Configuration¶
The table below presents the configuration files in use by MKE:
Configuration file name |
Description |
---|---|
|
Configuration of the Interlock extension service that monitors and configures the proxy service |
|
Configuration of the service that handles and routes user requests |
|
MKE license |
|
Configuration of the core Interlock service |