Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

Requiring reauthentication for new and expired sessions for an OpenID Connect SSO authentication service

Updated on July 1, 2021

To add an extra layer of security, you configure Pega Platform to reauthenticate new sessions and to reauthenticate when reactivating an expired session. The time-out period is specified on the operator's access group or is managed by the application server or another external facility.

  1. Open the service from the navigation panel in Dev Studio by clicking RecordsSysAdminAuthentication Service and choosing a service from the instance list.
  2. On the OpenID Connect tab, expand the Advanced configuration settings section and the Processing subsection.
  3. Select the Use access group timeout checkbox to use the authentication time-out values that are specified in the user access group. This setting determines how long user sessions can remain inactive before users are prompted to identify themselves again. Clear the Use access group timeout checkbox if the time-out is managed by the application server or another external facility.
  4. Click Save.
  • Previous topic Specifying preauthentication and postauthentication activities for an OpenID Connect SSO authentication service
  • Next topic Configuring operator provisioning for an OpenID Connect SSO authentication service

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us