No Session Reuse (-nosessionreuse) (for STS capability)
- Last Updated: February 11, 2026
- 1 minute read
- OpenEdge
- Version 13.0
- Documentation
No Session Reuse (-nosessionreuse) (for STS capability)
Use No Session Reuse (-nosessionreuse) when
you do not want to reuse a Transport Layer Security (TLS) session ID to reconnect to the
same TLS-enabled database server or to reconnect to the OpenEdge Authentication Gateway STS
server.
| Operating system and syntax | UNIX / Windows |
-nosessionreuse
|
||
|---|---|---|---|---|
| Use with | Maximum value | Minimum value | Single-user default | Multi-user default |
| Client Connection, Authentication Gateway STS | — | — | — | — |
While your database connection may or may not be running with TLS enabled for communication to its remote clients, the communication to the Authentication Gateway STS Server is always run with TLS enabled.
If the database is running with TLS enabled, No Session Reuse (-nosessionreuse) is set the same for both the OpenEdge Server TLS
communication as well as for the STS Server communication.
For more information, see OpenEdge Getting Started: Core Business Services - Security and Auditing.
-H) and port
(-S), each subsequent connection to the same host and
port restarts the TLS session and ignores any different connection parameters that are
specified for the subsequent connection, including -nosessionreuse. If you want to change TLS socket options (such as -nohostverify) for each subsequent connection to a given host and
port, be sure to specify the -nosessionreuse parameter on
the initial TLS socket connection to that same host and port.