Question & Answer
Question
When using the following configuration with Distributed Session Cache (DSC) enabled, the session behavior has changed in recent versions:
Reverse Proxy Configuration (webseald.conf)
[session] lifetime = 0
DSC Configuration
maximum session lifetime = 3600
Prior to ISVA 10.0.8: Once logged into the reverse proxy, users would not be required to re-authenticate as long as they accessed the system periodically. Sessions would persist indefinitely with regular activity.
ISVA 10.0.8 and IVIA 11.0.0 and Later: After logging into the reverse proxy, users are required to re-authenticate once the DSC's maximum session lifetime has elapsed.
Why did this behavior change?
Cause
The behavior prior to ISVA 10.0.8 was problematic and has been corrected.
Previous Behavior:
The design assumed that [session] lifetime would always be shorter than maximum session lifetime. Under this assumption:
- When
maximum session lifetimeelapsed, the session was destroyed only in DSC - The local session on the reverse proxy remained untouched and continued to exist
- The local session persisted according to
[session] lifetime, effectively lasting until removed by LRU (Least Recently Used) algorithm
Problem with Previous Behavior:
Sessions that exceeded maximum session lifetime were no longer managed by DSC, making them unable to be shared with other reverse proxy instances.
Current Behavior:
The implementation has been changed to not rely on the previous assumption:
- The
[session] lifetimesetting now overrides the lifetime of sessions stored in DSC - Only when
[session] lifetime = 0is themaximum session lifetimeused - New logic has been added: when a session reaches its lifetime in DSC, it is removed from DSC and simultaneously destroys the associated session on the reverse proxy
- As a result, even with
[session] lifetime=0, local sessions are destroyed whenmaximum session lifetimeelapses, requiring re-authentication
Answer
There are several options to address this behavior change:
Option 1: Switch Session Sharing Method
Discontinue use of DSC and switch to alternative session sharing methods, such as failover cookie authentication.
Option 2: Adjust Timeout Values
Configure larger values for either maximum session lifetime to reduce the frequency of re-authentication prompts.
Option 3: Use Non-Prompt Authentication Methods
Enable authentication methods that do not display prompts during re-authentication, such as:
- Basic authentication
- Certificate-based authentication
Product Synonym
ivia; isva
Was this topic helpful?
Document Information
Modified date:
08 May 2026
UID
ibm17272401