Close popover

Table of Contents

Configuring the time-out behavior for custom or Kerberos authentication services

Version:

Configure the way in which your custom or Kerberos authentication service handles operator time-out situations.

  1. Open the service from the navigation panel in Dev Studio by clicking Records SysAdmin Authentication Service and choosing a service from the instance list.

  2. For a Kerberos authentication service, on the Kerberos tab, in the Timeout activity field, press the Down Arrow key and select the AuthenticationLDAPWebTimeout activity to control the time-out behavior.

    The activity must have Code-Security as the Applies To key part.

  3. For a custom authentication service, on the Service tab, in the Timeout activity field, press the Down Arrow key and select the AuthenticationLDAPTimeout activity to control the time-out behavior.

    The activity must have Code-Security as the Applies To key part.

  4. Navigate to the Custom tab.

  5. Select the Use PegaRULES Timeout check box to use the authentication time-out values specified in the user access groups to determine how long a user session can remain inactive before users are prompted to identify themselves again. Leave this check box cleared if time-out is managed by the application server or other external facility.

  6. Do one of the following steps.

    • Select the Use Basic Authentication for Timeout check box to use the Basic authentication browser pop-up window to gather credentials when user's session times out.
    • In the Timeout challenge stream field, enter the second key part of an HTML rule (where the Applies To key part is @baseclass ) that presents a form for gathering user credentials when the user's session times out.
  7. In the Redirect URL field, enter a URL to which the user is redirected when the user session times out.

    This field is not available when the Use PegaRULES Timeout option is selected.

  8. Click Save.

  • Authentication services

    To override or extend the default authentication process, create and configure an authentication service.

  • More about authentication services

    This page describes additional topics relevant to authentication services that are not directly referenced on the rule form.

  • Creating an authentication service

    To override or extend the default authentication process, create an authentication service. By creating an authentication service, you implement more specialized authentication requirements than the default, for example, to use pre-authentication and post-authentication activities.

  • About HTML rules

    Use an HTML rule to describe how the system is to assemble, through stream processing, portions of HTML displays in your application.

Suggest Edit

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.