No Session Reuse (-nosessionreuse)
- Last Updated: January 16, 2024
- 1 minute read
- OpenEdge
- Version 12.8
- Documentation
No Session Reuse (-nosessionreuse)
Use No Session Reuse
(-nosessionreuse) when you do not want to reuse a
Transport Layer Security (TLS) session ID to reconnect to the same TLS-enabled database
server.
| Operating system and syntax | UNIX / Windows |
-nosessionreuse
|
||
|---|---|---|---|---|
| Use with | Maximum value | Minimum value | Single-user default | Multi-user default |
| Client Connection | 1 | 0 | — | 0 |
While your database connection may or may not be running with TLS enabled for communication to its remote clients, the communication to the Authentication Gateway STS Server is always run with TLS enabled.
If the database is
running with TLS enabled, No Session Reuse (-nosessionreuse) is set the same for both the OpenEdge Server TLS communication as
well as for the STS Server communication.
-nosessionreuse) parameter may be modified while your database is online using
PROMON or through the _DbParams VST. This change will take effect on any newly spawned
servers.For more information, see Learn about Security and Auditing.
Note: OpenEdge TLS turns on TLS session reuse by default. So, after
the initial connection to a given host (
-H) and port
(-S), each subsequent connection to the same host and
port restarts the TLS session and ignores any different connection parameters that are
specified for the subsequent connection, including -nosessionreuse. If you want to change TLS socket options (such as -nohostverify) for each subsequent connection to a given host and
port, be sure to specify the -nosessionreuse parameter on
the initial TLS socket connection to that same host and port.