Setting up uninterrupted user sessions for a seamless, hassle-free experience
Scenario
Apex Global is an Internet service provider that uses BMC Helix SSO to authenticate NOC (Network Operations Center) engineers who monitor network performance dashboards. To prevent disruptions during long monitoring shifts, the administrator enables non-expiring sessions. This enables NOC engineers to stay logged in throughout their shifts so that they can continuously monitor network health and respond immediately to any incidents or network outages.
Workflow
The following table describes the tasks involved in the process of setting up user sessions:
| Task | Product component | Role | Action | Reference |
|---|---|---|---|---|
| 1 | BMC Helix SSO server | BMC Helix SSO administrator | Enable the feature for a user or a user group(s), depending on their authentication type: Local, SAML 2.0, or OpenID Connect. | Configuring infinite user sessions |
| 2 | BMC Helix SSO agent or Auth Proxy (depending on the Redis service availability) | BMC Helix SSO administrator (for BMC Helix SSO agent) or the internal Ops team (for Auth Proxy) | (BMC Helix SSO agent) Set up the redis-uri and redis-password properties in the rsso-agent.properties file. (Auth Proxy) Add the redis-uri and redis-password properties to the external.conf file that can be mounted into the AuthProxy container during the startup. Note: The infinite user sessions feature does not require the redis-channel to be set. Also, perpetual tokens are refreshed irrespective of the session. | Configuring the BMC Helix SSO agent or Configuring Auth Proxy for deployment with BMC Helix SSO |
Results
By using the feature, NOC engineer Allen is able to stay continuously authenticated throughout his monitoring shift. This uninterrupted access allows Allen to maintain real-time visibility into network performance dashboards without the risk of session timeouts. As a result, Allen can respond immediately to incidents and outages, ensuring faster resolution times and improved service reliability. The administrator no longer needs to manage frequent re-authentication issues, streamlining operations, and enhancing overall system stability.