enable="false"
allowexecutescheduledjobs="force"
<ws>
<point name="OperationalData" alias="OperData"/>
<point name="AnalyticalData" alias="AnalytData"/>
</ws>
<httpServices>
<service name="OperationExample" enable="true"/>
</httpServices>
<pool size="50" maxAge="10" attempts="2"/>
<debug enable="true" protocol="tcp" url="tcp://localhost"/>
<zones>
<zone value="8214" safe="true"/>
<zone value="last" specify="true" />
</zones>
</point>
The root element of the default.vrd file may contain the following attrib-
utes:
base
The base element points to a relative path (relative to the website root di-
rectory) to the virtual application directory.
TIP. It is recommended to specify the virtual application directory name
using only US ASCII characters.
Example:
base="/demoMA"
ib
Contains the connection string to 1C:Enterprise infobase. Remember that
different connection strings are used for the file and client/server modes.
NOTE. If there are characters in the connection string that are not valid in
terms of the XML standard (http://www.w3.org/TR/xml11/), the charac-
ters must be replaced accordingly.
In the connection string you can specify user login and password. In this
case, the connection to the infobase will be performed on behalf of the spec-
ified user. In the following example, the connection will be established on
behalf of the Seller user:
ib="Srvr="tcp://myServer";Ref="mybase";Usr=Sell
er;Pwd=123;"
However, if you specify a login and password at the command line for the
client application, the connection will be performed with the parameters
specified in the command line.
enable
Responsible for operations with the published infobase using a thin and a
web client. If the attribute is true, operations with the published infobase
using thin clients and web clients are allowed. The connection string will
look like this (for example at the beginning of the section):
http://host/demo
Otherwise (the attribute is set to false), operations using the thin client
and the web client are not allowed.
Default value: true (operations using the thin client and the web client are
allowed).
temp
Allows to specify a temporary files directory for the web server extension
(wsisapi.dll, wsap22.dll, wsapch2.dll) or for the infobase file mode. If the
attribute is not specified:
• the file infobase uses the 1Cv8Tmp subdirectory of the directory that
contains the infobase file.
• in other cases, the temporary file directory of the user on whose behalf
the request is performed is used.
If the attribute contains a reference to a directory used as a temporary file
directory for the web server extension operation, the user on whose behalf
the web server extension is started must have full access to that directory
and its contents.
pubdstwin32, pubdstwin64, pubdstmac64
NOTE 1. Available only for CORP licenses.
NOTE 2. Applies to 1C:Enterprise under Windows OS and macOS.
The attribute value specifies the full URL of the client application distribu-
tion package file to be downloaded and installed in the event of a mismatch
between the client application and server versions. With this URL, the dis-
tribution package must be accessible from outside the computer, on which it
is located. Attributes contain paths to distribution packages of the corre-
sponding client applications:
• pubdstwin32 - 32-bit client application for Windows OS;
• pubdstwin64 - 64-bit client application for Windows OS;
• pubdstmac64 - macOS client application. The macOS client appli-
cation exists only as a 64-bit application.
If the client application distribution package is obtained over HTTPS con-
nection, the computer that receives the distribution package will check the
certificate of the server from which the distribution package is received us-
ing the root certification authorities certificates obtained from the Windows
root certificate store of the operating system in use.
Archive type: zip. Archive requirements:
• Archive file structure:
On Windows OS: no hierarchy or directories, only the distribution
package files of the client application.
On macOS: .dmg file.
• Features of the distribution package files:
Distribution package for Windows OS: all files with .msi, .cab,
.mst extensions located in the archive must be digitally signed. If
OS Windows XP is unavailable in a list of client operating systems
(managing installation of 1C:Enterprise), there is no need to ar-
chive a file with _xp name suffix, such as 1CEnterprise8_xp.msi
and 1049_xp.mst etc.
Distribution package for macOS: All files with .pkg extension
must be digitally signed.
• Digital signatures of the files included in the distribution package
should be checked on the computer where the installation will be exe-
cuted.
Example:
pubdstwin32="http://www.myhost.ru/files/client-win-32.zip"
pubdstmac64="http://www.myhost.ru/files/client-mac-64.zip"
If the server version is changed, you only need to replace the client applica-
tion archive file.
allowexecutescheduledjobs
The attribute controls the ability to execute scheduled jobs by the web serv-
er extension for the infobase file mode.
The attribute can take the following values:
• off- in this case, the web server extension will not perform scheduled
jobs. In this case, the client application (if there is any) that connects
to the infobase directly, without the use of a web server, will perform
scheduled jobs.
• force - in this case, the web server extension will perform scheduled
jobs.
Default value: undefined. In this case, the scheduled jobs will be run by the
application that established the first connection to the infobase.
3.18.3. <ws>
3.18.3.1. Item attributes
The item contains the Web services publishing settings, and is subordinate
to the <point> item. No more than one <ws> item is allowed. This item
can contain any number of <point> items.
The item may contain the following attributes.
enable
Allows or prohibits Web services in the infobase. If the attribute is set to
true (or the attribute is missing), Web services are allowed. Otherwise (i.
e. the attribute is set to false), Web services are not allowed.
Default value: true (Web services are allowed).
pointEnableCommon
Allows or prohibits Web services published without explicit usage permis-
sion (enable attribute of the point item). If the attribute is set to true,
all Web services that have no explicitly specified value of the enable at-
tribute of the point item are allowed. Otherwise, the use of such Web ser-
vices is prohibited.
Default value: true (Web services are allowed).
publishExtensionsByDefault
Allows or prohibits using Web services from extensions.
If the attribute is set to true, all Web services that are located in attached
extensions are allowed. If the attribute is set to false, Web services in
extensions are not allowed.
Default value: false (Web services in extensions are prohibited).
3.18.3.2. <point>
The item contains a description of the published Web service. The item is
subordinate to <ws> item. There may more than one <point> item. In
this list, you can also manually specify parameters for Web services in ex-
tensions.
If a Web service is not explicitly specified in the default.vrd file and the
use of the application Web services is allowed, the Web service can only be
accessed by name (Web service property name). Access by synonym (alias)
will not be available even if the synonym is specified in the Web service
property Publication file name. In order for the Web service to be accessed
both by name and by synonym (alias)-, you should explicitly specify the
required Web services in the default.vrd file (including the synonym).
The item may contain the following attributes.
name
The name of the published Web service. The service can be accessed both
by a link that includes the name of the Web service, and by a link that in-
cludes a synonym of the Web service.
For the Web service described by the string:
…
base="/demo"
…
<point name="OperationalData" alias="OperData"/>
alias
The synonym of the published Web service. The service can be accessed
both by a link that includes the name of the Web service, and by a link that
includes a synonym of the Web service (if the synonym is specified in the
default.vrd file).
For a Web service that is published as follows:
…
base="/demo"
…
<point name="OperationalData" alias="OperData"/>
enable
Allows or prohibits the use of a web service.
Default value: true (publishing allowed).
reuseSessions
Session Reuse Mode:
• dontuse - sessions are not reused.
• use - session reuse is defined by the client and governed by parame-
ters of HTTP request to the Web service;
• autouse - sessions are reused automatically.
Default value: autouse.
sessionMaxAge
The session idle time after which the session is terminated (in seconds).
Default value: 20 (idle time allowed for a session is 20 seconds).
poolSize
The maximum number of sessions that can be generated during automatic
session management.
Default value: 10 (10 sessions in pool).
poolTimeout
Time to wait for an available session after the session pool is filled (in sec-
onds). If the application cannot create a new session during this time, the
client will receive an error message.
Default value: 5 (session timeout is 5 seconds).
NOTE. Changed values of reuseSessions, sessionMaxAge,
poolSize, poolTimeout attributes will be valid only after the
1C:Enterprise server is restarted.
3.18.4. <httpServices>
3.18.4.1. Item attributes
The item contains the HTTP services publishing settings, and is subordinate
to the <point> item. No more than one <httpServices> item is al-
lowed. This item can contain any number of <service> items.
The item may contain the following attributes.
publishByDefault
If this attribute is not set or set to true, all HTTP services that are added to
the configuration will be automatically available for use, unless explicitly
prohibited by the <service> item.
Default value: true (HTTP services are allowed to operate).
publishExtensionsByDefault
Responsible for the ability to use HTTP services from extensions.
If the attribute is set to true, all HTTP services that are located in connect-
ed extensions will be available for use. If the attribute is set to false, the
HTTP services from the extensions will not be available for use.
Default value: false (extensions HTTP services are prohibited from oper-
ating).
3.18.4.2. <service>
The item contains a description of the published HTTP service. The item is
subordinate to <httpServices> item. There may more than one
<service> item. In this list, you can also manually specify HTTP ser-
vices parameters from extensions.
The item may contain the following attributes.
name
Contains the HTTP service name as it is specified in Designer. This name is
not used to access the service.
rootUrl
Contains the value of the Root URL property of the HTTP service property.
The property is used to determine the HTTP service that should process the
received request.
enable
Allow or prohibits the use of a HTTP service.
Default value: false (use is prohibited).
reuseSessions
Session Reuse Mode:
• dontuse - sessions are not reused.
• use - session reuse is defined by the client and governed by parame-
ters of HTTP request to the HTTP service;
• autouse - sessions are reused automatically.
Default value: autouse.
sessionMaxAge
The session idle time after which the session is terminated (in seconds).
Default value: 20 (idle time allowed for a session is 20 seconds).
poolSize
The maximum number of sessions that can be generated during automatic
session management.
poolTimeout
Time to wait for an available session after the session pool is filled (in sec-
onds). If the application cannot create a new session during this time, the
client will receive an error message.
3.18.5. <pool>
The item contains the settings of the pool of connections with the infobase.
No more than one <pool> item is allowed.
The item may contain the following attributes:
size
Pool size - the maximum number of connections in the pool.
The default value is 10 000.
maxAge
The connection lifetime in the pool - the maximum connection lifetime in
the pool, in seconds. If the connection is not requested within the specified
time, it will be removed from the pool.
The default value is 20 minutes.
attempts
Maximum number of attempts to establish a connection with the
1C:Enterprise server.
The default value is 5.
attemptTimeout
Waiting time (in milliseconds) to establish a connection with the
1C:Enterprise server.
The default value is 500 ms.
waitTimeout attribute
Waiting time (in milliseconds) between attempts to establish a connection
with the 1C:Enterprise server.
The default value is 500 ms.
serverPingPeriod
Connection interruption check frequency (in milliseconds).
The default value is 1,000 ms.
The maximum value is 65,535 ms.
serverPingTimeout
The time (in milliseconds), during which the connection interruption moni-
toring system is expecting at least one message from the monitored process.
The default value is 5,000 ms.
The maximum value is 2,147,483,647 ms.
Example:
<pool size="50" maxAge="10" attempts="2" attemptTimeout="1"
waitTimeout="1"/>
3.18.6. <debug>
enable
Indicates the need to start in debug mode:
• enable="true" - debug enabled;
• enable="false" - debug disabled.
protocol
Specifies which debug protocol will be used when operating with this pub-
lication if debugging is enabled:
• protocol="tcp" - TCP/IP protocol is used (default)
• protocol="http" - HTTP protocol is used
url
Specifies the address of the debugger, to which you need to automatically
connect for debugging, where localhost specifies the search on the local
computer, "1560" - the network port number. If no port is specified, all
ports in the 1560–1591 port range will be scanned. Specifying tcp:// is
equivalent to tcp://localhost. If debugger address is not specified, the de-
bugging is not performed during 1C:Enterprise language code execution.
If HTTP protocol is used, debugger address must include a port number to
be used: http://pc-name:1561.
If the debugging protocol specified using protocol attribute does not
match the arrangement specified in url attribute, connection to the debug-
ger will not be established and the operation is continued without debug-
ging.
Example:
<debug enable="true" protocol="http" url="http://pc-name:1561"/>
3.18.7. <zones>
13.4.1.1. Item description
<zones> item is subordinate to <point> item. No more than one is al-
lowed. <zones> item may have one or several subordinate <zone> items.
This item does not have any attributes.
3.18.7.1. <zone>
Each <zone> item describes one separator. The sequence of <zone>
items in <zones> item matches the sequence of separators in Designer. If
the sequence of separators changes, default.vrd file must be edited accord-
ingly. Number of <zone> items must not exceed the number of separators.
If the number of items exceeds the number of separators, an exception will
be generated when connecting to the infobase. If the number of items is less
than the number of separators, the default value for separator type will be
used as a value of non-specified separators and the separator use will be
disabled.
<zone> item may contain the following attributes.
safe
Allows or prohibits changing the values of objects related to data separation
functionality, if the infobase is accessed by a web client or by a thin client
via web server (data separation safe mode). This attribute must be used
when the user needs to ensure that no other data regions can be accessed
when accessing the infobase over the Internet.
Default value: false (changes allowed).
If the attribute value is true, the following actions are prohibited in the
session using this infobase publication:
• Disabling the use of separator, unless the separation is conditionally
disabled.
• Changing the used separator value, unless the separation is condition-
ally disabled.
• Modifying the objects managing the conditional separation:
Specified for the separator itself
Specified for the objects included in the separator
specify
Determines whether the published infobase address must contain this sepa-
rator value.
Default value: false (separator is not used in address).
value
Explicitly specifies the value of separator placed in this position.
If value of value attribute is not specified and specify attribute is set to
false, this is equivalent to absence of separator value (corresponds "-"
value in connection string Zn parameter value).
If specify attribute is true and value of value attribute is specified,
this value (case-insensitive) must be explicitly specified in the infobase ad-
dress string in the respective position. Otherwise error code 404 (web page
not found) will be returned when attempting to access the infobase.
Symbols prohibited in URLs (RFC 1738,
http://tools.ietf.org/html/rfc1738.html) are converted to UTF-8 and en-
coded in accordance with section 2.2. URL Character Encoding Issues of
RFC 1738 standard (using "%" and two hex characters).
Default.vrd file example:
<?xml version="1.0" encoding="UTF-8"?>
<point xmlns=http://v8.1c.ru/8.2/virtual-resource-system
xmlns:xs=http://www.w3.org/2001/XMLSchema
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
base="/test"
ib="File="c:\base";">
<ws enable="false"/>
<zones>
<zone value="8214" safe="true"/>
<zone specify="true" />
<zone />
<zone specify="true" />
<zone value="last" specify="true" />
</zones>
</point>
3.18.8. <openid>
3.18.8.1. Item description
This item describes the settings related to OpenID authentication.
<openid> item is subordinate to <point> item. No more than one is
allowed. <rely> and <provider> items are subordinate to <openid>
item. No more than one subordinate element is allowed.
This item does not have any attributes.
3.18.8.2. <rely>
The item contains the address of infobase used as OpenID provider.
url
Specifies the URL of 1C:Enterprise infobase used as OpenID provider. The
infobase must be published in a special way.
IMPORTANT! Interaction with OpenID provider is only performed over
HTTPS connection.
NOTE. OpenID provider URL must not end with "/". Correct:
https://myserver.org/users-ib/e1cib/oid2op, incorrect:
https://myserver.org/users-ib/e1cib/oid2op/.
Example:
<rely url="https://myserver.org/users-ib/e1cib/oid2op"/>
3.18.8.3. <provider>
3.18.8.3.2. <lifetime>
The item specifies the lifetime of the authentication data flag. If the item is
not specified, the default value is 86 400 seconds (24 hours). Maximum
authentication data lifetime is 604 800 seconds (7 days). If greater value is
specified for lifetime item, the maximum value is used.
Example:
<?xml version="1.0" encoding="UTF-8"?>
<point xmlns=http://v8.1c.ru/8.2/virtual-resource-system
xmlns:xs=http://www.w3.org/2001/XMLSchema
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
base="/demo"
ib="Srvr="tcp://Server";Ref="demo";"
enable="false">
<openid>
<provider>
<lifetime>432000</lifetime>
</provider>
</openid>
</point>
3.18.8.3.3. <returnto>
<returnto> item is subordinate to <provider> item and may be used
any number of times or skipped.
<returnto>mysite\.org</returnto>
<returnto>.*\.1c\.ru</returnto>
The item contains a regular expression that defines the mask for permitted
names of websites that can be used to redirect the user's web browser (see
openid.return_to request parameter) after OpenID provider com-
mand is executed.
If no <returnto> item is specified during OpenID provider publishing,
any request to OpenID provider containing openid.return_to parame-
ter will result in HTTP 400 error.
3.18.9. <openidconnect>
3.18.9.1. Item description
This item describes the settings related to authentication over OpenID Con-
nect protocol. Applicable when using thin client and web client.
<openidconnect> item is subordinate to <point> item. No more than
one is allowed. <providers> and
<allowStandardAuthentication> items are subordinate to
<openidconnect> item. No more than one subordinate element is al-
lowed.
This item does not have any attributes.
<openidconnect>
<providers><![CDATA[[
<json-data>
]]]>
</providers>
<allowStandardAuthentication>true</allowStandardAuthentication>
<openidconnect>
3.18.9.2. <providers>
This item contains description of external OpenID providers supporting
OpenID Connect v1.0 authentication protocol
(http://openid.net/connect/). The description is an array of objects,
where each object describes one OpenID provider. The array is represented
by JSON serialization.
Each provider is described with the object with the following properties:
• name - provider ID. Must be unique within the array. If the array con-
tains several providers with the same ID, the last one will be used.
• title - provider text representation. Will be displayed on the pro-
vider button in the authentication page unless the image (image) is
specified.
• image - provider graphical representation. Will be displayed on the
provider button in the authentication page. The image is specified as
data:image in base64 format.
• discovery - describes provider URL (if supported), which allow to
retrieve all its settings (discovery endpoint URL) when accessed.
• provideconfig - provider settings description as JSON file (un-
less the provider supports the request to retrieve settings). The data
must be in OpenID Provider Metadata format
(http://openid.net/specs/openid-connect-discovery-
1_0.html#ProviderMetadata).
• clientconfig - client configuration as JSON file. This data format
matches OAuth 2.0 Authorization Request format
(http://openid.net/specs/openid-connect-core-
1_0.html#AuthRequest), to which the authority that must con-
tain authentication provider URL is added. Contents of this property
depend on the provider used.
redirect_uri property in clientconfig structure has URL
which is used to enter an authentication data processor in an applica-
tion which requests such authentication. As a rule, the said URL is as
follows: https://IBhost/IBname/authform.html, где:
IBhost - name of a host, where an infobase is published.
IBname - name of an infobase which has been published ("name"
means information entered in Name field in the infobase publica-
tion dialog box or any similar value, if any other publication meth-
od is used.
• dialect - defines the protocol that will be used to interact with the
provider. If ru-esia value is specified, then the protocol of the Uni-
fied system for identification and authentication will be used to inter-
act with the provider (USIA,
http://minsvyaz.ru/ru/activity/directions/13/). If this attribute is
not specified or its value differs from ru-esia, then OpenID Con-
nect v1.0 protocol will be used to interact with the provider.
• crypto - contains a structure that describes the cryptography module
that is used to sign requests. Signing requests is necessary if the USIA
protocol is used to interact with the provider (dialect property is
equal to the ru-esia value). The structure contains the following
properties:
module_name - cryptography module name;
module_path - path to the cryptography module;
module_type - cryptography module type;
cert_thumbprint - certificate thumbprint that will be used to
sign requests. Certificate search will be executed by thumbprint.
The certificate must be previously stored in the personal certificate
store.
The fields of the structure located in the crypto property are similar
to the parameters of the constructor of the
CryptographyManager object.
Provider description example:
<openidconnect>
<providers><![CDATA[[
{
"name": "google",
"title": "Google",
"discovery": "https://accounts.google.com/.well-known/openid-
configuration",
"clientconfig": {
"authority": "https://accounts.google.com/",
"client_id": "<client ID>",
"redirect_uri": "https://localhost/openidc/authform.html",
"response_type": "id_token token",
"scope": "openid email",
"filterProtocolClaims": true,
"loadUserInfo": false
}
},
{
"name": "microsoft",
"title": "Microsoft",
"image": "data:image/png;base64,………",
"discovery": "https://login.microsoftonline.com/<client
ID>/.well-known/openid-configuration",
"clientconfig": {
"authority": "https://login.microsoftonline.com/<client
ID>/",
"client_id": "<client ID>",
"redirect_uri": "https://localhost/openidc/authform.html",
"response_type": "id_token token",
"scope": "openid email"
}
},
{
"name": "googleII",
"title": "Another Google",
"providerconfig": {
"issuer": "https://accounts.google.com",
"authorization_endpoint":
"https://accounts.google.com/o/oauth2/v2/auth",
"token_endpoint":
"https://www.googleapis.com/oauth2/v4/token",
"response_types_supported": ["code","token"],
"scopes_supported": ["openid","email","profile"]
},
"clientconfig": {
"authority": "https://accounts.google.com/",
"client_id": "<client ID>",
"redirect_uri": "https://localhost/openidc/authform.html",
"response_type": "id_token token",
"scope": "openid email"
}
}
]]]>
</providers>
<allowStandardAuthentication>true</allowStandardAuthentication>
</openidconnect>
3.18.9.3. <allowStandardAuthentication>
The item allows or prohibits 1C:Enterprise authentication. If this item is
false, authentication using the providers described in default.vrd file will
be available in the authentication form on web client startup.
The item can take the following values:
• true - 1C:Enterprise authentication is permitted. Default value.
• false - 1C:Enterprise authentication is forbidden.
3.18.11. <standardOData>
This item determines whether OData standard interface is available for the
published infobase. The item is subordinate to <point> item.
<standardOData> item can be just one or none. If default.vrd contains
no such item, -the standard OData interface is not available for the pulished
application.
The item may contain the following attributes.
enable
The attribute controls availability of the OData standard interface via the
specified publication. The attribute can take the following values:
• true - data operations using the OData standard interface are possi-
ble via the current publication;
• false - data operations using the OData standard interface are not
possible via the current publication.
reuseSessions
Session reuse mode when using the OData standard interface:
• dontuse - sessions are not reused.
• use - session reuse is defined by the client and governed by parame-
ters of HTTP request to the Web service;
• autouse - sessions are reused automatically.
Default value: dontuse (sessions are not reused).
sessionMaxAge
The session idle time after which the session is terminated (in seconds).
Default value: 20 (idle time allowed for a session is 20 seconds).
poolSize
The maximum number of sessions that can be generated during automatic
session management.
poolTimeout
Time to wait for an available session after the session pool is filled (in sec-
onds). If the application cannot create a new session during this time, the
client will receive an error message.
3.19. inetcfg.xml
inetcfg.xml file allows to specify the default proxy settings and has a great-
er priority over the default proxy settings in Windows OS or parameters,
specified in the environment variables in Linux and macOS.
The file is located in the directory with the 1C:Enterprise configuration
files. It is optional.
• On Windows:
• If there is a file, - the settings are taken from the file.
• If the file is absent- the settings are taken from Microsoft Internet
Explorer settings. The use of an automatic configuration scenario
is not supported.
• On Linux:
If there is a file, - the settings are taken from the file.
If the file is absent -, the attempt is made to retrieve the settings
from environment variables http_proxy, https_proxy,
ftp_proxy, ftps_proxy (in accordance with the protocol
used). If the environment variables are not specified, the attempt is
made to retrieve the proxy settings from all_proxy environ-
ment variable. If the environment variables contain invalid param-
eters -, these are ignored.
• On macOS:
If there is a file, - the settings are taken from the file.
If the file is absent -, the attempt is made to retrieve the settings
from environment variables http_proxy, https_proxy,
ftp_proxy, ftps_proxy (in accordance with the protocol
used). If the environment variables are not specified, the attempt is
made to retrieve the proxy settings from all_proxy environ-
ment variable. If the environment variables contain invalid param-
eters -, these are ignored.
During proxy setup the User-Agent data from the HTTP request may be
used:
• thin client - 1CV8C;
• Web service- 1C+Enterprise/8.3;
• web client - this parameter is generated by web browser.
Example:
<InternetProxy
protocols="http=10.1.0.8:8080 10.1.0.9:8080"
user="proxyUser"
password="proxyPassword"
bypassOnLocal="true"
bypassOnAddresses="127.0.0.1 *.master"
/>
InternetProxy root item, containing the default proxy settings, has the
structure (attributes) as specified below.
ntlm optional
Type: Boolean. NTLM authentication use flag:
• true - NTLM authentication is enabled;
• false - NTLM authentication is disabled.
NTLM authentication is enabled by default.
protocols optional
Type: String. Specifies the host name and port for the protocols. The
format is as follows:
ProtocolProxyParameters1ProtocolProxyParameters2
…ProtocolProxyParametersN
ProtocolProxyParameters:=[Протокол]"="host":"port
Where:
• for HTTP the following proxy parameters are defined: host - 10.1.0.8,
port - 8080;
• for other protocols (HTTPS, FTP): host - 10.1.0.9, port - 8080.
user optional
Type: String. Username for authentication on proxy server, e.g.:
user="proxyUser"
password optional
Type: String. User password for authentication on the proxy server. Ex-
ample:
password="proxyPassword"
bypassOnLocal optional
Type: Boolean. Flag, specifying the use of proxy servers for the local
addresses:
• true - not used;
• false - used.
Whether the address is local is determined by the presence of dot in address
DNS name (i. e. all the IP addresses are not local). In some situations, a
local address is not recognized correctly.
For example, <user>.<domain> is a local address in Windows XP, but
is not recognized as such. In order to restrict using proxy for the addresses
recognized as local, the following parameter is used:
bypassOnLocal="true"
Host names are separated with spaces. Host name may contain the follow-
ing mask special characters: * - any number of characters, ? - any character.
For example, in order to block proxy for all the domain hosts, use:
*.<domain name>, such as:
bypassOnAddresses="127.0.0.1 *.master"
In this example, the proxy is not used for 127.0.0.1 (localhost) address and
all the master domain addresses.
3.20. location.cfg
location.cfg file is used to specify the directory containing the user settings
files and software license file location. location parameter is used to specify
the directory location.
location
Directory path.
Example:
location=C:\Users\UserName\AppData\Roaming\1C\1cv82
3.21. logcfg.xml
3.21.1. General description
logcfg.xml file is used to configure the parameters of technological log and
memory dumps generation function in case of unexpected 1C:Enterprise
shutdown.
The file is located in the directory with the 1C:Enterprise configuration
files. It is optional.
If the file is not found, the default technological log settings are applied:
• Technological log (<log> element) - is disabled.
• Technological log by default (<defaultlog> element):
Generation is - enabled.
Life time - 24 hours.
The level of event generation <system> for all system compo-
nents is defined as Error.
Stores in directories:
Windows OS:
%USERPROFILE%\Local Settings\1C\1cv8\logs
(%LOCALAPPDATA%\1C\1cv8\logs for Windows Vista and
later).
Linux: ~/.1cv8/logs.
• Forced abortion dumps (relevant only for Windows OS):
Minimum forced abortion dumps of system work is saved
(type="1").
Dumps are saved to %USERPROFILE%\Local Set-
tings\Application Data\1C\1cv8\dumps
(%LOCALAPPDATA%\1C\1cv8\dumps directory for Win-
dows Vista and later).
Example:
<config xmlns="http://v8.1c.ru/v8/tech-log">
<log location="c:\v8\logs" history="1">
<event>
<eq property="name" value="conn"/>
</event>
</log>
<dump location="c:\v8\dumps" create="1" type="2"/>
</config>
3.21.2.2. <log>
<log> item defines the technological log directory and the filtering criteria
used to store the previously generated events in the technological log.
IMPORTANT! Allowing a large amount (over 20) of technological logs
(<log> items) in logcfg.xml is not recommended. Large amount of con-
figured logs may cause a significant system performance decrease.
The item attributes:
location
Name of the directory to save the technological log to.
IMPORTANT! Please take note that the directory of the technological log
is not intended to store any files unrelated to the technological log. Do not
keep dumps in this directory, and do not keep 1C:Enterprise technological
log in a directory with any unrelated files. If any unrelated files are found in
the technological log directory, the directory is considered invalid and the
log is not created.
NOTE. Different directories must be specified in the location attributes
of the <log>, <dump> and <defaultlog> items.
history
Retention time of technological log records.
The <log> item may contain<event> and <property> items that de-
termine the conditions for recording each event and event property to the
log.
If this item contains no <event> items, no events are recorded to the log.
3.21.2.3. <event>
Sequence of <event> items defines the condition for saving the event to
the log. Only the events meeting the condition are saved to the log. In other
words, if the condition defined by the <event> items sequence is True,
the event is written to the log. The event is added to the log if it meets all
the conditions within at least one of the <event> items. The conditions
within the <event> item are combined using logical AND, and the
<event> items are combined using logical OR.
Conditions are set by the below items:
• eq - equals;
• ne - does not equal;
• gt - is greater;
• ge - is greater or equals;
• lt - is less;
• le - is less or equal;
• like - matches the mask.
Each of these items, except like item, defines a simple comparison of the
event parameter value (property attribute defines the parameter name) to
the value attribute value.
Example:
<event>
<eq property="name" value="proc"/>
</event>
In this case, events referred to the group named PROC will be recorded to
the technological log.
The following event names are available:
Example:
<log location="c:\logs" history="1">
<event>
<eq property="name" value="proc"/>
</event>
<event>
<eq property="name" value="scom"/>
</event>
<event>
<eq property="name" value="conn"/>
</event>
<event>
<eq property="name" value="excp"/>
</event>
<event>
<eq property="name" value="dbmssql"/>
</event>
</log>
This example illustrates how the events from PROC, SCOM, CONN, EXCP
and DBMSSQL groups are recorded in the technological log.
3.21.2.4. <property>
Each event has a set of properties. Each property has a name. Several prop-
erties with the same names are allowed per event. Property names may be
used for events and properties filtering. Comparison of names is case-
insensitive. Empty condition in <property> item means that the property
is always displayed.
NOTE. Event property is only displayed if <property> item exists for it.
3.21.2.4.2. List of properties
The basic event properties, which may be required for configuration file
setup and technological log browsing, are given below:
The interface context in the technological log file might look like this:
{Document.Document1.ListForm}/{TabularField:
ДокументСписок}/{ОбновлениеОтображения}
{Document.Document1.Form.DocumentForm}/{CommandBar:
ОсновныеДействияФормы}/{ОсновныеДействияФормыОК}
{Document.Document1.Form.DocumentForm}/{Button:
Кнопка1}/{Нажатие}
To record the SDBL (SDBL queries) and DBMSSQL events (SQL statements
to the MS SQL Server DBMS) without the execution context, the techno-
logical log configuration file must be filled in, as follows:
<config xmlns="http://v8.1c.ru/v8/tech-log">
<log location="c:\v8\logs" history="1">
<event>
<eq property="name" value="sdbl"/>
</event>
<event>
<eq property="name" value="dbmssql"/>
</event>
</log>
</config>
To record the SDBL (SDBL queries) and DBMSSQL events (SQL statements
to the MS SQL Server DBMS) without execution context but with all other
properties, the configuration file should contain:
<config xmlns="http://v8.1c.ru/v8/tech-log">
<log location="c:\v8\logs" history="1">
<event>
<eq property="name" value="sdbl"/>
</event>
<event>
<eq property="name" value="dbmssql"/>
</event>
<property name="all">
</property>
<property name="context">
<eq property="name" value=""/>
</property>
</log>
</config>
In order to record the SDBL events (SDBL queries) with the execution con-
text and DBMSSQL (SQL statements to the MS SQL Server DBMS) without
the execution context, the content of the configuration file should look like
this:
<config xmlns="http://v8.1c.ru/v8/tech-log">
<log location="c:\v8\logs" history="1">
<event>
<eq property="name" value="sdbl "/>
</event>
<event>
<eq property="name" value="dbmssql"/>
</event>
<property name="context">
<event>
<eq property="name" value="sdbl"/>
</event>
</property>
</log>
</config>
In the above example, all the exceptions associated with locks will be rec-
orded (in particular, DEADLOCK- interlocks of connections and TIMEOUT-
of a predetermined time, wherein in both cases a number of the connection
that caused this exception) and the periods of waiting exceeding 10 seconds
will be included in the message text about the exception. Wherein infor-
mation about all properties except Context will be recorded.
Value Description
AcceptPartialIndex Accept partial indexes.
addCopy Adding the database copy (for
DBCOPIES event).
agentAuthenticate Central server administrator au-
thentication.
applyServiceAssociationR Application of the requirements
ules related to functionality assign-
ment.
attach An assignment of the session to a
connection (an event of SESN
Value Description
kind is being output at the moment
of unassignment to a connection of
the session). A duration indicates
how long the session was assigned
to a connection.
authenticateInfoBaseAdmi Authentication of the infobase
n administrator.
authenticateSrvrUser Authentication of a cluster admin-
istrator in working process.
authenticateSrvrUser Authentication of a cluster user in
working server.
authenticateStarter Authentication of a remote central
server.
beginTransaction A transaction starts (an event of
SDBL kind is displayed in the log
at the moment when the said
transaction starts and has no dura-
tion).
busy A session has already been as-
signed to a connection (SESN
event is being output when an at-
tempt is made to assign a session
that has already been assigned to
the connection). Has no duration.
changeInfoBaseParams Infobase parameters change. Serv-
er licensing, external session man-
agement, mandatory external ses-
sion management, security profile,
security profile of the secure
mode.
changeLocale Change in the national database
settings.
CheckIndexes Verification of the full-text search
indexes is being executed.
commitTransaction Transaction commitment.
connect Connection to an external data
source.
continueFillTable Resumption of initial filling in
database copy table (for
DBCOPIES event).
copyMoveFile Copying / moving a fragment of
an application between database
Value Description
table entries.
createFile Create a file.
createInfoBase Create an infobase.
deleteFile Delete a file.
deserializeTable Recovery of data pertained to the
database table from a file.
disconnect Disconnection from the external
data source.
dropInfoBase Delete an infobase.
erase<X> Delete an entry from the security
profile where <X> is:
• Virtual directory -
SecurityProfileVirt
ualDirectory
• External module -
SecurityProfileExte
rnalModule
• Add-in -
SecurityProfileAddI
n
• Internet resource -
SecurityProfileInte
rnetResource
• Application -
SecurityProfileAppl
ication
eraseAgentUser Delete a central server administra-
tor.
eraseIBRegistry Delete a central server cluster.
eraseIBRegistry Delete a cluster.
eraseRegServer Delete a working server.
eraseRegServer Delete a working server.
eraseRegUser Delete cluster administrators.
eraseRegUser Delete a cluster user.
eraseSeance Delete a session.
eraseSecurityProfile Delete a security profile.
eraseServerProcess Delete a working process.
eraseServiceAssociationR Delete a functionality assignment
ule requirement.
fillTable Execution of initial filling in data-
base copy table (for DBCOPIES
event).
Value Description
fillTableBlocksKeyFields Fill in the database copy table by
key values (for DBCOPIES
event).
fillTableBlocksKeyFields Fill in the database copy table con-
TableParts taining reference data (for
DBCOPIES event).
fillTableOne Fill in the database copy table with
one query (for DBCOPIES event).
finish The end of session (an event of
SESN kind is logged at the time of
a session being ended and the
event duration is equal to a dura-
tion of the entire session).
FtextMngrIndexChanges A full-text search index is being
updated in the file mode of in-
fobase.
FtextMngrRHostIndexChang A full-text search index is being
es updated in the client-server mode
of infobase.
get<X> Reading of the full list of security
profiles or their entries where <X>
is:
• Virtual directory -
SecurityProfileVirt
ualDirectory
• External module -
SecurityProfileExte
rnalModule
• Add-in -
SecurityProfileAddI
n
• Internet resource -
SecurityProfileInte
rnetResource
• Application -
SecurityProfileAppl
ication
getAgentUsers Read data on the agent administra-
tors.
getClusterManagers Read the list and parameters of
cluster managers.
getConnections Read the list of connections.
Value Description
GetDataForIndexing Get the list of modified objects to
be included in the full-text search
index
getIBRegistry Read the list and parameters of
clusters.
getInfoBaseParams Read the infobase parameters.
getInfoBases Read a list of infobases.
getObjectLocks Read a list of cluster object locks.
getRegUsers Read data on the cluster adminis-
trators.
getSeances Read a list of sessions.
getServerProcesses Read a list and parameters of
working processes.
getServiceAssociationRul Read a list of functionality as-
es signment rules.
getServicesDistribution Read data on the distribution of
services between cluster manag-
ers.
getServicesInfo Read information about available
cluster services
getTransactionSplitter Get a totals separator.
holdConnection Hold connection.
IndexObjects Perform indexing of a portion of
objects.
initialize Initialize a licensing subsystem
(for LIC events only).
insertAgentUser Creating a central server adminis-
trator.
insertAgentUser Add a central server user.
insertIBRegistry Add a cluster to the central server.
insertIBRegistry Create a cluster.
insertRecords Add a record to the database table.
insertRegServer Add a working server.
insertRegServer Add a working server.
insertRegUser Add a cluster administrator.
insertRegUser Add a cluster user.
insertServerProcess Add a working process.
insertServerProcess Add a working process.
isProperLocale Validate database local settings.
killClient Disconnect a client from
1C:Enterprise cluster server.
lockRecord Locked record.
Value Description
lookupTmpTable Get/create a temporary database
table.
MergeSynchro Merge files with full-text search
indexes.
modifyFile Update a file.
moveFile Move a file.
quickInsert Quick insert of data into a data-
base table.
readFile Read a file.
reFillTable Refill and resume filling in of the
database copy table (for
DBCOPIES event).
regAuthenticate Cluster administrator authentica-
tion.
regAuthenticate Perform cluster authentication.
removeCopy Delete a database copy (for
DBCOPIES event).
restoreObject Restore an object.
resumeIndexing Resume database table indexing.
returnTmpTable Release a temporary database ta-
ble.
rollbackTransaction Cancel a transaction.
saveObject Save an object.
searchFile Search a file.
securedInsert Insert records with restrictions on
data access.
selectFileName Select a file name.
serializeTable Save table data to a file.
setClusterRecycling Change settings for restarting the
cluster working processes (except
for fault tolerance level).
setFaultToleranceLevel Change the cluster fault tolerance
level.
setInfoBaseConnectingDen Change infobase session start
y blocking parameters.
setInfoBaseConnectingDen Set locking mode for establishing
y connections with infobase.
setInfoBaseDescr Change description of an infobase.
setInfoBaseDescr Set description of an infobase.
setInfoBaseScheduledJobs Change infobase scheduled job
Deny locks.
setRegDescr Change description of a cluster.
Value Description
setRegDescr Set description of a cluster.
setRegMultiProcEnable Enable support of multiple work-
ing processes for a cluster.
setRegSecLevel Change level of the secure cluster
connection.
setRegSecLevel Set level of the secure cluster con-
nection.
setRollbackOnly Set a flag indicating errors in
transaction (such transaction can
only be rolled back).
setSecurityProfile Create or modify a security pro-
file.
setSecurityProfileAddIn Create/modify an entry in the se-
curity profile (add-in).
setSecurityProfileApplic Create/modify an ntry in the secu-
ation rity profile (application).
setSecurityProfileComCla Create/modify an entry in the se-
ss curity profile (COM class).
setSecurityProfileExtern Create/modify an entry in the se-
alModule curity profile (external module).
setSecurityProfileIntern Create/modify an entry in the se-
etResource curity profile (Internet resource).
setSecurityProfileVirtua Create/modify an entry in the se-
lDirectory curity profile (virtual directory).
setServerProcessCapacity Set throughput capacity of a work-
ing process.
setServerProcessCapacity Set performance capacity of a
working process.
setServerProcessEnable Set flag indicating that a working
process is allowed to start.
setServerProcessEnable Set status of a working process.
setServiceAssociationRul Create or modify a functionality
e assignment rule.
setSingleUser Set exclusive mode.
setSrcProcessName Create common infobase data in a
working process and assign a
common name to this data. An
event is recorded when the first
user connects to infobase through
this working process or when per-
forming a dynamic update of the
infobase configuration.
Value Description
setTableState Change the state of the database
copy table (for DBCOPIES
event).
start Start a session (an event of SESN
type is logged at the time when a
session starts and has no duration).
suspendIndexing Cancel indexing of database ta-
bles.
takeKeyVal Get a value of a tabular section
record key.
transaction Start a transaction (an event of
SDBL type starts at the beginning
of a transaction, ends when it is
finished).
transferChangesTable Transfer changed objects to the
database copy (for DBCOPIES
event).
transferTrLogs Transfer transaction logs to the
database copy (for DBCOPIES
event).
updateCopyContent Change content of the database
copy tables (for DBCOPIES
event).
updateCopyProperties Change parameters of a database
copy (for DBCOPIES event).
updateRegServer Modify parameters of a working
server.
updateTimeIsOver Completion of the database copy
update (for DBCOPIES event).
wait Wait for an assignment (an event
of SESN type is output when wait-
ing period of assigning a session
to a connection is finished). Dura-
tion of an event is equal to the
time spent while waiting for a
connection. If a connection is as-
signed with a session which has
already been assigned, then the
current thread of the current con-
nection is waiting for cancellation
of the session assignment to an-
other connection.
Value Description
xlockTables Set an exclusive lock on a table.
xlockTablesShared Set a shared lock on a table.
3.21.2.5. <dump>
The item <dump> defines the parameters of dump created when an applica-
tion crashes. To disable dump recording, set create = "0" or create
= "false" in the item <dump>. If <dump> is absent, the directory
%USERPROFILE%\Local Settings\Application Data\1C \ 1cv8\dumps
(for Windows) will be used to record the dumps.
IMPORTANT! For Linux and macOS, dumps generation settings are gov-
erned by OS. Therefore, the item <dump> is ignored.
The item attributes:
location Windows
The name of a directory in which the dump files will be placed.
NOTE. Different directories must be specified in the location attributes
of the <log>, <dump> and <defaultlog> items.
create Windows
Create or not create a dump file.
• 0 (false) - do not create
• 1 (true) - create
type Windows
Dump type – an arbitrary combination of the following check boxes, repre-
sented in decimal or hexadecimal system (addition of check box values). A
hexadecimal representation must begin with a ‘x’ character; for example,
x0002.
The following values are available:
• 0 (x0000)- Minimum;
• 1 (x0001) -Additional data segment;
• 2 (x0002) -A content of the entire memory of a process;
• 4 (x0004) - Data handles;
• 8 (x0008) - Leave in dump only information needed to restore the
server call stacks;
• 16 (x0010) - If stack contains references to the modules' memory, then
add the check box 64 (0x0040);
• 32 (x0020) - To include memory from under the unloaded modules
into dump;
• 64 (0x0040) - To include memory to which there are links to dump;
• 128 (x0080) - To add detailed information about the module files to
dump;
• 256 (0x0100) - To add local stream data to dump;
• 512 (0x0200) - Inclusion of memory from the entire available virtual
address space in dump.
TIP. For most cases, it is sufficient to use 3 as the value of type attribute,
for example, type = "3".
prntscrn Windows
Indicates whether to save a screenshot when 1C:Enterprise client crashes.
The file name is the same as the dump name but has extension png. The
screen copy files are created in the same directory as dumps (see the
location attribute).
• 0 (false) - Do not create
• 1 (true) - Create
In case of emergency termination of the “1C: Enterprise” program, the sys-
tem issues a dialog with information about the dump recording process
which is automatically closed after the dump recording is completed.
externaldump Windows
Controls generation of a crash dump if 1C:Enterprise is running on Win-
dows. The attribute can take the following values:
• 0 (false) - A dump is generated by a process that crashes (a default
value).
• 1 (true) - A dump is generated by the external application dump-
er.exe which is included in the 1C: Enterprise delivery package.
When an external program is being used, a possibility of hanging in
the process of creating dump is excluded.
If an external program is not detected or some problems are detected during
its launch, standard mode for creating dumps (using a crashing process) will
be used.
It is recommended to use an external program of generating dumps for
1C:Enterprise servers that work without daily maintenance.
3.21.2.6. <leaks>
The <leaks> item establishes tracking of memory leaks caused by issues
in configuration code. By default, leak tracking is disabled and it does not
affect the system performance.
In order to enable the leakage data collection, add the item <leaks> to the
logcfg.xml file: <leaks collect="1"> or <leaks
collect="true">.
To disable memory leak tracking, the <leaks> item should be changed:
<leaks collect="0"> or <leaks collect="false">.
If a leak tracking is enabled, then creation and deletion of the following
objects is controlled by user:
• Form
• ManagedForm
• FixedStructure
• FixedMap
• StructureFormData
• CollectionFormData
• StructureWithCollectionFormData
• CollectionItemFormData
• TreeFormData
• TreeItemCollectionFormData
• TreeItemFormData
• AccountingRegisterManager
• AccountingRegisterRecordSet
• ChartOfAccountsManager
• ChartOfAccountsObject
• ExchangePlanManager
• ExchangePlanObject
• SettingsStorageManager
• AccumulationRegisterManager
• AccumulationRegisterRecordSet
• ChartOfCharacteristicTypesManager
• ChartOfCharacteristicTypesObject
• ConstantManager
• DocumentManager
• DocumentObject
• EnumerationManager
• ExternalDataProcessor
• ExternalReport
• InformationRegisterManager
• InformationRegisterRecordSet
• DataProcessorManager
• DataProcessor
• CatalogManager
• CatalogObject
• ReportManager,
• Report
• SequenceRecordSet
• BusinessProcessManager
• BusinessProcessObject
• TaskManager
• TaskObject
• ChartOfCalculationTypesManager
• ChartOfCalculationTypesObject
• CalculationRegisterManager
• CalculationRegisterRecordSet
• RecalculationRecordSet
• COMSafeArray
• KeyAndValue
• Array
• FixedArray
• Map
• Structure
• ValueListItem
• ValueList
• ValueTable
• ValueTableRow
• ValueTree
• ValueTreeRow
Leaks are tracked between the start and end checkpoints in the code. The
start checkpoint clears leak data for a current user. At the end checkpoint,
the LEAKS event is generated and written to the technological log in which
for each unreleased object instance the stack of the embedded 1C:Enterprise
language will be indicated at the time of its creation.
The following can be used as checkpoints:
• The beginning and end of the execution of 1C:Enterprise language
commands on the client or server
• Calling a procedure or function of the 1C:Enterprise language and re-
turning from the procedure or function
• Starting execution of one line of 1C:Enterprise language and finishing
execution of another line of 1C:Enterprise language
The starting and ending checkpoint is defined by the item <point>. In this
case, the embedding of checkpoints into each other is allowed but being
ignored-; a counting of leaks is carried out only on the external checkpoints.
For example, if during the execution of the configuration code the check-
points of Starting1, Starting2, Ending1, Ending2 were passed, then the
leaks will be tracked between the points Starting1 and Ending2.
The item <point> can have one of the following formats:
<point call=«client»/>, <point call=«server»/>
Defines checkpoint at the beginning/end of the execution of the embedded
1C:Enterprise language on client or on server, i.e .: The starting point will
be set at the beginning of the embedded 1C:Enterprise language execution
on server/client; the ending point - at the end of the embedded
1C:Enterprise language execution on server/client.
<proc="<ModuleName>/<MethodName>"/>
Defines checkpoints when calling and returning a specific embedded
1C:Enterprise language method. <ModuleName> -contains the full name
of the metadata object to which the module belongs (without a configura-
tion name). In the same format, the debugger shows the module names.
<MethodName> contains the name of method. If the <MethodName>
argument is not set, then the checkpoints will be defined at the begin-
ning/ending of the module body execution. Examples of module names:
• SessionModule.Module - session module
• ApplicationModule.Module- application module
• ManagedApplicationModule.Module - Module of managed
application
• ExternalConnectionModule.Module - Module of external
connection
• CommonModule.Global.Module - Common module Global
• Catalog.Contractors.ObjectModule - Module of Counter-
parties catalog item
• Processing.Processing1.Form. Form1.Form -Form
module Form1 of processing Processing1 ;
• Processing.Processing2.Form. MainForm.Form -
module form . Processing Mainform . Processing2.
<point on="<ModuleName>/<LineNumber>" Off="<ModuleN
ame>/<LineNumber>"/>
Defines the starting and ending checkpoints by explicitly specifying the
lines of code. The starting checkpoint corresponds to the beginning of exe-
cution of code for the string specified in the attribute On. The ending
checkpoint corresponds to the end of the execution of code for the string
specified in the attribute Off. Line numbering starts with 1. If the starting
checkpoint is reached on server, then the ending checkpoint must be
reached on server, as well. The ending checkpoint cannot be the last string
of the procedure code, function or module body.
An example of item <leaks>:
<leaks collect="1">
<point call="client"/>
<point call="server"/>
<point proc="ApplicationModule/"/>
<point
proc="CommonModule.ConnectionProcessing.Module/AtServerNoLeaks"/>
<point on="CommonModule.Services.Module/9"
off="CommonModule.Services.Module/11"/>
</leaks>
In this case, leak data collection is enabled. The checkpoints are set:
• At the beginning and at the end of execution of 1C:Enterprise lan-
guage on client
• At the beginning and at the end of execution of 1C:Enterprise lan-
guage on server
• At the beginning and at the end of execution of the application module
body
• When calling and returning method AtServerNoLeaks() from the
common module ConnectionProcessing
• On lines 9 and 11 of the common module Services
Suppose a procedure with the following text causes a memory leak:
Procedure AtServerWithLeak() Export
M=NewArray;
M.Add(NewArray);
M[0].Add (NewArray);
M[0][0].Add(M);
EndProcedure
To detect it, leak tracing in the technological log can be enabled using the
following settings:
<config xmlns="http://v8.1c.ru/v8/tech-log">
<log location="C:\ProgramFiles\1cv8\logs" history="24">
<event>
<eq property="name" value="call"/>
</event>
<event>
<eq property="name" value="leaks"/>
</event>
<property name="all">
</property>
</log>
<leaks collect="1">
<point call="server"/>
</leaks>
</config>
59:49.4581-
2700,CALL,5,process=rphost,p:processName=t76346,t:clientID=430,t:ap
plicationName=JobScheduler,Func=Execute,Module=CommonModule2,Meth=S
cheduledTaskNoLeak
59:48.4769-0,LEAKS,5,process=rphost,Descr='
Array:
CommonModule.CommonModule2:2:AtServerWithLeaks();
CommonModule.CommonModule1:4:M[0].Add(NewArray);
Array:
CommonModule.CommonModule2:2:AtServerWithLeaks();
CommonModule.CommonModule1:2:M=NewArray;
Array:
CommonModule.CommonModule2:2:AtServerWithLeaks();
CommonModule.CommonModule1:3:M.Add(NewArray);
3.21.2.7. <mem>
If the item <mem> is present, 1C:Enterprise server processes monitor:
• Number of allocated and not released fragments of memory
• Total size of allocated and not released memory fragments
If between the moments when the server process was not performing either
any calls and any routine task, the number of allocated but not released
memory fragments increased, then a MEM event is generated with the fol-
lowing properties:
• sz - A total number of memory fragments allocated but not released
by process;
• szd - its modification since the previous output of the MEM event;
• cn - An overall number of the memory fragments, allocated but not
released by process;
• cnd - its modification since the previous output of the MEM event.
A duration of the MEM event is equal to the period between the last and pe-
nultimate moments when the server process was not performing any calls
and any routine tasks. It was during this time that the number of memory
fragments used by process increased.
IMPORTANT! Specifying the item <mem> in the configuration file of the
technology log does somewhat reduce performance of 1C:Enterprise, espe-
cially when several users work concurrently.
For example, with the following configuration, a volume of distributed
memory is not collected and the MEM events are not being output:
<config xmlns="http://v8.1c.ru/v8/tech-log">
<log location="C:\ProgramFiles\1cv8\logs" history="24">
<event>
<eq property="name" value="mem"/>
</event>
<property name="all"/>
</log>
</config>
3.21.2.8. <ftextupd>
The <ftextupd> item includes generation of the extended information
about the process of updating the full-text search indexes (the event
FTETXUpd). If the item is not in file, then the extended information is not
included in the technological log.
The item attributes:
logfiles
A presence of extended information in the FTEXTUpdevent:
• 0 (false) - do not include
• 1 (true) - include
3.21.2.9. <query>
The <query> item controls placing information to the technological log
about fields that contain NULL when executing a request to an external data
source but for which such a value is not allowed (the QERR event). The en-
abling of such tracking can significantly reduce the execution of requests.
The item attributes:
checkActualNullable:
Manages a collection of information:
• 1 (true) - a field information will be collected.
• 0 (false) or the item query is missing in the file-no field infor-
mation is collected.
3.21.2.10. <plansql>
<?xml version="1.0"?>
<config xmlns="http://v8.1c.ru/v8/tech-log">
<log location="c:\log" history="2
<event>
<eq property="name" value="dbmssql"/>
</event>
<property name="sql"/>
<property name="plansqltext"/>
</log>
<plansql />
</config>
In this description:
• WITHOUT DUPLICATES -indicates that data without duplicates
needs to be retrieved.
• GROUPING - indicates that a grouping of a result needs to be per-
formed.
• SORTING - indicates that sorting of a result needs to be performed.
• CUTTING TOP - indicates that after sorting a part of records will be
retrieved only.
<Conditions>
WHERE [(POST) | (END)] <Condition> [AND <Condition> […]]
In this description:
• (POST) - indicates that conditions are checked after a connection is
made.
• (END) - indicates that conditions are checked after the joins between
all the tables are completed.
<Fields of a selection list>
Fields: (<Expression from selection list> [, <Expression from
selection list>])
<Scan description>
{{NOT SCAN} | {FULL SCAN} | {DISTINCT SCAN} | {RANGE SCAN}} [UNTIL
FIRST NOT NULL] [USING [REVERSE] INDEX (<Index name>) [(<Number of
index fields used> fields)]]
In this description:
• NOT SCAN - indicates that the contents of the table will not be
scanned.
• FULL SCAN - indicates that the contents of the table will be scanned
completely.
• DISTINCT SCAN - means that different index values will be by-
passed.
• RANGE SCAN - indicates that a section of the table will be scanned
by index.
• UNTIL FIRST NOT NULL - indicates that records will be scanned
until the first record with a value not NULL is received .
• USING INDEX - indicates that an index will be used for bypassing.
• REVERSE -indicates that an index will be used in reverse order.
<Source description>
{<Table name> [(TWICE)] <Scan description>} |
{NESTED SELECT <Scan description> (<Query plan>)}
<Conditions>
<Relation description>
{{ NESTED [OUTER] LOOP <Table name> [(TWICE)] <Scan description>} |
{ NESTED [OUTER] LOOP BY SELECT <Scan description> (<Query plan>)}}
<Conditions> [<Conditions>]
In this description:
• (TWICE) - indicates that the table is used in query several times.
• NESTED LOOP - indicates that for each table entry on the left, a loop
will be performed to bypass the table entries on the right.
• OUTER - indicates that if a record in the right table suitable by the
linking condition is not found, the entire record will not be lost.
3.21.2.11. <defaultlog>
The item <defaultlog> defines the default technological log settings.
This log has a fixed event filter defined by 1C:Enterprise. This filter cannot
be changed and can be represented by the following configuration file:
<log location="C:\Users\<UserName>\AppData\Local\1C\1cv8\logs"
history="24" >
<event>
<eq property="name" value="system"/>
<eq property="level" value="error"/>
</event>
<property name="all"/>
</log>
This log records events that are critical for system operability. Composition
of the events is not documented. Event generation is configured using the
item <system>.
The item attributes:
location
The name of the directory in which the default technological log will be
placed. If the attribute is not specified, then the default technological log is
saved to the following directories:
• Windows OS:
Windows XP: %USERPROFILE%\Local Settings\1C\1cv8\logs
Windows Vista (and later versions):
%LOCALAPPDATA%\1C\1cv8\logs
• Linux: ~/.1cv8/logs.
IMPORTANT! It must be taken into consideration that the directory of
technological log is not intended to store the files that do not belong to the
technological log. Do not keep dumps in this directory, and do not keep
1C:Enterprise technological log in a directory with any unrelated files. If
any unrelated files are found in the technological log directory, the directory
is considered invalid and the log is not created.
NOTE. Different directories must be specified in the location attributes
of the <log>, <dump> and <defaultlog> items.
history
A number of hours at which information stored the technology log will be
removed. If a value of this attribute is set to 0 -, then the technology logging
will be disabled by default.
Default value: 24.
Unlike the technological log files, the default technological log files are
generated only when the corresponding event occurs.
3.21.2.12. <system>
The item <system> manages generation of the SYSTEM events in the
technological log. The technology log configuration file (logcfg.xml) may
not contain such an item and may also contain one or more such items.
If the item <system> is not in the file logcfg.xml , then the default tech-
nology log is configured as follows: -a level of generation of the system
events for all system components is defined as Error.
The events SYSTEM will be simultaneously placed in all configured tech-
nology logs (including the default technology log).
The item attributes:
level
Sets the minimum level value for system-generated events. Possible values
(in order of increasing importance):
• Trace - The most detailed level.
• Debug - A level of debug information. Intended for the events that
are necessary to debug platform mechanisms or to investigate the most
difficult problems to be identified.
• Info - A level of information. Intended for the events indicating
normal functioning of a one or another platform mechanism.
• Warning - A level of warnings. Intended for the events informing
about the occurrence of abnormal, but not critical (in terms of mecha-
nism of a platform) situations.
• Error - A level of errors. Designed for the events informing about
the occurrence of erroneous (in terms of mechanism of a platform)
situations.
• None - Disabling of fixation of the system events.
Setting this attribute will result in the “1C: Enterprise” system not generat-
ing the events not corresponding to the specified level.
So, if logcfg.xml contains fragment <system level = "info" />,
1C:Enterprise will register events with the Info, Warning and Error
levels.
component
Specifies the name of the component for which generation of system events
is configured. The component name is case-sensitive.
class
Specifies the name of the class for which generation of system events is
configured. The class name is case-sensitive.
As an example, let's consider the situation where the logcfg.xml file con-
tains the following fragment:
<system level="info"/>
<system level="debug" class="core::FileSystem" />
<system level="warning" component="core82" />
This means:
• SYSTEM events with the Info level (and above) are generated for all
system objects.
• However, for the core::FileSystem class, events with Debug
level are generated.
• For all classes of the core82 component, events with Warning lev-
el and higher are generated.
3.21.2.13. <dbmslocks>
The item <dbmslocks> enabled collection of information about database
locks in the technological log. If the item is not in the file, information
about database locks is not added to the technological log.
Information on database locks is displayed in the technological log using
special properties.
3.21.2.14. <scriptcircrefs>
The item <scriptcircrefs> enables collection of information about
circular references in the technological log. If the item is not in the file, in-
formation about circular references is not added to the technological log.
<?xml version="1.0"?>
<config xmlns="http://v8.1c.ru/v8/tech-log">
<log location="D:\V82\logs" history="96">
<event>
<eq property="name" value="SCRIPTCIRCREFS"/>
</event>
<event>
<eq property="name" value="excp"/>
</event>
<property name="all"/>
</log>
<scriptcircrefs/>
</config>
The memory used by such data cannot be released by the system upon work
completion, for example, a form that contains such a program code in the
built-in language. As a result, each opening of a form containing such code
leads to the application session process taking up more RAM and not releas-
ing it after use. Finally, the application is either terminated abnormally or
starts using excessive RAM. The increased RAM usage by an application
could, among others, lead to the general computer slowdown, up to the ina-
bility to open external data processors after the changes have been made,
etc.
Obviously, the circular references need to be eliminated. In order to locate
errors in configurations that lead to circular references, several tools are
available:
1. Modifying a configuration file of the technological log
2. using the command line to start a client or server application;
3. Using a parameter of the conf.cfg file
4. Using a 1C:Enterprise language method
IMPORTANT! Using any of these tools leads to a significant drop in
1C:Enterprise performance. The circular reference detection tools should
not be used during normal 1C:Enterprise operation. Use these tools only
when a targeted search for circular references is required in order to correct
the corresponding fragments of an application.
Depending on the selected mode, a behavior of the system upon detecting
circular references will be different:
• When using the technological log , - the SCRIPTCIRCREFS events
will be placed in there. Herewith, execution of an application solution
will not be interrupted.
• Using the other tools - would result in interruption of the operation of
an application solution, which would trigger a corresponding message.
It would be impossible to continue work after such message is issued.
The circular references are checked in the following cases:
• When completing a 1C:Enterprise language method: All local varia-
bles and parameters of a method are analyzed
• When setting a session parameter: A value set as a value of session
parameter is analyzed
• When calling a special method of 1C:Enterprise language.
In order to include information about circular references in the technologi-
cal log, it is necessary to specify the <scriptcircrefs> element in the
technological log configuration file logcfg.xml. In this case, 1C:Enterprise
will start analyzing circular references. Whether the SCRIPTCIRCREFS
events are written to the technological log depends on other settings of the
technological log.
If the parameter EnableCheckScriptCircularRefs of the startup
command has been used at starting a thin or thick client application, that
means that the system will search for circular references in the client code
of an application solution. This parameter also gets into into the command
line at launching the client application if the check box Check of circular
references of the embedded 1C:Enterprise language is checked in the
Designer settings (Main menu - Service -Parameters- Launch of the
1C: Enterprise -Addditional).
In order to enable search for circular references on the server side of the 1C:
Enterprise system, it is necessary to start server with the /
enableCheckScriptCircularRefs parameter. In this case, a search
for circular references will be performed in all sessions serviced by server
that has been launched with the referenced parameter.
If the EnableCheckScriptCircularRefs parameter of the file conf.cfg is
set to true, this means that a search for circular references while executing
the code in the embedded 1C:Enterprise language will be performed by all
instances of the 1C: Enterprise system that use the conf.cfg file with the
referenced parameter.
It is possible to initiate a search for circular references using the global con-
text method CheckCircularReferencesOf1CLanguage(). When
this method is called either the variable specified as a parameter of a meth-
od or all local variables available at the time the method is executed are
checked.
See also:
• <scriptcircrefs>.
• File conf.cfg.
• General startup commands.
3.22. logui.txt
The logui.txt file contains a list of interactive user actions that were per-
formed during logging.
File location:
• On Windows:
%APPDATA%\1C\1cv8\<Infobase UUID>.
• On Linux:
~/.1cv8/1C/1cv8/<Unique infobase ID>.
• On macOS:
~/.1cv8/1C/1cv8/<Unique infobase ID>.
One file entry contains a description of a single user action. An overall for-
mat of a string is, as follows:
• Date and time of an event;
• Description of an event (Event);
• The name of an object with which an event occurred;
• Time (in milliseconds) from the start of a program (t);
• Prefixes beg or end (similar to the opening and closing parenthesis)
identifying a beginning and end of an event;
• Adding more specifics (Detail).
In order to collect statistics on the duration of actions taken, a beginning and
end of the action are recorded in the protocol. A beginning of the action is
contained in the record marked as beg; an end of the action - is marked in
the record as end (these evidences are displayed at the very end of the log
line).
Also, the duration of the action marked as t is recorded. Time count (in mil-
liseconds) starts at the moment of the application startup.
Between the log lines containing beg and end, there can be located both
nested actions containing beg and end and the lines reflecting any actions
to be recorded in the log.
Logging is performed for all items of the form and items of the global
command interface available in 1C: Enterprise mode.
The following actions are logged:
• Pressing a key on the keyboard. Data entered by user is replaced with
asterisks in the protocol (Event Key_<key> or Event key_*).
• Clicking the left (Event_LClick), right (Event_RClick), and middle
mouse buttons (Event_MBtnDn).
• Double clicking the left mouse button (Event_ LBtnDbl).
• Scrolling the mouse wheel (Event_Wheel).
Unique events are used for some items:
• Form:
Activation of the form window:
"Event FormActivate","Name <form name>"
Moving:
"Event MoveWindow offset=<dx,dy> pos=<x,y,w,h>"
Clicking on hyperlink:
"Event LClick","Name NotificationWindow","Detail Hyperlink"
Moving:
"Event MoveWindow offset=<dx,dy> pos=<x,y,w,h>"
Click Close:
"Event LClick","Name CheckWindow","Detail CloseButton"
3.23. nethasp.ini
3.23.1. General description
To configure the parameters of the interaction of the “1C: Enterprise” sys-
tem with the HASP License Manager, the configuration file nethasp.ini is
used.
The file is located in the directory with the 1C:Enterprise configuration
files. It is optional. If this file is not in the directories of configuration files,
then it is searched in the following directories:
• On Windows OS:
Directory with the executable files representing the running ver-
sion of 1C: Enterprise
Current directory
Directory%SYSTEMROOT%\Windows\System32 (for the 32-bit
OS Windows) or%SYSTEMROOT%\Windows\SysWOW64 (for
the 64-bit OS Windows)
Directory%SYSTEMROOT%\Windows\System
Directory %SYSTEMROOT%\Windows
Directories listed in the environment variable PATH
• On Linux:
Current directory
User home directory
Directory/etc
• On macOS:
Current directory
User home directory
Directory/etc
The nethasp.ini file contains four sections:
• [NH_COMMON] - For general settings;
• [NH_IPX] - For IPX protocol;
• [NH_NETBIOS] - For NetBIOS protocol;
• [NH_TCPIP] - For TCP/IP protocol.
The [NH_COMMON] section contains global settings for all sections of the
configuration file. All other sections contain settings affecting the perfor-
mance of operations with a specific protocol.
In each section, the parameters specific to this section or overall to all sec-
tions can be used. Specifying a parameter overall to all sections in a section
for one of the three protocols has a higher priority than setting in the
[NH_COMMON] section (relative to this protocol).
To define additional settings for a specific protocol, the parameters specific
to a particular section should be used.
Configuration files may contain comments. A comment begins with a “;”
(semicolon) and continues to the end of the line.
A case of letters in parameter names does not matter.
Below is a list of parameters and their valid values which may be given in
various sections of the nethasp.ini file.
When installing 1C:Enterprise, a sample of the nethasp.ini file is copied to
the conf subdirectory of the 1C:Enterprise installation directory. This file is
almost entirely composed of commented lines and does not override the
default settings in any way but it contains at the same time the most com-
plete list of parameters that can be used to configure the interaction of the
1C:Enterprise system with the HASP License Manager.
The parameters of each section of the configuration file are described in
detail below.
NH_USE_BROADCAST
Values: Enabled, Disabled. Use the UDP broadcast mechanism.
Default value: Enabled.
NH_SESSION
Values: <Number>. Sets the interval (in seconds) during which the pro-
gram tries to establish a connection with the HASP License Manager.
Default value: 2 seconds.
NH_SEND_RCV
Values: <Number>. Sets the maximum time of receiving or sending a
package for the HASP License Manager.
Default value: 1 second.
3.24. nhsrv.ini
Some HASP License Manager settings can be configured using the
nhsrv.ini configuration file.
File location:
• On Windows OS: This file is searched for in various directories in the
following sequence:
Directory where the HASP License Manager executable file is lo-
cated
A current Windows directory;
The Microsoft Windows system catalog (%SYSTEMROOT%\
system32- for the 32-bit version and %SYSTEMROOT%\ sys-
tem - for the 64-bit version);
A Microsoft Windows directory (%SYSTEMROOT% directory);
The directories listed in the PATH environment variable (only
when installing the HASP License Manager as a Microsoft Win-
dows application).
In the OS Windows, it is recommended to place the nhsrv.ini file,
if necessary, in the directory where the HASP License Manager
executable file is located. Verifying that the HASP License Man-
ager found and read the configuration file is possible using the log
Activity Log/Server Activity Log.
• On Linux: Location of the nhsrv.ini configuration file should be spec-
ified using the -c parameter. The default configuration file location is
undefined.
The HASP License Manager is configured using the settings of various pa-
rameters in the [NHS_SERVER] section of the nhsrv.ini file:
NHS_IP_LIMIT
Values: <ipAddr>, <ipAddr>,...
Defines the range of network stations served by the HASP License Manag-
er. Example: 10.1.1.1, 10.1.1.*,10.1.1.1/32, 10.1.1.1/24.
NHS_ADAPTER
Values: <ipAddrSubMask>,<ipAddrSubMask>,...
Specifies the IP address of one or more network cards to be served by the
HASP License Manager. It is used when using the HASP License Manager
with Win32. Example: 10.1.1.111, 255.255.0.0.
NHS_USERLIST
Maximum number of users simultaneously connected to the HASP License
Manager. Default value: 250.
3.25. rescntsrv.lst
The file is located in the data directory of each working server marked as
central server.
The file contains the values of the resource consumption counters defined
by the counter settings. The values in this file are updated every 20 seconds.
Used to restore counter values after restarting the server cluster.
3.26. ring-commands.cfg
This file contains the register of module instances registered for use with the
ring utility. The file is a text file encoded in UTF_8 (without BOM), the file
format is -YAML.
File location:
• On Windows OS:
%ALLUSERSPROFILE%\Application Data\1C\1CE
(%ALLUSERSPROFILE%\1C\1CE for Windows Vista and higher).
• On Linux: /etc/1C/1CE.
The file looks like this:
license:
-
file: C:\Program Files\1C\1CE\license-
tools\lib\com._1c.license.activator.ring-0.1.0-12.jar
arch: x86_64
version: 0.1.0
In this file:
• license - The module name. In the ring utility, this name precisely is
used as the <module> parameter.
• – - a sign of the beginning of description of the module.
• the file - parameter contains the full name of the file with module.
• Thearch - parameter describes the architecture of the used module.
• The version - parameter describes a version of the module being used.
3.27. srv1cv83
IMPORTANT! This configuration file is used only when launching the
“1C: Enterprise” server in the Linux operating system.
The configuration file /etc/ sysconfig / srv1cv83 (for the RPM system) is
used to set the startup parameters of the 1C: Enterprise server agent using
the /etc/init.d/srv1cv83 script. If the installation was performed for a DEB
system, then the following parameters should be edited in the
/etc/init.d/srv1cv83 file.
The following parameters can be configured using this configuration file:
SRV1CV8_KEYTAB
A path to the Kerberos private key file.
SRV1CV8_DATA
A directory in which the server cluster service files will be located (includ-
ing a list of clusters and a list of the cluster infobases).
SRV1CV8_PORT
The main port number of the cluster agent. This port is used by the cluster
agent to access a central server. The cluster agent port is also specified as
the network port of the working server.
SRV1CV8_REGPORT
The network port number of the cluster created by default when the initial
launching of the ragent.
SRV1CV8_RANGE
Network port ranges for dynamic selection. The service ports of the cluster
processes are selected from them if it is impossible to select them from the
settings of the corresponding working server.
SRV1CV8_DEBUG
Launch in debugging mode:
• 0 -without a debug mode (by default);
• 1 - in debug mode
A debugging is possible only via TCP/IP protocol. Debugging over HTTP is
not supported in this startup mode.
SRV1CV8_SECLEV
The connection security level;
• 0 - Turned off (by default);
• 1 - Setting a connection;
• 2 - Constantly.
SRV1CV8_PINGPERIOD
A period of time (in milliseconds) during which a verification of the inter-
ruption tracking system is taking place.
Default value: 1 000.
SRV1CV8_PINGTIMEOUT
A timeout (in milliseconds) of verification of the interruption monitoring
tracking system.
Default value: 5 000.
3.28. swpuser.ini
The swpuser.ini file is designed to override the users on whose behalf
working processes and the cluster manager will be executed. By default,
working process and cluster manager run on behalf of the same user as the
server agent. For more details about structure of a server cluster.
The swpuser.ini file is located in the directory of the registry of a cluster
with which a server agent works with; it has the following format:
user=<user name for rphost>
password=<user password for rphost>
[rmngr_user=<user name for rmngr>
[rmngr_pass=<user password for rmngr>]]
[registry=<cluster registry directory>]
[<port>:
[user=<user name for rphost>
[password=<user password for rphost>]]
[rmngr_user=<user name for rmngr>
[rmngr_pass=<user password for rmngr>]]
[registry=<cluster registry directory>]]
As a result:
• For a cluster with the 1541 cluster manager port, the cluster registry
directory d:\cluser\one and the users srv_1c_rphost_1541 and
srv_1c_rmngr_1541 will be used for working process and a cluster
manager, respectively. The user srv_1c_rmngr_1541 should have
full access to the d:\cluser\one directory; the actual directory with
the cluster registry data will be d:\cluser\one\reg_1541.
• A cluster with the cluster manager port 1641 (and all clusters that can
be added in future if the swpuser.ini file is not changed) will use the
subdirectories of the directory d:\cluser\common to store their clus-
ter registries and the srv_1c_rphost and the srv_1c_rmngr users to
enable the working processes and cluster managers (respectively) to
operate. The actual directories with the cluster registries will be the di-
rectories d:\cluser\common\reg_1641 and so on.
When you modify the name of a user running a server agent (ragent), make
sure that the following requirements and recommendations are complied
with:
• Windows OS:
A user has to be a member of a group of administrators.
A user shall be assigned the following rights:
Right (Adjust memory quotas for a process).
Right (Replace a process level token).
Belonging to a group of administrators does not guarantee
availability of the above rights.
• Linux:
A user running a server agent has to be a superuser (root).
When you start other server cluster processes, pass and
rmngr_pass parameters of a configuration file will be ignored.
When you change a user running a server agent (ragent), users running
cluster managers (rmngr) and working processes (rphost) need to be ex-
pressly specified. Otherwise, all server cluster processes will be executed on
behalf of a system administrator, and this is a highly risky scenario.
The remaining rights that need to be assigned to users running server cluster
processes.
For the users on whose behalf working processes and cluster managers will
be started, the operating system profiles should be created. To create a pro-
file, it is enough to allow user the interactive input so that it is executed
once. After that, a profile will be created and the interactive entrance can be
disabled. The users on whose behalf working processes and cluster manag-
ers are launched, a full access should be given to the following directories:
• On Windows OS: %ALLUSERSPROFILE%\1C\1cv8
• On Linux: /var/1C
If it is necessary to specify the user name with domain, the user name must
be as follows: \\domain-name\user-name.
3.29. testcfg.xml
The testcfg.xml file is designed to configure the range of ports used in au-
tomated testing of the application solutions running in the web client.
The file is located in the configuration files directory of the 1C:Enterprise
instance used as a testing client. The file is optional.
If the file is not found, ports from the standard range (1538–1539) are used
for communication.
Example:
<config xmlns="http://v8.1c.ru/v8/testcfg">
<testports range="1538:1539"/>
</config>
Namespace: http://v8.1c.ru/8.3/config/objects.
3.30.2. <Objects>
The root element of the file. This element can contain no more than one
item<Configuration> and one or several items <Object>.
The item may contain the following attributes:
version mandatory
Version of the file list.
Type: String.
Only version 1.0 is supported. For any other version, error Version x.x of
the object file list is not supported by this version of the platform will
be generated.
3.30.3. <Configuration>
Describes the root configuration object. No more than one item is allowed.
The item may contain the following attributes:
includeChildObjects mandatory
Use subordinate (to any degree) objects of the root configuration item in the
operation.
Type: Boolean.
3.30.4. <Object>
Describes one configuration object (possibly together with the subordinate
objects) involved in the operation. Any number of items is allowed. No
more than one item<Subsystem> can be subordinated to the item.
The item may contain the following attributes:
fullName
Full name of the object in the first configuration.
It is used only when configuring the configuration comparisons and when
working with the configuration repository. When configuring the configura-
tion comparisons, a fullName or a
fullNameInSecondConfiguration attributes must be specified. An
attribute is required when working with the configuration repository.
Type: String.
fullNameInSecondConfiguration
Full name of the object in the second configuration.
Used only when configuring the configuration comparison. When configur-
ing the configuration comparisons, a fullName or a
fullNameInSecondConfiguration attributes must be specified.
Type: String.
includeChildObjects mandatory
Use subordinate (to any degree) objects of the configuration object specified
in the fullName attribute in the operation.
The subordinate objects of a subsystem include the subordinate subsystems
and not the objects in the subsystem. To include the objects in the subsys-
tem, use the nested<Subsystem> tag.
Type: Boolean.
3.30.4.1. <Subsystem>
Indicates whether to use the objects that are part of the subsystem selected
by the parent item <Object>. This item is applicable only for the items
<Object> that describe the object of the subsystem. No more than one
item is allowed.
The item may contain the following attributes:
includeObjectsFromSubordinateSubsystems mandatory
If this attribute is specified, all objects (along with the subordinate objects)
included in the subsystem described by the parent item will be added to the
list of the objects being processed.
Type: Boolean.
configuration optional
Indicates a configuration used as a source of the subsystem content when
configuring a configuration comparison.
Type: String.
Values:
• Main - to be taken from the main configuration. Used by default.
• Second - to be taken from the second configuration.
3.30.5. Examples
Use all the configuration objects.
<Objects xmlns="http://v8.1c.ru/8.3/config/objects" version="1.0">
<Configuration includeChildObjects = "true"/>
</Objects>
To use the root configuration object with no subordinate objects and the
subsystem GoodsAccounting with the subordinate subsystems and the
objects included in the subsystem GoodsAccounting and the subordi-
nate subsystems.
<Objects xmlns="http://v8.1c.ru/8.3/config/objects" version="1.0">
<Configuration includeChildObjects = "false"/>
<Object fullName = "Subsystem.GoodsAccounting"
includeChildObjects= "true">
<Subsystem includeObjectsFromSubordinateSubsystems = "true"/>
</Object>
</Objects>
3.31.2.2. <MainConfiguration>
The element describes the main configuration options.
This item is optional.
<Name> mandatory
Name of the main configuration.
Type: String.
<Version> optional
Version of the main configuration.
Type: String.
The item <Vendor> optional
Name of supplier.
Type: String.
3.31.2.3. <SecondConfiguration>
Description of the second configuration involved in merge.
This item is optional.
Content of this item is similar to content of the item
<MainConfiguration>.
3.31.2.4. <OldVendorConfiguration>
Description of the configuration of a supplier participating in merge.
This item is optional.
Content of this item is similar to content of the item
<MainConfiguration>.
3.31.2.5. <SupportRules>
3.31.2.5.2. <NewObjects>
This element specifies the support rules for new objects of a supplier.
<ChangesAllowedRule> optional
Specifies support rules for the supplier objects with delivery rule Changes
are allowed. The item can take the following values:
• ObjectNotEditable - Support rule Supplier object is not ed-
itable.
• ObjectIsEditableSupportEnabled - Support rule Supplier
object is editable with support saved.
• ObjectNotSupported -Support rule Supplier object is re-
moved from support .
Default value: ObjectNotEditable.
<ChangesNotRecommendedRule> optional
Specifies support rules for supplier objects with delivery rule Changes are
not recommended. The item can take the following values:
• ObjectNotEditable - Support rule Supplier object is not ed-
itable.
• ObjectIsEditableSupportEnabled - Support rule Supplier
object is editable with support saved.
• ObjectNotSupported -Support rule Supplier object is re-
moved from support .
Default value: ObjectNotEditable.
3.31.2.5.3. <DuplicateObjectsAndModifiedObje
ctsWithGetFromSecondConfiguratio
nRule>
Specifies support rules for identical objects or objects with merge mode Get
from second configuration.
<ChangesAllowedRule> optional
Specifies support rules for the supplier objects with delivery rule Changes
are allowed. The item can take the following values:
• KeepCurrentRule - maintains the current support rule (only to
update configuration that is being supported).
• ObjectNotEditable - Support rule Supplier object is not ed-
itable.
• ObjectIsEditableSupportEnabled - Support rule Supplier
object is editable with support saved.
• ObjectNotSupported -Support rule Supplier object is re-
moved from support .
Default value:
• When enabling support: ObjectNotEditable.
• When updating on support: KeepCurrentRule.
<ChangesNotRecommendedRule> optional
Specifies support rules for supplier objects with delivery rule Changes are
not recommended. The item can take the following values:
• KeepCurrentRule - maintains the current support rule (only to
update configuration that is being supported).
• ObjectNotEditable - Support rule Supplier object is not ed-
itable.
• ObjectIsEditableSupportEnabled - Support rule Supplier
object is editable with support saved.
• ObjectNotSupported -Support rule Supplier object is re-
moved from support .
Default value:
• When enabling support: ObjectNotEditable.
• When updating on support: KeepCurrentRule.
3.31.2.5.4. <ModifiedObjectsWithoutGetFromS
econdConfigurationRule>
This item specifies the rules of support for modified objects with a merge
mode other than Take from the second configuration.
<ChangesAllowedRule> optional
Specifies support rules for the supplier objects with delivery rule Changes
are allowed. The item can take the following values:
• KeepCurrentRule - maintains the current support rule (only to
update configuration that is being supported).
• ObjectNotEditable - Support rule Supplier object is not ed-
itable.
• ObjectIsEditableSupportEnabled - Support rule Supplier
object is editable with support saved.
• ObjectNotSupported -Support rule Supplier object is re-
moved from support .
Default value:
• When enabling support: ObjectIsEditableSupportEnabled.
• When updating on support: KeepCurrentRule.
<ChangesNotRecommendedRule> optional
Specifies support rules for supplier objects with delivery rule Changes are
not recommended. The item can take the following values:
• KeepCurrentRule - maintains the current support rule (only to
update configuration that is being supported).
• ObjectNotEditable - Support rule Supplier object is not ed-
itable.
• ObjectIsEditableSupportEnabled - Support rule Supplier
object is editable with support saved.
• ObjectNotSupported -Support rule Supplier object is re-
moved from support .
Default value:
• When enabling support: ObjectIsEditableSupportEnabled.
• When updating on support: KeepCurrentRule.
3.31.2.6. <Parameters>
<ConfigurationsRelation> optional
The item indicates the relationship between the main and the second con-
figurations. The item can take the following values:
• ConfigurationsNotRelated - The main configuration is not
related to the second;
• SecondConfigurationIsDescendantOfMainConfigurat
ion - Second configuration is a descendant of the main one;
• MainConfigurationIsDescendantOfSecondConfigurat
ion - Main configuration is a descendant of the second configuration.
Default value: ConfigurationsNotRelated.
<AllowMainConfigurationObjectDeletion> optional
The item indicates whether objects of the main configuration can be deleted.
Type: Boolean.
Default value: False.
<CopyObjectsMode> optional
The item indicates a copy mode for the objects of a configuration being
loaded. In this case, the internal object IDs are not saved.
Type: Boolean.
Default value: False.
3.31.2.6.2. <ComparisonLanguages>
Indicates that the selective language comparison is used. The language
codes used for comparison are described by the items Language.
3.31.2.7. <Conformities>
This item contains a list of objects whose conformity is established manual-
ly.
This item is optional.
The item's content is as follows:
<Conformities>
<Conformity/>
</Conformities>
<Conformity>
This item describes a pair of the matched objects.
This item contains the following attributes:
fullName mandatory
A full name of the main configuration object.
Type: String.
fullNameInSecondConfiguration mandatory
A full name of the second configuration object.
Type: String.
3.31.2.8. <Objects>
3.31.2.8.2. <Configuration>
Describes the configuration settings for the root configuration element. The
item must include at least one of the elements <MergeRule>,
<MergeRuleForPropertiesChangedTwice>,
<MergeRuleForPropertiesChangedOnce>, <ObjectOrder>,
<Properties>.
<MergeRule> optional
Describes the merge mode for a root element.
<MergeRuleForPropertiesChangedTwice> optional
Describes the merge mode for twice-changed root element properties.
<MergeRuleForPropertiesChangedOnce> optional
Describes the merge mode for a property of the root configuration item
changed in one configuration only.
<ObjectOrder> optional
Describes the order of subordinate objects.
<Properties> optional
Merge settings for properties of the root configuration object.
3.31.2.8.3. <Object>
Describes the merge settings for a specific configuration object.
This item contains the following attributes:
fullName optional
Full name of the object in the first configuration.
When configuring a configuration merge, either the attribute fullName or
the attributefullNameInSecondConfiguration must be specified.
Type: String.
fullNameInSecondConfiguration
Full name of the object in the second configuration.
When configuring a configuration merge, either the attribute fullName or
the attributefullNameInSecondConfiguration must be specified.
Type: String.
<Subsystem>
Describes the merge settings for the objects that make up the subsystem.
Applies only to objects describing the subsystem.
includeObjectsFromSubordinateSubsystems mandatory
If this attribute is specified, all objects (along with the subordinate objects)
included in the subsystem described by the parent item will be added to the
list of the objects being processed.
Type: Boolean.
configuration mandatory
From which configuration to take a composition of the subsystem.
Type: String.
Values:
• Main - to be taken from the main configuration. Used by default.
• Second - to be taken from the second configuration.
<MergeRule> optional
Describes the object merge mode.
<MergeRuleForPropertiesChangedTwice> optional
Describes the merge mode for object properties that were changed twice.
<MergeRuleForPropertiesChangedOnce> optional
Describes the merge mode for properties of an object that has been changed
in one configuration only.
<ObjectOrder> optional
Describes the order of subordinate objects in an object.
3.31.3. Auxiliary items
3.31.3.1. <Properties>
3.31.3.1.2. <property>
The item describes merge settings for a specific property of the configura-
tion object.
This item contains the following attributes:
name
The name of a property of the configuration object. Depending on the value
of this attribute, the <Property> item may include one of the following
elements: <Module>, <FormModule>, <SpreadsheetDocument>,
<Types>, <Content>.
Type: String.
3.31.3.1.3. <Module>
The item describes advanced merge settings for a module.
The item contains the following items:
<Methods>
The item describes merge settings for a module by procedures.
<Patch>
Information intended for automated modification of the module text in
1C:Enterprise language, in the universal format (unidiff).
3.31.3.1.4. <FormModule>
The item describes advanced merge settings for a form module.
The item contains the following items:
<MergeRule>
Describes a merge mode of a module.
<MergeRuleForPropertiesChangedTwice>
Describes a module merge mode for a form that was changed twice.
<MergeRuleForPropertiesChangedOnce>
Describes a merge mode for a module that was changed in one configura-
tion only.
<Module>
Contains advanced settings for merging a form module.
3.31.3.1.5. <SpreadsheetDocument>
The item describes advanced merge settings for a spreadsheet document.
The item contains the following items:
<MergeRule>
Describes a merge mode for a spreadsheet document. It can take one of the
following values:
• Merge - Merge documents.
• Unite - Include the contents of both tabular documents.
<MergeRuleForPropertiesChangedTwice>
Describes a merge mode for a spreadsheet document that was changed
twice.
<MergeRuleForPropertiesChangedOnce>
Describes a merge mode if the tabular document is changed in one configu-
ration only.
3.31.3.1.6. <Types>
Item description
The item describes advanced merge settings for types.
The item contains one or more items:
<Type>
The item describes merge settings for a specific type.
<Type>
This item contains the following attributes:
name mandatory
Full name of the type to which the merge rule applies.
Type: String.
Item description
The item describes additional settings for merging the contents of exchange
plan, subsystems, and functional options.
The item contains one or more items:
<Item>
The item describes merge settings for a specific item in content of the above
objects.
<Item>
This item contains the following attributes:
name mandatory
Full name of the type to which the merge rule applies.
Type: String.
3.31.3.2. <Methods>
3.31.3.2.2. <Method>
The item describes settings for merging a specific procedure/function of a
module in 1C:Enterprise language.
This item contains the following attributes:
name
Name of the method used in the main and the second configuration (if the
NameInSecondConfiguration attribute is not specified).
Type: String.
nameInSecondConfiguration
Name of the method used in the second configuration if the mapping was
specified manually. Optional.
Type: String.
Behavior particularities:
• If a procedure is in both files, the merge will be performed according
to the mode or contents of the <Patch> item will be used.
• If a method is only in the first file, it will be deleted if a merge mode
is not equal to DoNotMerge.
• If a method is only in the second file, it will be added if a merge mode
is not equal to DoNotMerge.
3.31.3.2.4. <MainArea>
The item describes merge settings for the main program section.
The item includes the following items:
<MergeRule>
Describes a merge mode for the main section of application.
<Patch>
Information intended for automated modification of the module text in
1C:Enterprise language, in the universal format (unidiff).
3.31.3.3. <MergeRule>
The item describes a merge mode of an item. It can take one of the follow-
ing values:
• DoNotMerge - do not merge.
• GetFromSecondConfiguration - take from the second config-
uration.
• MergePrioritizingMainConfiguration - merge with a pri-
ority of the main configuration.
• MergePrioritizingSecondConfiguration - merge with a
priority of the second configuration.
• MergeWithExternalTool - merge using an external program
(supported by modules).
3.31.3.4. <MergeRuleForPropertiesChanged
Twice>
Describes the merge mode for object properties that were changed twice. It
can take one of the following values:
• DoNotMerge - do not merge.
• GetFromSecondConfiguration - take from the second config-
uration.
• MergePrioritizingMainConfiguration - merge with a pri-
ority of the main configuration.
• MergePrioritizingSecondConfiguration - merge with a
priority of the second configuration.
• MergeWithExternalTool - merge using an external program
(supported by modules).
3.31.3.5. <MergeRuleForPropertiesChanged
Once>
Describes a merge mode for properties of the objects modified in only one
of the configurations. It can take one of the following values:
• DoNotMerge - do not merge.
• GetFromSecondConfiguration - take from the second config-
uration.
3.31.3.6. <ObjectOrder>
Describes the order of subordinate objects. It can take one of the following
values:
• GetFromMainConfiguration - take order from the main con-
figuration.
• GetFromSecondConfiguration - take order from the second
configuration.
3.33.2. server
Section describes server parameters.
address
The network address that will be used to access the standalone server copy.
You can specify the IP-address of the server, as well as aliases. The parame-
ter can take values:
• any - for all computer addresses on which the standalone server is
running.
• localhost - The alias of the 127.0.0.1 address.
• IPv4 address - network address in the IPv4 format.
• IPv6 address - network address in the IPv6 format.
Default value: localhost.
port
The TCP port which will be used to access the application. The value of this
parameter can be a number from 1 to 65535.
Default value: 8314.
host
Name of the computer that is running standalone server.
3.33.3. database
The section describes the database parameters. Depending on the version in
use of the standalone server, the following parameters are required:
• The infobase is located in the DBMS. Mandatory parameter dbms,
server, name.
• The infobase is located in the 1Cv8.1CD file. path mandatory pa-
rameter.
Simultaneous use of the dbms and pathparameters is not permissible.
dbms mandatory
Type of the DBMS in use. The parameter can take values:
• MSSQLServer - Microsoft SQL Server;
• PostgreSQL - PostgreSQL;
• IBMDB2 - IBM DB2;
• OracleDatabase - Oracle Database.
The remaining parameters of the indicated DBMSs correspond to the re-
quirements of the client-server version of the 1C:Enterprise platform.
server mandatory
The DBMS server name.
name mandatory
Database name.
user
The name of the user on behalf of whom the standalone server will connect
to the DBMS.
password
The DBMS user password.
path mandatory
Path to the 1Cv8.1CDdatabase file.
3.33.4. infobase
The section describes the infobase parameters, which is located in the data-
base described in the database section.
id
Infobase identifier in UUID format.
You can specify a unique symbolic identifier - in this case, each time the
server starts, the unique identifier will be generated (can be used for testing
purposes).
Default value: unique.
name
Infobase name If not specified, it will be generated as a string representation
of the infobase identifier actual value.
distribute-licenses
Manages the issuance of client licenses by the standalone server.
The parameter can take values:
• allow/yes/true - the client licenses are granted by the standalone
server.
• deny/no/false - the client licenses are not granted by the
standalone server.
schedule-jobs
Manages the scheduled-jobs execution.
The parameter can take values:
• allow/yes/true - the scheduled-jobs are executed.
• deny/no/false - the scheduled-jobs are not executed.
3.33.5. http
3.33.5.1. General information
The settings described in the http section of the standalone server configu-
ration file are similar to the publication settings that are stored in the de-
fault.vrd file.
[file://C:/Program Files
(x86)/1cv82/8.2.9.356/docs/ru/V8UpdateFrom82Beta.htm]
= 392BC75149AE02565C7E31592EDCD60F00BFA03C
The utility supports the following two output languages: Russian and Eng-
lish.
A description of parameters:
• first-name - is the first name of a licensee. This parameter is op-
tional if company parameter is specified.
• middle-name - is the middle name of a licensee. This parameter is
optional if company parameter is specified.
• last-name - is the last name of a licensee. This parameter is op-
tional if company parameter is specified.
• email - is the email address of a licensee.
• company - is the company of a licensee. When specifying the param-
eters first-name, middle-name, last-name this parameter is
optional. At least 5 characters are required, but there should not be
more than 3 identical characters in a row.
• country - A country of registration. Cannot be empty.
• zip-code - Zip code. Cannot be empty.
• region - Province/region/area.
• district - District.
• town - Town. Cannot be empty.
• street - Street. Cannot be empty.
• house - A house number. When specifying the building or
apartment parameters, this parameter is optional. Cannot be empty.
• building - Building. When specifying the house or apartment
parameters, this parameter is optional. Cannot be empty.
• apartment - Apartment. When specifying the house or
building parameters, this parameter is optional. Cannot be empty.
• serial - A serial number of a software product.
• pin - A pincode used at activating license.
• The previous-pin - When re-activating a license, this parameter
should contain the pincode that was used during the initial activation
of license. Mustn't coincide with the parameter value pin.
• path - Specifies a path to the license repository if it differs the de-
fault path.
• If validate - is specified, then the execution of a command will be
completed with an error if an attempt to get any of the key parameters
resulted in a runtime error. If a parameter is not specified, the occur-
rence of an error when receiving any key parameter will not prevent a
license from its successful activation. However, the license fields cor-
responding to the parameters not received will be filled with empty
values which will make it impossible to continue using the activated
license.
• conf-location - specifies a directory with conf.cfg configuration
file. This file analyzes ExternalResourcesMode parameter,
which selects the applied licensing centre address.
If this parameter is blank or the specified directory does not contain
conf.cfg file, the search for this file is performed in the following di-
rectories:
On Windows:
32-bit application in the 64-bit OS:
%PROGRAMFILES(x86)%\1cv8\conf.
Otherwise: %PROGRAMFILES%\1cv8\conf.
On Linux:
Directory ~/.1cv8/1C/1cv8/conf (~ - home directory of the
user, on behalf of which the 1C:Enterprise server operates).
• send-statistics - sends statistical information to 1C:Remote
service (pult.1c.com, port 443). <mode> parameter can have the fol-
lowing values:
true - information is sent. Default value.
false - information is not sent.
Result:
Upon successful registration, server returns a license file, which is placed in
the specified storage. When the identical data (including kit data) is re-
entered on the same machine, a similar license file is generated.
If successful, the utility returns 0. Otherwise, the return code is not 0 and an
error message is generated in the standard output stream.
4.5.4.2. Prepare-request
If a software license cannot be activated using the web service of the licens-
ing center, you can activate the license by sending an email to the licensing
center. To do this, the prepare-request, acquire and generate
commands are used in the specified order.
The prepare-request command prepares the file for transfer to the
Licensing Center.
Command line:
ring license prepare-request --first-name <first name> --middle-
name <middle name> --last-name <last name> [--email <email>] --
company <company> --country <country> --zip-code <zip code> [--
region <region> --district <district>] --town <town> --street
<street> --house <house> --building <building> --apartment
<apartment> --serial <serial number> --pin <PIN> [--previous-pin
<previous PIN> --request <file>] --validate [--send-statistics
<mode>]
A description of parameters:
• first-name - is the first name of a licensee. This parameter is op-
tional if company parameter is specified.
• middle-name - is the middle name of a licensee. This parameter is
optional if company parameter is specified.
• last-name - is the last name of a licensee. This parameter is op-
tional if company parameter is specified.
• email - is the email address of a licensee.
• company - is the company of a licensee. When specifying the param-
eters first-name, middle-name, last-name this parameter is
optional. At least 5 characters are required, but there should not be
more than 3 identical characters in a row.
• country - A country of registration. Cannot be empty.
• zip-code - Zip code. Cannot be empty.
• region - Province/region/area.
• district - District.
• town - Town. Cannot be empty.
• street - Street. Cannot be empty.
• house - A house number. When specifying the building or
apartment parameters, this parameter is optional. Cannot be empty.
• building - Building. When specifying the house or apartment
parameters, this parameter is optional. Cannot be empty.
• apartment - Apartment. When specifying the house or
building parameters, this parameter is optional. Cannot be empty.
• serial - A serial number of a software product.
• pin - A pincode used at activating license.
• The previous-pin - When re-activating a license, this parameter
should contain the pincode that was used during the initial activation
of license. Mustn't coincide with the parameter value pin.
• The request - specifies a full path to the file in which information
will be placed for transmission to the Licensing Center. If not speci-
fied, then the request text to the Licensing Center will be output to the
standard output stream.
• If validate - is specified, then the execution of a command will be
completed with an error if an attempt to get any of the key parameters
resulted in a runtime error. If a parameter is not specified, the occur-
rence of an error when receiving any key parameter will not prevent a
license from its successful activation. However, the license fields cor-
responding to the parameters not received will be filled with empty
values which will make it impossible to continue using the activated
license.
• send-statistics - sends statistical information to 1C:Remote
service (pult.1c.com, port 443). <mode> parameter can have the fol-
lowing values:
true - information is sent. Default value.
false - information is not sent.
Result:
Content of the Licensing Center request file is generated and written to a
file or standard output stream.
If successful, the utility returns 0. Otherwise, the return code is not 0 and an
error message is generated in the standard output stream.
4.5.4.3. Acquire
The command generates a response file based on a previously generated
request file using the Licensing Center's web service.
Command line:
ring license acquire [--request <RequestFile>] [--response
<ResponseFile>] [--conf-location] [--send-statistics <mode>]
A description of parameters:
• request - Is a full name of the file with the request to the Licensing
Center. If a parameter is not specified, then the content of the request
file is expected from the standard input stream.
• response - Is a full name of the file to which a response from the
License Center will be posted. If a parameter is not specified, then the
contents of the response file will be output to the standard output
stream.
• conf-location - specifies a directory with conf.cfg configuration
file. This file analyzes ExternalResourcesMode parameter,
which selects the applied licensing centre address.
If this parameter is blank or the specified directory does not contain
conf.cfg file, the search for this file is performed in the following di-
rectories:
On Windows:
32-bit application in the 64-bit OS:
%PROGRAMFILES(x86)%\1cv8\conf.
Otherwise: %PROGRAMFILES%\1cv8\conf.
On Linux:
Directory ~/.1cv8/1C/1cv8/conf (~ - home directory of the
user, on behalf of which the 1C:Enterprise server operates).
• send-statistics - sends statistical information to 1C:Remote
service (pult.1c.com, port 443). <mode> parameter can have the fol-
lowing values:
true - information is sent. Default value.
false - information is not sent.
Result:
A Licensing Center's response
If successful, the utility returns 0. Otherwise, the return code is not 0 and an
error message is generated in the standard output stream.
A description of parameters:
• license - Is a full name of the file with a resulting license. If a pa-
rameter is not specified, then the contents of the file of the activated
license is output to the standard output stream.
• request - Is a full name of the file with the request to the Licensing
Center.
• response - Is a full name of the file to which a response from the
License Center will be posted.
• send-statistics - sends statistical information to 1C:Remote
service (pult.1c.com, port 443). <mode> parameter can have the fol-
lowing values:
true - information is sent. Default value.
false - information is not sent.
Result:
A file with an activated license.
If successful, the utility returns 0. Otherwise, the return code is not 0 and an
error message is generated in the standard output stream.
A description of parameters:
• path - Specifies a path to the license repository if it differs the de-
fault path.
• send-statistics - sends statistical information to 1C:Remote
service (pult.1c.com, port 443). <mode> parameter can have the fol-
lowing values:
true - information is sent. Default value.
false - information is not sent.
Result:
A list of the license names found.
A description of parameters:
• name - Is a name of a license for which information is expected. If
this parameter is absent, then the system expects from the standard in-
put stream the contents (not the name!) of a file with the activated li-
cense.
• path - Specifies a path to the license repository if it differs the de-
fault path.
• send-statistics - sends statistical information to 1C:Remote
service (pult.1c.com, port 443). <mode> parameter can have the fol-
lowing values:
true - information is sent. Default value.
false - information is not sent.
Result:
License information in the following format:
Information about user:
Name :
Middle Name :
Last Name :
Country :
Zip code :
City :
Street :
Apartment/Office :
Product information :
Date of equipment :
Description :
Registration number :
Product code :
The current computer hardware is not validated to match the hardware used
to activate a license.
4.5.4.7. Validate
Checks whether the current computer hardware matches the hardware regis-
tered at the moment of license activation.
Command line:
ring license validate [--name <name>] [--path <path>] [--send-
statistics <mode>]
A description of parameters:
• name - Is a name of a license for which information is expected. If
this parameter is absent, then the system expects from the standard in-
put stream the contents (not the name!) of a file with the activated li-
cense.
• path - Specifies a path to the license repository if it differs the de-
fault path.
• send-statistics - sends statistical information to 1C:Remote
service (pult.1c.com, port 443). <mode> parameter can have the fol-
lowing values:
true - information is sent. Default value.
false - information is not sent.
Result:
Confirmation that the computer hardware matches the hardware registered
at the moment of license activation, or a list of differences (if the hardware
lists are different).
If successful, the utility returns 0. Otherwise, the return code is not 0 and an
error message is generated in the standard output stream. Some situations
are highlighted by special error codes:
• 1 - The computer parameters changed;
• 2 -An error in verifying the digital signature of a license.
A description of parameters:
• license - A full path to a file of the activated license that will be
placed in the license repository.
• path - Specifies a path to the license repository if it differs the de-
fault path.
• send-statistics - sends statistical information to 1C:Remote
service (pult.1c.com, port 443). <mode> parameter can have the fol-
lowing values:
true - information is sent. Default value.
false - information is not sent.
Result:
Places the specified file with the activated license in the specified (explicitly
or implicitly) license repository.
If successful, the utility returns 0. Otherwise, the return code is different
from 0.
4.5.4.9. Get
Obtains an activated license from a license repository and writes it to a file.
Command line:
ring license get -name <name> [--license <FullName>] [--path
<storage>] [--send-statistics <mode>]
A description of parameters:
• name - Is a name of a license for which information is expected.
• license - A full path to the file in which the received license will
be written. If not specified - , the contents of the license file is output
to the standard output stream.
• path - Specifies a path to the license repository if it differs the de-
fault path.
• send-statistics - sends statistical information to 1C:Remote
service (pult.1c.com, port 443). <mode> parameter can have the fol-
lowing values:
true - information is sent. Default value.
false - information is not sent.
Result:
Obtains an activated license from a repository and writes it to a file with the
specified name.
If successful, the utility returns 0. Otherwise, the return code is different
from 0.
4.5.4.10. Remove
Removes a license from a license repository.
Command line:
ring license remove -name <name> [--path <storage>] [--all] [--
send-statistics <mode>]
A description of parameters:
• name - Is the name of a license to be removed from a repository.
• path - Specifies a path to the license repository if it differs the de-
fault path.
• all - delete all licenses with the given name in the storage.
• send-statistics - sends statistical information to 1C:Remote
service (pult.1c.com, port 443). <mode> parameter can have the fol-
lowing values:
true - information is sent. Default value.
false - information is not sent.
Result:
A license is removed from the license repository.
If successful, the utility returns 0. Otherwise, the return code is different
from 0.
4.5.4.11. update
Updates (re-obtains) all licenses from the license storage. License update
means re-obtaining a license in the licensing center with the same parame-
ters: registration number, PIN, key parameters. Files with activated software
licenses that exist before the update are saved with the .oldlic extension for
backup purposes.
Command line:
ring license update --conf-location <ConfigurationFile> [--force
<value>] [--path <storage>] [--validate] [--send-statistics <mode>]
A description of parameters:
• conf-location - platform configuration file location directory.
Used to search for the conf.cfg configuration file, which analyzes the
ExternalResourcesMode parameter. If the parameter is not
specified or the conf.cfg file is missing in the specified directory, an
attempt will be made to find the conf.cfg file in the following directo-
ries:
On Windows OS:
32-bit application in the 64-bit OS:
%PROGRAMFILES(x86)%\1cv8\conf.
Otherwise: %PROGRAMFILES%\1cv8\conf.
On Linux:
~/.1cv8/1C/1cv8/conf (~ directory - user's home directory
on behalf of whom the licensing utility is run).
• force - defines the behavior of the licensing utility if errors occurred
during the license update. The parameter can take the following val-
ues:
true - the error is ignored and the file during the processing of
which the error occurred is skipped. Processing continues.
false - file processing is interrupted, all licenses are restored
from the backups (default value).
• path - Specifies a path to the license repository if it differs the de-
fault path.
• validate - indicates whether to check the hardware data received
from the system. The parameter can take values:
true - check.
false - do not check (default value).
• send-statistics - sends statistical information to 1C:Remote
service (pult.1c.com, port 443). <mode> parameter can have the fol-
lowing values:
true - information is sent. Default value.
false - information is not sent.
Result:
All licenses in the license storage is updated.
If successful, the utility returns 0. Otherwise, the return code is different
from 0.
4.5.4.12. Information for 1C:Remote Service
The following data is sent to 1C:Remote service:
• OS type: Windows or Linux.
• OS full name.
• Architecture of a computer running a utility.
• Version of a licensing utility so started.
• Architecture of a licensing utility so started.
• Version of Java managing the said utility.
• Name of a licensing utility command being executed.
• UUID generated on the basis of the following data (hash in UUID
format):
computer MAC address;
utility version;
utility architecture.
• Data batch ID.
• Computer UUID generated on the basis of server MAC address (hash
in UUID format).
• Command execution date and time.
admin@localhost's password:
4.7.3. help
This command displays help information. The help command with no
parameters displays general information on using the agent mode.
designer> help
Usage:
General parameters:
--version | -v
Gets version of the utility
Mode:
help (h)
Displays help information for the specified mode.
Arguments:
MODE
The mode for which information needs to be obtained about
keys of the command line
Supported modes:
General parameters:
--version | -v
Gets version of the utility
Mode:
options
Settings management
Commands:
list
Displays values of all settings
get
Gets a value of a setting
--output-format
Output format
--show-prompt
Shows the command-line prompt
set
Sets a value of a setting
--output-format=<text|json>
Output format
--show-prompt=<yes|no>
Shows the command-line prompt
designer>
To get 1C:Enterprise version while in the agent mode, execute the help –
version command.
designer> help --version
8.3.10.2000
designer>
In this example, the first command (options set ...) sets the output
format, and the second command gets the 1C:Enterprise version.
4.7.5.2. list
Using this command, you can view a list of parameters and their (parame-
ters) current status.
4.7.5.3. get
This command allows you to get parameter values. The following parame-
ters are available for the command:
• --output-format - allows to specify a output format of the com-
mand's performance:
text - Commands return a result in the text format.
json - Commands return a result in a format of the JSON mes-
sages.
• --show-prompt - Allows to control a presence of the designer>
command line prompt:
yes - There is a prompt in a command line;
no - There is no prompt in a command line.
• --notify-progress - allows you to get information about the
display of the progress of the command execution.
• --notify-progress-interval - allows you to get the time in-
terval through which the information about progress is updated.
4.7.5.4. set
This command allows you to set parameter values. The following parame-
ters are available for the command:
• --output-format - allows to specify a output format of the com-
mand's performance:
text - Commands return a result in the text format.
json - Commands return a result in a format of the JSON mes-
sages.
• --show-prompt - Allows to control a presence of the designer>
command line prompt:
yes - There is a prompt in a command line;
no - There is no prompt in a command line.
• --notify-progress - allows you to manage the output of infor-
mation about the progress of the command execution:
yes - progress displays;
no - progress does not display (default value).
• --notify-progress-interval - allows you to specify the
time interval through which the information about progress is updated.
The value is set with an accuracy of 0.1 seconds. The default value is
1 second. Violation of accuracy leads to generation of the
CommandLineFormaError error.
4.7.6. The commands of a
group config
4.7.6.1. Command group purpose
The commands of aconfig group are responsible for configuration edit-
ing.
4.7.6.2. dump-config-to-files
The command allows you to export the configuration to xml files. The fol-
lowing parameters are available for the command:
• --dir <path> - Contains a path to a directory to which a configu-
ration will be exported. A parameter is obligatory.
• --extension <extension name> - Contains the name of ex-
tension that will be exported to files.
• --all-extensions - If a parameter is specified, then all the con-
figuration extensions will be exported to files.
• --format [hierarchical|plain] - Determines the export-
ing format. A hierarchy (hierarchical) The exporting format is
used by default.
• --update - To update the existing exporting. In this case, only those
objects whose versions differ from the versions specified in the Con-
figDumpInfo.xml file will be exported.
• --force - To perform a full exporting if, when trying to update ex-
porting (parameter update) it turned out that the current version of
the exporting format does not match a version of the exporting format
specified in the ConfigDumpInfo.xml file.
• --get-changes <path> - To generate a file that contains chang-
es between current and specified exporting of a configuration.
• --config-dump-info-for-changes <path> - Is a path to
the ConfigDumpInfo.xml file which is used to generate the change
file between the two instances of exporting a configuration.
• --list-file <file> - To export only the metadata objects
and/or the external properties specified in a file regardless of whether
they were changed or not.
4.7.6.3. load-config-from-files
The command allows you to import the configuration to xml files. The fol-
lowing parameters are available for the command:
• --dir <path> - Contains a path to the directory from which a con-
figuration will be loaded. A parameter is obligatory.
• --extension <extension name> - Contains a name of the
extension that will be loaded from files.
• --all-extensions - If a parameter is specified, then all configu-
ration extensions will be loaded from the files.
• --format [hierarchical|plain] - Determines the export-
ing format. A hierarchy (hierarchical) The exporting format is
used by default.
• --files <File[, file]> - A list of files to be loaded. File-
names are separated by commas. File paths are relative to the down-
load directory. Absolute paths are not supported. When using the --
list-file parameter, it is not used.
• --list-file <file> - A path to the file that lists the download-
ing files. One line corresponds to one file. File paths are relative to the
download directory. Absolute paths are not supported. When using the
--files parameter, it is not used.
• --update-config-dump-info - After downloading is finished,
to create in the directory the ConfigDumpInfo.xml file corresponding
to the loaded configuration.
4.7.6.4. dump-cfg
The command allows you to export the configuration or extension to the
file. The following parameters are available for the command:
• --file <path> - path to the configuration file (cf-file) or exten-
sion (cfe-file).
• --extension <extension name> - contains the extension
name that will be exported to the file.
4.7.6.5. load-cfg
The command allows you to import the configuration or extension from the
file. The following parameters are available for the command:
• --file <path> - path to the configuration file (cf-file) or exten-
sion (cfe-file).
• --extension <extension name> - contains the extension
name that will be imported from the file.
4.7.6.6. dump-external-data-processor-or-
report-to-files
The command allows you to export external processings or reports to xml
files. The following parameters are available for the command:
• --file <file> - Contains the name of a file that will act as the
root file of uploading the external data processor/report upload in the
XML format. A parameter is obligatory.
• --ext-file <file> - Is a full name of the file with the exporting
external data processor (* .epf) or report (* .erf).
• --format [hierarchical|plain] - Determines the export-
ing format. A hierarchy (hierarchical) The exporting format is
used by default.
4.7.6.7. load-external-data-processor-or-
report-from-files
The command allows you to import external processings or reports from
xml files. The following parameters are available for the command:
• --file <file> - Contains a name of the file that is the root file of
exporting the external data processor/report in the XML format. A pa-
rameter is obligatory.
• --ext-file <file> - A full file name with loadable external da-
ta processor (* .epf) or report (* .erf).
4.7.6.8. update-db-cfg
The command allows you to update the database configuration. The follow-
ing parameters are available for the command:
• --prompt-confirmation - Determines a need for requesting a
user to confirm acceptance of changes during restructurization of in-
fobase.
• --dynamic-enable - Initially, it tries a dynamic update; if the at-
tempt fails, a background update will be started.
• --dynamic-disable - By specifying this parameter a dynamic
update is disabled.
• --warnings-as-errors - If this parameter is specified, then all
warnings that may occur when updating the database configuration
will be considered errors.
• --background-start - If this parameter is specified, a back-
ground configuration update will be launched and the current session
will be terminated.
• --background-cancel -If this parameter is specified, then the
launched background configuration database update will be canceled.
• --background-finish - If this parameter is specified, then the
launched background configuration update of database will be com-
pleted. At the same time an exclusive lock will be imposed on data-
base and the final phase of updating will be carried out.
• --background-resume - If this parameter is specified, then a
system continues the previously suspended background database con-
figuration update.
• --server - This parameter indicates that the database configuration
update must be performed on the 1C: Enterprise server side.
• --extension <extension name)> - extension name.
When the update-db-cfg command is being executed, the following
operation algorithm is used:
• In the event that it is impossible to exclusively lock the database and a
dynamic update is possible (the --dynamic-disable parameter is
not specified) -, the dynamic update of the database configuration will
be performed.
• In the event that it is possible to exclusively lock the database but re-
structuring of database is not required -, then the usual database con-
figuration update will be performed.
• In the event that it is possible to exclusively lock the database but re-
structuring of database is required, then some actions will be per-
formed in the following sequence:
A list of changed objects is created
A resulting list is displayed in the console;
If there is a need to confirm a user for accepting changes (parame-
ter --prompt-confirmation) -, then a user is asked a corre-
sponding question;
If an answer to a question is negative -, then an update is canceled
with the issuance of a corresponding notification;
If an answer is positive or a request was not needed -, then an up-
date continues , as planned.
4.7.6.9. mobile-app-write-file
The command allows you to save the configuration for creating a mobile
application in an xml file. The following parameters are available for the
command:
• --file <filename> - a name of a file to save configuration to.
4.7.6.10. mobile-client-write-file
The command allows you to save the configuration for creating a mobile
client in an xml file. The following parameters are available for the com-
mand:
• --file <file name> - defines the name of the file that contains
the private key. This key is used to generate a signature.
4.7.6.11. mobile-client-digi-sign
The command allows you to generate a digital signature of the mobile client
configuration. The following parameters are available for the command:
• --file <file name> - defines the name of the file that contains
the private key. This key is used to generate a signature.
4.7.6.12. manage-cfg-support
The command allows to disable the configuration support. The following
parameters are available:
• --disable-support -indicates necessity to disable the configura-
tion support. The error is generated, if the parameter is absent.
• --force - disable configuration support even if changes are not
permissible in the configuration. The error is generated if the parame-
ter is absent and if the attempt to disable the configuration support is
made for the configuration, for which the changes are restricted in the
support control interactive mode.
4.7.6.13.2. create
The command is designed to create extensions in the infobase. The exten-
sion is created as empty. To import the extension you should use
theconfig load-cfg or config load-config-from-files
command. The following parameters are available:
• --extension <name> - sets extension name. A parameter is ob-
ligatory.
• --name-prefix <prefix> - sets the name prefix for the exten-
sion. A parameter is obligatory.
• --synonym <synonym> - extension name synonym. Multilingual
string in function format Nstr().
• --purpose <purpose> - extension purpose. <Purpose> can
take the following values:
customization - purpose Adjustment (default value);
add-on - purpose Add-in;
patch - purpose Correction.
4.7.6.13.3. delete
The command is designed to remove the extension from the infobase. The
following parameters are available:
• --extension <name> - sets the extension name to be deleted.
• --all-extensions - indicates that all extensions must be deleted.
4.7.6.13.4. Group of property commands
get
The command is designed to get extension properties located in the in-
fobase. The following parameters are available:
• --extension <name> - sets the name of the extension for which
you want to get properties.
• --all-extensions - indicates that it is necessary to get the prop-
erties of all extensions imported into the infobase.
set
The command is designed to set extension properties located in the in-
fobase. The following parameters are available:
• --extension <name> - specifies extension name for which you
want to set properties.
• --active <mode> - define extension activity. <Mode> Can take
the following values:
yes - extension is active.
no - extension is not active.
• --safe-mode <mode> - defines operation in safe mode. <Mode>
Can take the following values:
yes - extension operates in a safe mode.
no - extension operates in unsafe mode. In this case, the security
profile name is automatically reset (the profile name is set as equal
to an empty string).
• --security-profile-name <profile> - defines the name
of the security profile that the extension runs under. If the name of the
security profile is specified, then the flag of operation in a safe mode
is automatically set.
• --unsafe-action-protection <mode> - defines a mode of
protection against unsafe actions. <Mode> Can take the following
values:
yes - protection against unsafe actions in the extension is enabled.
no - protection against unsafe actions in the extension is disabled.
• --used-in-distributed-infobase <mode> - defines the
option of the extension to work in the distributed infobase.<Mode>
can take the following actions:
yes - The extension is used in the distributed infobase.
no - The extension is not used in the distributed infobase.
• --scope <scope> - extension scope. <Scope> can take the fol-
lowing actions:
infobase - The extension is valid for the whole infobase.
data-separation - the extension is valid for the whole in-
fobase.
4.7.7.2. debug-info
Using this command, get information about the debugger settings for the
infobase. The following debugger configuration parameters are available:
enabled -A sign of debugging to be started.
protocol - A debugging protocol: tcp or http.
server-address - The debugging server address for this in-
fobase.
4.7.7.3. data-separation-common-
attribute-list
This command allows you to get a list of separator names of the infobase.
4.7.7.4. dump-ib
The command is designed to infobase export into the dt-file. The following
parameters are available:
• --file <filename> - defines dt file name.
4.7.7.5. restore-ib
The command is designed to infobase import into the dt-file. The following
parameters are available:
• --file <filename> - defines dt file name.
4.7.7.6. erase-data
The command deletes the infobase data.
6.1.2.1. Overview
The interactive launcher (1cv8s) can get the shared infobase list either from
a local network or from the Internet. To retrieve the shared bases list from
the Internet, you need to start the interactive launcher and specify the ad-
dress of the list (the InternetService or WebCommonInfoBases
parameter in file 1cestart.cfg).
The shared infobase list retrieval procedure must meet the following re-
quirements:
• The WebCommonInfoBases.CheckInfoBases() method is
called anonymously
• The WebCommonInfoBases.GetInfoBases() method is
called with authentication
• The infobase that returns the shared infobase lists must contain a list
of users allowed to request these lists.
First, the WebCommonInfoBases.CheckInfoBases() method is
called (anonymously). If the launcher is started manually for the first time
for this computer and this user, the ClientID
and InfoBasesCheckCode parameters take the value 00000000-
0000-0000-0000-000000000000. If the launcher is not started for
the first time, the client code and the code of the current shared infobases
list are passed as parameters. The web service method determines whether
the shared infobase list for the client needs to be updated. If the update is
needed, -the InfoBasesChanged output parameter must be set to True
and the URL parameter must contain the address of the web service that
implements the WebCommonInfoBases.GetInfoBases() method
(requires authentication). Otherwise, InfoBasesChanged must be set to
False and URL must contain an empty string.
The algorithm of checking for the changes in the shared infobase list is not
regulated and can be arbitrary. Please note that the launcher does not calcu-
late the code value identifying the shared infobase list but simply stores the
value that was passed during the previous call of the web service.
If results of the call of WebCommonInfoBases.CheckInfoBases()
method indicate that the list needs to be updated, the launcher calls the
WebCommonInfoBases.GetInfoBases() method of the web ser-
vice. The web service is located at the address returned by the
WebCommonInfoBases.CheckInfoBases() function in its URL
parameter. The GetInfoBases() method must match the user on whose
behalf the web service is authenticated with a client code. The mapping can
be “personal” -when the user identifies himself or herself with personal
username and password and receives the personal shared infobase list. In
addition, the mapping can be a “role-based” -when user identifies his or her
belonging to a certain role, such as Operator, Storekeeper, etc., and ob-
tains the shared infobase list common to all users with the same role. You
should note that in the first case, the infobase implementing the
GetInfoBases() method needs to contain the list of all users who can
run the 1cv8s launcher connected to this web service. In the second case,
the list of users can contain the role names only.
The GetInfoBases() method must return three values:
• Client code (if not specified)
• The list of shared infobases in v8i format
• The code value identifying the passed infobase list This value will be
passed to the WebCommonInfoBases.CheckInfoBases()
method at the next check for whether the shared infobase list needs to
be updated.
If the shared infobase list is retrieved for the first time, the client code (the
ClientID parameter) is 00000000-0000-0000-0000-
000000000000.
Please also consider the following:
• The infobase implementing the WebCommonInfoBases web ser-
vice needs to be published in two different publications.- This is be-
cause calling the CheckInfoBases() and GetInfoBases()
methods requires different levels of authentication.
• The anonymous access is organized by explicitly specifying the user
on whose behalf the access is performed in the default.vrd file.
• The user on whose behalf the anonymous access is organized should
not be able to call the method for retrieving the infobase list. The user
should only indicate whether the list has changed for the passed
ClientID value.
• All publications serving the WebCommonInfoBases web service
must prohibit the web client.
• If the shared infobase list is used by the mobile client, this file must
contain the correct values of the MobilePublicKey parameter for
the infobases to be displayed in the mobile client.
CheckInfoBases
Description:
This method is used by the 1cv8s launcher to determine whether the shared
infobase list needs to be retrieved.
Parameters:
ClientID input
Type: String. Contains the client ID used to check whether the shared
infobase list needs to be updated.
InfoBasesCheckCode input
Type: String. Identifies the shared infobase list. The code must uniquely
identify the current shared infobase list. If the list is modified in any way,
the code needs to be assigned a new value that was not previously used for
this client ID.
InfoBasesChanged output
Type: Boolean. Indicates that the shared infobase list must be retrieved
again.
URL output
Type: String. The URL to be requested if the shared infobase list has
changed since the last call.
Returns:
Arbitrary type, the value is ignored.
getInfoBases
Description:
Parameters:
ClientID input/output
Type: String. Contains the client ID for which the shared infobase list is
retrieved. If the client ID is not specified (or equal to 00000000-0000-
0000-0000-000000000000), the method assigns the client ID and
returns it in this parameter.
InfoBasesCheckCode output
Type: String. Value of the code identifying the shared infobase list re-
turned by this method in the InfoBases parameter.
InfoBases output
Type: String. The shared infobase list in the v8i format.
Returns:
Arbitrary type, the value is ignored.
If ClientID = "00000000-0000-0000-0000-000000000000"
And InfoBasesCheckCode = "00000000-0000-0000-0000-000000000000"
Then
// the first request of the client
InfoBaseChanged = True;
URL = "/listservice2/ws/WebCommonInfoBases";
Return "";
EndIf;
Client = Catalogs.SharedBaseList.FindByCode(ClientID);
If Client.Empty() Then
// no such client
InfoBaseChanged = False;
Else
// check that the list on the client side and our list are the
same
If InfoBasesCheckCode = Client.ListCode Then
// the list is not changed
InfoBaseChanged = False;
URL = "";
Else
// the list is changed
InfoBaseChanged = True;
URL = "/listservice2/ws/WebCommonInfoBases";
EndIf;
EndIf;
Return "";
EndFunction
EndFunction
After creating the configuration, the web service should be published to the
web server twice. Then the addresses of published web services should be
stored. Suppose that web services are published at the addresses:
• http://localhost/listservice - anonimous web service;
• http://localhost/listservice2 - the web service requiring authentica-
tion;
The infobase should contain users: Anonymous, and, for example, users
Operator, Storekeeper, Accountant.
The default.vrd file, which describes the publication at
http://localhost/listservice, is as follows:
<?xml version="1.0" encoding="UTF-8"?>
<point xmlns="http://v8.1c.ru/8.2/virtual-resource-system"
xmlns:xs="http://www.w3.org/2001/XMLSchema"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
base="/listservice"
ib="File=X:\DB\ListBase;Usr=Anonimous"
enable="false">
<ws>
<point name="WebCommonInfoBases"
enable="true"/>
</ws>
</point>
In the settings of the web server where you published the web service for
retrieving the shared infobase list, the HTTP HEAD request should be disa-
bled (at least for virtual catalogs to access the web service). Otherwise, the
web service will not be used.
In the launch window setup form, you need to add a web service with the
address shown above including the suffix ws:
http://localhost/listservice/ws/.
After completing the configuration you should run the launcher. When
prompted to enter a username and password to access the 1C:Enterprise
web service, you should enter the names Operator, Storekeeper, Ac-
countant. The corresponding entries are added to the SharedBaseList
catalog. If you place into the IBList attribute of each catalog element
your list in the v8i format, this list will be added to the list of infobases of
the launcher after authentication.
GetDistributiveInfo
Description:
This method is used by the thin client (1cv8c) to get the required version of
the client application distribution package in the following cases:
• When connecting via a web server in the client-server variant the ver-
sion of the client application doesn't match the server version.
• When connecting via a web server in the file variant the version of the
client application doesn't match the server extension version.
Parameters:
OS input
Type: String. The type of operating system for which you need to get the
client application distribution package.
Values: Windows, MacOS.
Arch input
Type: String. The architecture of operating system for which you need to
get the client application distribution package.
Values: x86, x86_64.
Version input
Type: String. The version number of the client application for which you
need to get the client application distribution package.
Size output
Type: Number. The size of the client application distribution package (in
bytes). If the requested distribution package is missing, you must return the
value 0.
URL output
Type: String. URL for downloading the client application distribution
package. When generating the URL you should remember that the distribu-
tion package file should be accessible to the web server. In addition, the
user getting the distribution package should also have permissions to down-
load this file.
The client application distribution package is a zip archive of distribution
files.
Returns:
Arbitrary type, the value is ignored.
DistributiveDirectory = "C:\inetpub\Distribs\";
DistributiveURL = "http://host/site/distribs/";
// make the zip file name
FileName = "tc-" + Lower(OS) + "-" + Arch + "-" + Version +
".zip";
Archive = New File(DistributiveDirectory + FileName);
If Archive.Exists() Then
Size = Archive.Size();
URL = DistributiveURL + FileName;
Else
Size = 0;
URL = "";
EndIf;
Return "";
EndFunction
In this description:
• Application - is the name of the used application. The need to
specify the full path to the launched application, the case of the used
characters, and other features depend on the operating system and en-
vironment in which the application is used. To launch the web client,
the URL of the infobase published on the web server is the name of
the application.
• Mode - is an optional parameter to launch some applications.
• CommandN - is one or more commands that the application must exe-
cute (including additional command parameters). Command - is some
specific action. Each command, in general, has mandatory and option-
al parameters, and some optional value. The possibility to combine
several commands in one command line depends on the launched ap-
plication, the launch mode (if applicable) and the commands them-
selves. Some commands may be mutually exclusive, that is, you can
use only one command from a specific list.
All command line elements are separated by character " " (space). When
describing the command line interface, the following characters may be
used:
• The character " " (space) - separates all the elements of the launch
command line interface.
• Commands and parameters can be specified using several methods:
Method 1:
The symbol "/" (slash) - this symbol begins each command.
The web client is exception where the command is not preced-
ed by this symbol. Web client commands are separated by
character "&".
The character "-" (dash) - precedes a command parameter.
The parameters are specified along this scheme, for example,
when launch the 1C:Enterprise server (ragent) or in the case of
batch launch the Designer (1cv8).
Method 2:
The command is specified without preceding characters. The
parameter starts with the character "--" (double dash) in case of
specifying the full parameter name or "-" (dash) in case of
specifying the abbreviated name of the parameter.
The parameters are specified along this scheme, for example,
for the ring utility.
Method 3:
The command starts with the character "--" (double dash) in
case of specifying the full command name or "-" (dash) in case
of specifying the abbreviated name of the command.
The parameters are specified along this scheme, for example,
for the cnvdbfl utility.
When the documentation describes the command line interface of
an application, first a general description of the command line is
given. It shows how the application parameters are specified.
• The characters "[" and "]" - these characters enclose an optional text.
For example, the instruction /command [-parameter] means
that it is possible to specify this command as follows: /command, or
/command -parameter. In the first case (without specifying a pa-
rameter), the command uses for this parameter some default value.
• Symbol "|" - this symbol separates elements that can't present in a giv-
en place at the same time. For example, the description
/command1|/command2 means that in this place you can use ei-
ther command1 or command2. But simultaneous usage of these
commands is not allowed.
• The characters "<" and ">" - these characters usually enclose a brief
description of the command parameter. The command description ex-
plains the actual values of the parameter. Obviously, you should not
transfer these characters into the actual command line. In addition in
most command interpreters these characters mean redirection of
standard input/output streams, so the direct transfer of these characters
into the real command line leads to radical change in the meaning od
the command entered.
• Please note that the values may be specified not only for commands,
but also for command parameters.
If the value of a command or parameter contains spaces, then we recom-
mend to enclose this value in quotes. The symbol " itself in the parameter
text should be entered as \", and the symbol \ in the parameter value text
before the symbol " should be entered as \\. For example, the value of the
parameter ef \abc \\" "\ should be entered as follows: ef \abc \\\\\" \" \\.
Some examples of the description of the 1C:Enterprise launch command
line commands are given below.
/TComp [-None|-Deflate|-SDC]
This example describes the TComp command, for which you can specify
one of three following parameters: -None or -Deflate or -SDC. It is not
mandatory to specify the parameters. The command can be issued without
any parameters, in the form /TComp.
/VA<mode>
7.2.1. Launch in
1C:Enterprise mode
1cv8 ENTERPRISE [<options>]
If you specify a file with its full path as a command line parameter of the
Designer batch mode, ensure that all of the directories that form the path
exist. Otherwise, the operation will fail.
Modules locked with password are ignored in the Designer batch mode.
When processing such a module, a diagnostic message is generated.
If the command line command supports the –Extension and –
AllExtensions parameters, the simultaneous use of both parameters is
not supported and the system behavior in this case is unpredictable.
When working with extensions (–Extension and –AllExtensions
parameters), the return code is set to 0 upon successful completion, other-
wise the return code is 1.
7.4.2. Upload/download
infobase
/DumpIB <file name>
Export infobase to file.
/RestoreIB <file name>
Load infobase from file.
7.4.15. Configuration
repository operations
7.4.15.1. Repository access parameters
Commands, specifying the configuration repository parameters, may be
combined with the other repository operations commands.
/ConfigurationRepositoryF <repository directory>
The parameter is intended for specifying the configuration repository path.
/ConfigurationRepositoryN <name>
The parameter is intended for specifying the configuration repository
username.
/ConfigurationRepositoryP <password>
The parameter is intended for specifying the configuration repository user
password.
iTaxi
Run in the Taxi interface mode.
SYSTEMWEBCLIENTSTAT
Enables web client usage statistics collection functionality. This functionali-
ty is intended for 1C Company specialists.
OidcSelectedProvider
Allows to specify the configured OpenID Connect provider name to be used
for user authentication at web client startup.
MainWindowMode=startup mode>
It allows to expressly specify the startup mode for client application main
window. <startup mode>can accept one of the following values:
• -Normal - ordinary startup mode.
• -Workplace - workplace mode.
• -EmbeddedWorkplace - embedded workplace mode (for embed-
ding a web client in a third-party website).
• -FullscreenWorkplace - full screen workplace mode.
• -Kiosk - kiosk mode.
Deleted section:
• .
Added section:
• Section 6.4.2. By default, when password is under attack.
• Section 6.9.2. Client/server mode of infobase.
• Section 8.10.1.6. Embedding Web Client.
• Section 8.10.2.3. Embedding Web Client.
• Appendix 4.4.4. Use recommendations.
• Appendix 4.5.4.12. Information for 1C:Remote Service.
Modified section:
• Section 1.1. Thin client.
• Section 1.2. Thick client.
• Section 1.3. Web client.
• Section 1.9.3. License types.
• Section 1.9.4. CORP license applicability.
• Section 6.2.8.5. OpenID Connect authentication.
• Section 6.2.8.7. Use of biometrics to log in through a mobile client.
• Section 6.3. Active users list.
• Section 6.6. Infobase parameters.
• Section 6.16.3.2. Viewing event log.
• Section 6.16.11. Database copy management.
• Section 8.3.1. General publication procedure.
• Section 8.3.2.1. Dialog buttons.
• Section 8.3.2.2.1. General parameters.
• Section 3.3. *.v8i.
• Appendix 4.5.4. Module commands (all subsections).
• Appendix 7.3.3. Specifying run mode.
• Appendix 7.4.5. Checking configurations and extensions.
• Appendix 7.8. Webclient command line.