Session configuration

On this page

Still need help?

The Atlassian Community is here for you.

Ask the community

This page tells you how to set the timeout period for a session token and how to enable/disable in-memory token storage.

Session Timeout

When a successful authentication occurs, for either an application or a user, a unique token is assigned. Tokens are valid for the period of time specified as the 'Session Timeout' attribute.

The session timeout determines how long a session will be considered valid during any period of inactivity. This value is specified in minutes and must be greater than 0.

To specify the session timeout:

  1. Log in to the Crowd Administration Console.
  2. In the upper-right corner, click .
  3. In the left-hand men, Session Configuration.
    The 'Session Config' screen will appear, as shown below.
  4. Type the new value into the 'Session Timeout' field, then click the 'Update' button.

Require Consistent Client IP Address

(info) (Available since Crowd 2.5.2.)

Authenticated sessions can be tied to the IP address they were created from. This means that an attempt to use that session from another machine will fail, which will force mobile clients to reauthenticate when their IP address changes.

This setting can be disabled to relax that requirement, so a session can be used from any IP address. Note that changing this setting will invalidate any existing sessions, so you will be logged out after making this change.

To allow sessions to be used from any IP address,

  1. Log in to the Crowd Administration Console.
  2. In the upper-right corner, click .
  3. In the left-hand men, Session Configuration.
    The 'Session Config' screen will appear, as shown below.
  4. Check or uncheck Require Consistent Client IP Address as required.
  5. Click Update.

Authentication Token Storage

Authentication tokens are used to validate application and user sessions. A token is stored for each active session. By default, they're kept in the Crowd database. Storing these tokens in memory can benefit performance, but with one significant drawback, that sessions will not be saved across Crowd restarts. If you restart Crowd, all your users will have to log in again.

In-memory token management is not available in Crowd Data Center

Switching from database to in-memory token management does not require a restart of Crowd; nor will sessions be lost or validations failed. However, if you have lots of active sessions, and therefore lots of tokens, it can take some time to copy the token information. During this time, validation requests will be queued and Crowd will appear unresponsive to client applications.

As a guide, below are some benchmarks of time taken to switch from one form of token storage to the other. The measurements were taken on a quad-core Mac Pro, using a lightly-loaded PostgreSQL database:

Number of Tokens:

100

500

1000

5000

10000

Database -> Memory

0.1s

0.7s

1.2s

4.2s

8.2s

Memory -> Database

1.2s

4.8s

9.2s

45s

90s

To switch the token storage location:

  1. Log in to the Crowd Administration Console.
  2. In the upper-right corner, click .
  3. In the left-hand men, Session Configuration.
    The 'Session Config' screen will appear, as shown below.
  4. Next to Authentication Token Storage, select one of the radio buttons :
    • 'Database Cache' — This is the default option. Select it to store your tokens in the Crowd database. We recommend this option unless performance problems require in-memory storage.
    • 'Memory Cache' — Select this option to store your tokens in memory.
  5. Click Update.


Screenshot: 'Session Config'  

In-memory cache size

The size of the in-memory token cache is defined in the crowd-webapp/WEB-INF/classes/crowd-ehcache.xml file. The default should be acceptable for most cases. If you require more than 2048 concurrent sessions in memory you may increase the size of the '-hash-cache' caches.

Remember Me settings

Use this setting to define the number of days a user's login is remembered for. You can also turn the Remember Me option off to force the need to provide credentials every time a users wants to log in.

Clear cookies

If for any reasons, like for example security breach, you want to force your users to log in again, click Clear all cookies. This will force all users to log in again once their session expires. The session expiration time is configured in the session timeout setting in the same screen. 

Last modified on Oct 11, 2021

Was this helpful?

Yes
No
Provide feedback about this article
Powered by Confluence and Scroll Viewport.