Skip to main content

Requiring reauthentication for new and expired sessions for an OpenID Connect SSO authentication service

Suggest edit Updated on June 30, 2021

To add an extra layer of security, you configure Pega Platform to reauthenticate new sessions and to reauthenticate when reactivating an expired session. The time-out period is specified on the operator's access group or is managed by the application server or another external facility.

  1. Open the service from the navigation panel in Dev Studio by clicking RecordsSysAdminAuthentication Service and choosing a service from the instance list.
  2. On the OpenID Connect tab, expand the Advanced configuration settings section and the Processing subsection.
  3. Select the Use access group timeout checkbox to use the authentication time-out values that are specified in the user access group. This setting determines how long user sessions can remain inactive before users are prompted to identify themselves again. Clear the Use access group timeout checkbox if the time-out is managed by the application server or another external facility.
  4. Click Save.
What to do next: Configuring operator provisioning for an OpenID Connect SSO authentication service
  • Previous topic Specifying preauthentication and postauthentication activities for an OpenID Connect SSO authentication service
  • Next topic Configuring operator provisioning for an OpenID Connect SSO authentication service
Did you find this content helpful? YesNo

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us