Skip to main content

This content has been archived and is no longer being updated.

Links may not function; however, this content may be relevant to outdated versions of the product.

Requiring reauthentication for new and expired sessions for a SAML SSO authentication service

Suggest edit Updated on July 1, 2021

To add an extra layer of security, you configure Pega Platform to reauthenticate new sessions and to reauthenticate when reactivating an expired session. The time-out period is specified on the operator's access group or is managed by the application server or another external facility.

  1. Open the service from the navigation panel in Dev Studio by clicking RecordsSysAdminAuthentication Service and choosing a service from the instance list.
  2. On the SAML 2.0 tab, expand the Advanced configuration settings section.
  3. Select the Use access group timeout checkbox to use the authentication time-out values that are specified in the user access group. This setting determines how long user sessions can remain inactive before users are prompted to identify themselves again. Clear the Use access group timeout checkbox if the time-out is managed by the application server or another external facility.
  4. To require reauthentication for new and reactivated sessions, select the Force authentication check box.
  5. Click Save.
What to do next: Configuring operator provisioning for a SAML SSO authentication service
  • Previous topic Specifying preauthentication and postauthentication activities for a SAML SSO authentication service
  • Next topic Configuring operator provisioning for a SAML SSO authentication service
Did you find this content helpful? YesNo

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us