Skip to main content

Configuring the time-out behavior for custom or Kerberos authentication services

Suggest edit Updated on July 1, 2021

Configure the way in which your custom or Kerberos authentication service handles operator time-out situations.

  1. Open the service from the navigation panel in Dev Studio by clicking RecordsSysAdminAuthentication Service and choosing a service from the instance list.
  2. For a Kerberos authentication service, on the Kerberos tab, in the Timeout activity field, press the Down Arrow key and select the AuthenticationLDAPWebTimeout activity to control the time-out behavior.
    The activity must have Code-Security as the Applies To key part.
  3. For a custom authentication service, on the Service tab, in the Timeout activity field, press the Down Arrow key and select the AuthenticationLDAPTimeout activity to control the time-out behavior.
    The activity must have Code-Security as the Applies To key part.
  4. Navigate to the Custom tab.
  5. Select the Use PegaRULES Timeout check box to use the authentication time-out values specified in the user access groups to determine how long a user session can remain inactive before users are prompted to identify themselves again. Leave this check box cleared if time-out is managed by the application server or other external facility.
  6. Do one of the following steps.
    • Select the Use Basic Authentication for Timeout check box to use the Basic authentication browser pop-up window to gather credentials when user's session times out.
    • In the Timeout challenge stream field, enter the second key part of an HTML rule (where the Applies To key part is @baseclass ) that presents a form for gathering user credentials when the user's session times out.
  7. In the Redirect URL field, enter a URL to which the user is redirected when the user session times out.
    This field is not available when the Use PegaRULES Timeout option is selected.
  8. Click Save.
What to do next: Mapping additional operator information for custom or Kerberos authentication services
  • Previous topic Configuring the challenge behavior for custom or Kerberos authentication services
  • Next topic Mapping additional operator information for custom or Kerberos authentication services
Did you find this content helpful? YesNo

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us