+

Search Tips   |   Advanced Search

Session management custom properties

Session management properties, like the session management configuration, can be configured at the server, application, or web module level. The following steps are for setting the custom properties for session management at the server level.

  1. In the console click...

      Servers | Server Types | WebSphere application servers | server_name | Session management | Additional Properties | Custom Properties | New

  2. On the settings page, enter the property to configure in the Name field and the value to set it to in the Value field.

  3. Click Apply or OK.

  4. Click Save on the console task bar to save your configuration changes.

  5. Restart the server.


AlwaysEncodeURL

The Servlet 2.5 specification specifies to not encode the URL on a response.encodeURLcall if it is not necessary. To support compatibility with earlier versions when URL encoding is enabled, set the AlwaysEncodeURL custom property to true to call the encodeURL method. The URL is always encoded, even if the browser supports cookies. The property must be configured at the web container level.


CheckSessionCookieNameOnEncodeURL

Check for the existence of the HTTP session cookie when determining whether the session ID needs to be encoded in the URL. Configure at the web container level. Default is false. When set to true, you enable the session manager to check for the existence of the HTTP session cookie when determining whether the session ID needs to be encoded in the URL.

(WAS v8.5.0.1)


checkSessionNewOnIsValidRequest

Whether the server can handle multiple simultaneous client requests when HttpSessionIdReuse is enabled. Configure at the web container level. By default, the session manager handles one client request at a time when property HttpSessionIdReuse is also enabled. Set checkSessionNewOnIsValidRequest to false to allow the session manager to handle multiple simultaneous requests from a client when HttpSessionIdReuse is enabled. If HttpSessionIdReuse is not enabled, this property has no effect. We must restart the server for the configuration change to take effect. The default value for this property is true.


CloneSeparator

Specify a different character as the clone separator in session cookies. The value specified for this custom property must be a single character.

This property was set as a web container custom property in Version 6.1 but must now be set as a session management custom property at the web container level.

Best practice: This property should only be used as a means to provide more flexibility if we have a situation where we cannot use either a colon (:), or a plus sign (+) as the clone separator in session cookies. You should understand the clone character requirements of other products running on the system before using this property to change the clone separator character.

The fact that any character can be specified as the value for this custom property does not imply that the character specified will function correctly. This fact also does not imply that IBM is responsible for fixing any problem that might arise from using an alternative character. bprac

Avoid trouble: If the JVM you are configuring is part of a cluster, make sure to configure other cluster members with this property and using the same value in order for the plugin to maintain affinity. Plugin regeneration and propagation are required after configuration.gotcha


CloneSeparatorChange

Maintain session affinity. The clone ID of the server is appended to session identifier separated by colon. On some Wireless Application Protocol (WAP) devices, a colon is not allowed. Set this property to true to change clone separator to a plus sign (+). Configure at the web container level.

Avoid trouble: If the JVM you are configuring is part of a cluster, make sure to configure other cluster members with this property and using the same value in order for the plugin to maintain affinity. Plugin regeneration and propagation are required after configuration.


DebugSessionCrossover

The DebugSessionCrossover custom property enables code to perform additional checks to verify that only the session associated with the request is accessed or referenced. Messages are logged if any discrepancies are detected.

Set this property to true to enable session data crossover detection.

See article, HTTP session problems, for additional information.


DelayAfterDuplicateIdException

Specify how long, in milliseconds, the session manager should wait before attempting to retrieve a session from the backend server after a SESN0196W error occurs. Configure at the web container level.

The default value for this property is 500.

(V8502)

DelayInvalidationAlarmDuringServerStartup

Delay the startup of the invalidation alarm upon server startup by the specified number of seconds.

The default value for this property is 0.


ForceSessionInvalidationMultiple

Whether the session manager should wait indefinitely for a request to complete before attempting to invalidate the session, or should attempt to invalidate a session after the specified time limit has elapsed. The default value for this property is 3.


HideSessionValues

Prevents the logging of session attribute values in session manager traces. Configure at the web container level.

Applications store these session attribute values. The default value is true.


HttpSessionCloneId

Change the clone ID of the cluster member. Within a cluster, this ID must be unique to maintain session affinity. When set, this name overwrites the default name generated by WebSphere Application Server. Configure at the web container level.

Default clone ID length: 8 or 9.

Avoid trouble: If the JVM you are configuring is part of cluster, make sure to configure other cluster members for this property but with different unique values. All cluster members should have this property set to different unique values.gotcha


HttpSessionIdLength

Session identifier length. Do not use an extremely low value; using a low value results in reduced number of combinations possible, thereby increasing risk of guessing the session identifier. In a cluster, all cluster members should be configured with same ID length. Allowed range: 8 to 128. Default length: 23. Configure at the web container level.


HttpSessionIdReuse

whether the session manager can use the session ID sent from a browser to preserve session data across web applications that are running in an environment that is not configured for session persistence. Configure at the web container level.

In a multi-JVM environment that is not configured for session persistence setting this property to true enables the session manager to use the same session information for all of a user's requests even if the web applications that are handling these requests are governed by different JVMs. The default value for this property is false. Set this property to true to enable the session manager to use the session ID sent from a browser to preserve session data across web applications that are running in an environment that is not configured for session persistence.


HttpSessionReaperPollInterval

Specify, in seconds, a wake-up interval for the process that removes invalid sessions. The value specified for this property overrides the default installation value, which is between 30 and 360 seconds, and ensures that the reaper process runs at a specific interval. If the maximum inactive interval is less than 2 minutes, the reaper poll interval is usually between 30 to 60 seconds. If the maximum inactive interval is more than 2 minutes and up to 15 minutes, the reaper poll interval is usually between 60 to 90 seconds. If the maximum inactive interval is more than 15 minutes and up to 30 minutes, the reaper poll interval is usually between 120 to 180 seconds. If the maximum inactive interval is more than 30 minutes, the reaper poll interval is usually between 240 to 300 seconds. Because the default timeout and maximum inactive interval is 30 minutes, the reaper interval is usually between 2 and 3 minutes. For example, you might want to use this property if we want the installation timed out sessions invalidated more frequently than 2 to 3 minutes. Specifying HttpSessionReaperPollInterval=120 ensures that sessions are invalidated within 2 minutes of timing out.

The minimum value for this property is 30 seconds. If a value less than the minimum is entered, the specified property is ignored and an appropriate value is automatically determined and used. The maximum inactive interval is the session timeout. The default is based on maximum inactive interval set in session management.


InvalidateOnUnauthorizedSessionRequestException

Set this property to true if, in response to an unauthorized request, we want the session manager to invalidate a session instead of issuing an UnauthorizedSessionRequestException error message.

When a session is invalidated, the requester can create a new session, but does not have access to any of the previously saved session data. This invalidation allows a single user to continue processing requests after a logout while still protecting session data.

The default value for this property is false.


NoAdditionalSessionInfo

Set this property to true to force removal of information that is not needed in session identifiers. Configure at the web container level.


NoAffinitySwitchBack

Set this property to true to maintain affinity to the new member even after original one comes back up. When a cluster member fails, its requests routed to a different cluster member, and sessions are activated in that other member. Thus, session affinity is maintained to the new member, and when failed cluster member comes back up, the requests for sessions that were created in the original cluster member are routed back to it. Allowed values are true or false, with the default being false. Configure at the web container level.

Set this property to true when we have distributed sessions configured with time-based write. Note that this property has no affect on the behavior when distributed sessions is not enabled.


OptimizeCacheIdIncrements

If true, make the session manager assess whether the in-memory session for a web module is older than the copy in persistent store. Setting this property resolves the continually increasing cache ID.

If HTTP session management is configured to use session persistence and the user's browser session is moving back and forth across multiple web applications you might see extra persistent store activity as the in-memory sessions for a web module are refreshed from the persistent store. As a result, the cache IDs are continually increasing and the in-memory session attributes are overwritten by those of the persistent copy. Set this property to true to prevent the cache IDs from continually increasing.

If the configuration is a cluster, ensure that the system times of each cluster member is identical as possible.


SecurityUserIgnoreCase

Set this property to true if we want the session security identity and the client security identity to be considered a match even if their cases are different.

When a user configures session security integration, the session manager compares the security identity of th session owner with the security identity of the client request. Because the matching criteria is case sensitive, if these two identities do not exactly match, an UnauthorizedSessionRequestException is sent back to the client.

If we have situations where we want the session security identity and the client security identity to be considered a match even if their cases are different, add the SecurityUserIgnoreCase custom property to the Web container configuration settings, and set the property to true. When true, an UnauthorizedSessionRequestException does not occur if the session security identity and the client security identity are identical except for their cases. For example, when this property is set to true, the session security identity USER1 matches the client security identities User1 and user1.


Servlet21SessionCompatibility

Enable global session behavior. In Servlet 2.2 and later, sessions are scoped at the Web module level. The default is false.

Deprecated feature: This property is deprecated. The IBMApplicationSession method replaces the function of the Servlet21SessionCompatibility custom property.depfeat


SessionIdentifierMaxLength

Use this value to set maximum length that a session identifier can grow. Configure at the web container level.

In a cluster, because of fail-over when a request goes to new cluster member, session management appends a new clone ID to the existing clone ID. In a large cluster, if for some reason servers are failing more often, then it is possible that the session identifier length can be more than expected reducing room for URL. This property helps to find out the condition and take appropriate action to address servers fail-over. When this is specified, message is logged when specified maximum length is reached. Allowed value: integer.


SessionRewriteIdentifier

Change the key used with URL rewriting. The default key is jsessionid.


SessionTableName

Set the database table name. Allowed value: String. The default value is SESSIONS.

Some applications may rely on method ejbCreate(...) to have created the entity bean in the database. For such a requirement, setting the JVM property com.ibm.websphere.ejbcontainer.allowEarlyInsert to true overrides the default behavior.


SessionTableSkipIndexCreation

Disable index creation on server startup.

This custom property should only be used to manually create our own database indices for session persistence. However, IBM recommends that you let session manager create database indices.

To enable this property, go to the session management custom properties console page, enter the SessionTableSkipIndexCreation property name and set its value to true. Before enabling this property, verify the correct index does exist on the session database.


ThrowSecurityExceptionOnGetSessionFalse

Set this custom property to false to allow session management to return a null session value instead of an UnauthorizedSessionrequestException. The default value is true.


UseInvalidatedId

Set this custom property to true to reuse the incoming ID if the session with that ID was recently invalidated. This is a performance optimization because it prevents checking the persistent store. The default value is true.


UseOracleBLOB

The UseOracleBLOB custom property creates the HTTP session database table using the Binary Large Object (BLOB) data type for the medium column. This property increases performance of persistent sessions when Oracle databases are used. Due to an Oracle restriction, BLOB support requires use of the Oracle Call Interface (OCI) database driver for more than 4000 bytes of data. We must also ensure that a new sessions table is created before the server is restarted by dropping the old sessions table or by changing the datasource definition to reference a database that does not contain a sessions table.

To create a sessions table using the BLOB data type, use the following name-value pair:

Name Value
UseOracleBLOB true


UsingApplicationSessionsAndInvalidateAll

When the invalidateAllSet method is called, not all IBMApplicationSessions objects are checked. Configure at the web container level. If we are using both the IBMApplicationSessions object and the invalidateAll call, use the following name-value pair:

Name Value
UsingApplicationSessionsAndInvalidateAll true


UsingCustomSchemaName

Ensure that the session manager successfully detects the sessions table on subsequent server startups.

Set this custom property to true if you are using DB2 for sessions persistence and the customSchema property is not set to the default value in the DB2 JDBC driver.

The default value is false.


Related tasks

  • Configure session management by level
  • Configure a unique HTTP session clone ID for each application server