PADV-729 - Support user session timeout #105
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
This PR is intended to allow the platform to control the user session expiration time by introducing a new setting. The need for this support comes from the fact that a session timeout is a security mechanism whereby a connection to an application or service
is forcibly disconnected after a specified period of inactivity. This is intended to prevent an
unattended or forgotten management session from being used by an unauthorised or
malicious user. Any valid, current session that is discovered presents the risk of accidental or
malicious configuration changes being made within the context of the hijacked session’s
privilege level.
Changes.
SESSION_EXPIRY_SECONDS
setting to set the user session expiration time.How to test?
In devstack:
make lms-shell
SESSION_EXPIRY_SECONDS
variable to /edx/etc/lms.yml/edx/bin/edxapp-shell-lms
and execute:lms_sessionid
cookie and validate if its expiration matches with the new setting.