No Session Reuse (-nosessionreuse) (for STS capability)

Use No Session Reuse (-nosessionreuse) when you do not want to reuse a Transport Layer Security (TLS) session ID to reconnect to the same TLS-enabled database server or to reconnect to the OpenEdge Authentication Gateway STS server.

Operating system and syntax UNIX / Windows -nosessionreuse
Use with Maximum value Minimum value Single-user default Multi-user default
Client Connection, Authentication Gateway STS

While your database connection may or may not be running with TLS enabled for communication to its remote clients, the communication to the Authentication Gateway STS Server is always run with TLS enabled.

If the database is running with TLS enabled, No Session Reuse (-nosessionreuse) is set the same for both the OpenEdge Server TLS communication as well as for the STS Server communication.

For more information, see OpenEdge Getting Started: Core Business Services - Security and Auditing.

Note: OpenEdge TLS turns on TLS session reuse by default. So, after the initial connection to a given host (-H) and port (-S), each subsequent connection to the same host and port restarts the TLS session and ignores any different connection parameters that are specified for the subsequent connection, including -nosessionreuse. If you want to change TLS socket options (such as -nohostverify) for each subsequent connection to a given host and port, be sure to specify the -nosessionreuse parameter on the initial TLS socket connection to that same host and port.