| hazelcast.mc.allowMultipleLogin
 ALLOW_MULTIPLE_LOGIN
 | 
Whether a user can log into an account in Management Center on multiple devices in different locations at the same time. Default: false. See Securing User Sessions. | 
java -Dhazelcast.mc.allowMultipleLogin=true -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.auditlog.enabled
 AUDIT_LOG_ENABLED
 | 
Whether Management Center logs auditable events. See Audit Logging. Default: false. | 
java -Dhazelcast.mc.auditlog.enabled=true \
-jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.configReplacer.class
 |  | 
java -Dhazelcast.mc.configReplacer.class=com.hazelcast.webmonitor.configreplacer.EncryptionReplacer \
-jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.configReplacer.failIfValueMissing
 | 
Whether the
configuration loading process stops when a replacement value is missing. Default: true. | 
java -Dhazelcast.mc.configReplacer.failIfValueMissing=true \
-jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.contextPath
 CONTEXT_PATH
 | 
Prefix of all URL paths in Management Center. Default: ' '(empty). | 
java -Dhazelcast.mc.contextPath=hazelcast-mc \
-jar hazelcast-management-center-5.0.4.jar
 
In this example, the URL for Management Center would be \http:localhost:8080/hazelcast-mc. | 
| hazelcast.mc.disableHostnameVerification
 | 
Whether Management Center does not verify the hostname of signed TLS/SSL certificates. Default: false. | 
java -Dhazelcast.mc.disableHostnameVerification=true -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.disableLoginPeriodMultiplier
 DISABLE_LOGIN_PERIOD_MULTIPLIER
 | 
Multiplier used for extending
the disabled login period in case the failed login attempts continue after the disabled login
period expires. Default: 10. See Securing User Sessions. | 
java -Dhazelcast.mc.disableLoginPeriodMultiplier=20 -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.exclude.cipher.suites
 EXCLUDE_CIPHER_SUITES
 | 
A comma separated list of cipher suites to be excluded from the list of supported ciphers in Management Center. Wildcards are supported. | 
java -Dhazelcast.mc.exclude.cipher.suites=^.*_(MD5|SHA|SHA1)$,^TLS_RSA_.*$,^.*_NULL_.*$ -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.existingKeyStore.path
 EXISTING_KEYSTORE_PATH
 | 
Path to an existing keystore. You do not have to set this property if you use a Hardware Security Module (HSM).
Default: ' '(empty). | 
java -Dhazelcast.mc.existingKeyStore.path=/path/to/existing/keyStore.jceks -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.existingKeyStore.pass
 EXISTING_KEYSTORE_PASS
 | 
Password for the keystore. You do not have to set this property if you use a Hardware Security Module (HSM) that provides another means to access the keystore.
Default: ' '(empty). | 
java -Dhazelcast.mc.existingKeyStore.pass=somepass -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.existingKeyStore.type
 EXISTING_KEYSTORE_TYPE
 | 
Type of the keystore.
Default: JCEKS. | 
java -Dhazelcast.mc.existingKeyStore.type=JCEKS -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.existingKeyStore.provider
 EXISTING_KEYSTORE_PROVIDER
 | 
Provider of the keystore. If you use a Hardware Security Module (HSM), specify the class name of your HSM’s java.security.Provider`implementation.
Default: System provider. | 
java -Dhazelcast.mc.existingKeyStore.provider=com.yourprovider.MyProvider -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.failedAttemptsBeforeDisableLogin
 FAILED_ATTEMPTS_BEFORE_DISABLE_LOGIN
 | 
Number of failed
login attempts that Management Center allows before disabling logins. Default: 3. See Securing User Sessions. | 
java -Dhazelcast.mc.failedAttemptsBeforeDisableLogin=1 -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.forceLogoutOnMultipleLogin
 FORCE_LOGOUT_ON_MULTIPLE_LOGIN
 | 
Whether Management Center forces users to log out when other users try to log into the same account. Default: false. See Securing User Sessions. | 
java -Dhazelcast.mc.forceLogoutOnMultipleLogin=true -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.forwarded.requests.enabled
 FORWARDED_REQUESTS_ENABLED
 | 
Whether Management Center reads X-Forwarded-*headers from reverse proxies. Default:true. | 
java -Dhazelcast.mc.forwarded.requests.enabled=false -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.healthCheck.enable
 HEALTH_CHECK_ENABLED
 | 
Whether the /healthendpoint is enabled on porthazelcast.mc.http.port+ 1. Default:false. This endpoint is always served over HTTP, regardless of any TLS/SSL settings. This endpoint responds with200 OKHTTP
status code if Management Center is running. | 
java -Dhazelcast.mc.healthCheck.enable=true -jar hazelcast-management-center-5.0.4.jar
 
In this example, the health check would be available at http://localhost:8081/health. | 
| hazelcast.mc.healthCheck.port
 HEALTH_CHECK_PORT
 |  | 
java -Dhazelcast.mc.healthCheck.port=2000 -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.home
 HOME_PROP
 |  | 
java -Dhazelcast.mc.home=/home/management-center -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.hostAddress
 HOST_ADDRESS
 | 
Network address that Management Center is reachable on. Default: 0.0.0.0(all network interfaces). | 
java -Dhazelcast.mc.hostAddress=127.0.1.1 -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.http.port
 HTTP_PORT
 | 
HTTP port for Management Center. Default: 8080. | 
java hazelcast.mc.http.port=80 -jar hazelcast-management-center-5.0.4.jar
 
In this example, the URL for Management Center would be \http:localhost:80. | 
| hazelcast.mc.include.cipher.suites
 INCLUDE_CIPHER_SUITES
 | 
A comma separated list of cipher suits to be included in the list of supported ciphers in Management Center. Wildcards are supported. | 
java -Dhazelcast.mc.include.cipher.suites=^SSL_.*$ -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.initialDisableLoginPeriod
 INITIAL_DISABLE_LOGIN_PERIOD
 |  | 
java -Dhazelcast.mc.initialDisableLoginPeriod=50 -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.jmx.enabled
 JMX_ENABLED
 | 
Whether the clustered JMX service is enabled. Default: false. See Clustered JMX. | 
java -Dhazelcast.mc.jmx.enabled=true -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.jmx.host
 JMX_HOST_NAME
 | 
Hostname/IP address of the JMX host machine. This is used by the JMX client to connect back into JMX, so the given host must be accessible from the host machine that runs the JMX client. Default: Server’s hostname. | 
java -Dhazelcast.mc.jmx.host=127.0.0.1 -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.jmx.mutualAuthentication
 JMX_SSL_MUTUAL_AUTH_ENABLED
 | 
Whether mutual authentication is enabled for the JMX interface. Default: false. | 
java -Dhazelcast.mc.jmx.mutualAuthentication=false -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.jmx.port
 JMX_PORT
 | 
Port on which the clustered JMX service is exposed. Default: 9999. | 
java -Dhazelcast.mc.jmx.port=9000 -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.jmx.rmi.port
 JMX_RMI_PORT
 | 
Port on which the Java process that you want to monitor listens for incoming connections from the client (Remote management applications) such as JConsole . For monitoring a local Java process, there is no need to specify the JMX RMI port number. Default: 9998. | 
java -Dhazelcast.mc.jmx.rmi.port=9001 -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.jmx.ssl
 JMX_SSL_ENABLED
 | 
Whether TLS/SSL is enabled for communication between the JMX interface and JMX clients. Default: false. | 
java -Dhazelcast.mc.jmx.ssl=true -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.jmx.ssl.keyStore
 | 
Path to a keystore. Default: ' '(empty). | 
java -Dhazelcast.mc.jmx.ssl.keyStore=/some/dir/selfsigned.jks -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.jmx.ssl.keyStorePassword
 | 
Password for the keystore. Default: ' '(empty). | 
java -Dhazelcast.mc.jmx.ssl.keyStorePassword=myPassword -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.jmx.ssl.trustStore
 | 
Path to a truststore. Default: ' '(empty). | 
java -Dhazelcast.mc.jmx.ssl.trustStore=/some/dir/truststore -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.jmx.ssl.trustStorePassword
 | 
Password for the truststore. Default: ' '(empty). | 
java -Dhazelcast.mc.jmx.ssl.trustStorePassword=myPassword -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.jmx.ssl.keyStoreType
 | 
Type of the keystore. Default: JKS. | 
java -Dhazelcast.mc.jmx.ssl.keyStoreType=JKS -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.jmx.ssl.keyManagerAlgorithm
 TLS_KEY_MANAGER_ALGORITHM
 | 
Name of the algorithm based
on which the authentication keys are provided. You can find out the default by calling
the javax.net.ssl.KeyManagerFactory#getDefaultAlgorithmmethod. Default: System default. | 
java -Dhazelcast.mc.jmx.ssl.keyManagerAlgorithm=JKS -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.ldap.timeout
 LDAP_CONN_TIMEOUT_MILLIS
 | 
Timeout in milliseconds for Active Directory and LDAP search queries. Default: 3000. | 
java -Dhazelcast.mc.ldap.timeout=4000 \
     -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.license
 LICENSE
 | 
Enterprise license. When this property is set, the license takes precedence
over one that is set in the user interface, and you cannot update the license in the UI. For more details about licenses, see See Enterprise Licenses. | 
java -Dhazelcast.mc.license={license key} -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.lock.skip
 SKIP_MC_LOCK_CHECK
 |  | 
java -Dhazelcast.mc.lock.skip=true -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.maxDisableLoginPeriod
 MAX_DISABLE_LOGIN_PERIOD
 | 
Maximum amount of time for the disable
login period. By default, the
disabled login period is unlimited. | 
java -Dhazelcast.mc.maxDisableLoginPeriod= \
     -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.metrics.disk.ttl.duration
 PERSISTENT_STORE_TTL_DURATION
 | 
Time-to-Live (TTL) in ISO-8601-based durations format for each record in the metrics persistence. Default: P1D(one day). This value must be positive. See Historical Metrics. | 
java -Dhazelcast.mc.metrics.disk.ttl.duration=P2D -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.periodic.healthcheck.enabled
 PERIODIC_HEALTHCHECK_ENABLED
 |  | 
java -Dhazelcast.mc.periodic.healthcheck.enabled=true -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.phone.home.enabled
 PHONE_HOME_ENABLED
 | 
Whether Management Center sends usage data to the Hazelcast phone home server. Default: true. See Phone Home. | 
java -Dhazelcast.mc.phone.home.enabled=false \
     -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.prometheusExporter.enabled
 PROMETHEUS_EXPORTER_ENABLED
 | 
Whether to expose all metrics to the /metricsendpoint to be consumed by Prometheus. All metrics at the endpoint include thehz_prefix. Default:false. | 
java -Dhazelcast.mc.prometheusExporter.enabled=true \
     -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.prometheusExporter.filter.metrics.included
 PROMETHEUS_EXPORTER_ALLOWLIST
 | 
Metrics to include in the /metricsendpoint. Default:' '(empty). | 
java -Dhazelcast.mc.prometheusExporter.filter.metrics.included=hz_topic_totalReceivedMessages,hz_map_totalPutLatency \
     -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.prometheusExporter.filter.metrics.excluded
 PROMETHEUS_EXPORTER_DENYLIST
 | 
Metrics to exclude from the /metricsendpoint. Default:' '(empty). | 
java -Dhazelcast.mc.prometheusExporter.filter.metrics.excluded=hz_os_systemLoadAverage,hz_memory_freeHeap \
     -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.prometheusExporter.port
 PROMETHEUS_EXPORTER_PORT_NUMBER
 | 
Port on which the /metricsendpoint is exposed. | 
java -jar -Dhazelcast.mc.prometheusExporter.enabled=true \
  -Dhazelcast.mc.prometheusExporter.port=2222 \
  -jar hazelcast-management-center-5.0.4.jar
 
In this example, the /metricsendpoint would be available on port 2222:http://localhost:2222/metrics. | 
| hazelcast.mc.rest.enabled
 MC_REST_ENABLED
 |  | 
java -Dhazelcast.mc.rest.enabled=true -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.security.dictionary.minWordLength
 PASSWORD_DICTIONARY_MIN_WORD_LENGTH
 | 
Minimum length that words in the dictionary must contain. Default: 3. | 
java -Dhazelcast.mc.security.dictionary.path=/usr/MCtext/pwd.txt \
     -Dhazelcast.mc.security.dictionary.minWordLength=3 \
     -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.security.dictionary.path
 PASSWORD_DICTIONARY_PATH
 | 
Path to a text file that contains words that cannot be included in user passwords. | 
java -Dhazelcast.mc.security.dictionary.path=/usr/MCtext/pwd.txt \
     -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.session.timeout.seconds
 SESSION_TIMEOUT_SECONDS
 | 
Number of seconds that a session can remain inactive before it is invalid and the user must log in again. Default 1800. | 
java -Dhazelcast.mc.session.timeout.seconds=60 -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.state.reschedule.delay.millis
 TMS_RESCHEDULE_DELAY_MILLIS
 | 
Duration in milliseconds that Management Center waits before requesting metadata from a Hazelcast cluster. Metadata includes a
list of all data structures and their configurations. Default: 1000. | 
java -Dhazelcast.mc.state.reschedule.delay.millis=2000 -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.tls.excludeProtocols
 TLS_EXCLUDE_PROTOCOLS
 | 
A comma separated list of TLS/SSL protocols to be excluded from the list of supported protocols in Management Center. | 
java -Dhazelcast.mc.tls.excludeProtocols=SSLv3 -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.tls.openSsl
 TLS_OPEN_SSL
 | 
Allow Management Center to use Google’s Conscrypt SSL that is built on their fork of OpenSSL, BoringSSL. Default: false. | 
java -Dhazelcast.mc.tls.openSsl=true -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.tls.enabled
 TLS_ENABLED
 | 
Whether TLS/SSL is enabled. Default: false. | 
java -Dhazelcast.mc.tls.enabled=true -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.tls.keyStore
 TLS_KEYSTORE_PATH
 |  | 
java -Dhazelcast.mc.tls.keyStore=/keys/mc.keystore -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.tls.keyStorePassword
 TLS_KEYSTORE_PASS
 |  | 
java -Dhazelcast.mc.tls.keyStorePassword=mypassword123 -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.tls.trustStore
 TLS_TRUSTSTORE_PATH
 | 
Path to a truststore. If the hazelcast.mc.tls.enabledsystem property istrueand this value is empty, Management Center uses the system JVM’s own truststore. | 
java -Dhazelcast.mc.tls.trustStore=/truststores/mc.truststore -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.tls.trustStorePassword
 TLS_TRUSTSTORE_PASS
 | 
Password of the truststore. | 
java -Dhazelcast.mc.tls.trustStorePassword=mypassword123 -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.tls.enableHttpPort
 TLS_ENABLE_HTTP_PORT
 |  | 
java -Dhazelcast.mc.tls.trustStorePassword=mypassword123 -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.tls.mutualAuthentication
 TLS_MUTUAL_AUTH
 | 
Whether clients connected to Management Center are authenticated: 
REQUIRED: If the client does not provide a keystore or the provided keys are not included in the Management Center’s truststore, the client will not be authenticated.
OPTIONAL: If the client does not provide a keystore, it will be authenticated. But, if the client provides keys that are not included in the Management Center’s truststore, the client will not be authenticated.
 | 
java -Dhazelcast.mc.tls.mutualAuthentication=REQUIRED -jar hazelcast-management-center-5.0.4.jar
 | 
| hazelcast.mc.useExistingKeyStore
 USE_EXISTING_KEYSTORE
 | 
Enables use of an existing keystore.
Default: false. | 
java -Dhazelcast.mc.useExistingKeyStore=true -jar hazelcast-management-center-5.0.4.jar
 |