Session-Data Security

To maintain state information about staff members and customers, we use session data that is passed between the staff member’s or customer’s system and the web server.

When an individual is logged in, data from the session can provide the necessary authentication for accessing your data that would not otherwise be available. Session data security prevents attacks that stem from the trust the system has in authenticated users. Without session data security, attackers may be able to capture session data and reuse it. These are commonly referred to as “replay” attacks or “man-in-the-middle” attacks.

The SESSION_HARD_TIMEOUT configuration setting helps reduce session exploitation by forcing staff members to reauthenticate after a specified period of time. Set to twelve hours by default, this setting creates a new session while destroying the previous session each time the staff member reauthenticates. See How You Force Session Expiration.

The CP_FORCE_PASSWORDS_OVER_HTTPS configuration setting is enabled by default and helps protect staff members and customers from malicious activity such as password theft. This setting requires that all login operations, such as login name and password, be performed over HTTPS. Therefore, logged-in users interact entirely on HTTPS.

Note: Pages that use passwords within standard widgets are automatically redirected to HTTPS.

If your site is password protected, you should require customers to log in to the customer portal. Even if only your answer pages are password protected, the CP_CONTACT_LOGIN_REQUIRED configuration setting enforces secure logon to your pages and controls on the customer portal. The CP_CONTACT_LOGIN_REQUIRED setting also prevents unauthenticated chat sessions.

B2C Service offers different session management schemes for the administration interface and the customer portal. However, for both interfaces, we perform these actions:

  • Encrypt session data stored in cookies.
  • Set the Secure flag and the HTTP Only flag on cookies.
  • Make session data difficult to use from a different computer system.
  • Require staff members to reauthenticate after twelve hours. See the SESSION_HARD_TIMEOUT setting description in the first table.
  • Require staff members to reauthenticate after a specified period of inactivity. See the CLIENT_SESSION_EXP setting description in the first table.
  • Require all login operations to be performed over HTTPS. See the CP_FORCE_PASSWORDS_OVER_HTTPS setting description in the second table.

Configuration setting descriptions that affect your site’s session data are listed in these tables.

Administration Interface Settings for Session Data

Configuration Setting Description Default Value
RightNow User Interface/General/Security
CLIENT_SESSION_EXP Requires staff members to reauthenticate after a specified period of inactivity on the Service Console.
Note: This setting is not used strictly for security. It is also used in the desktop usage administration feature. See Desktop Usage Control.
15 minutes
SESSION_HARD_TIMEOUT Requires staff members to reauthenticate after a specified period of time.

This setting creates a new session each time the staff member reauthenticates. The previous session is destroyed.

12 hours

Customer Portal Settings for Session Data

Configuration Setting Description Default Value
RightNow User Interface/General/Security
CP_LOGIN_MAX_TIME Defines the time (in minutes) a customer can be logged in without needing to log in again. If a session goes past the defined setting, the customer is required to log in again.

The default is 0, which means that the time is set by CP_LOGIN_COOKIE_EXP.

0
RightNow User Interface/Customer Portal/Login
CP_CONTACT_LOGIN_ REQUIRED Defines if the customer portal requires a customer to be logged in when accessing most pages or controls.

Also prevents unauthenticated chat sessions.

Note: This setting does not apply to the login, password recovery, and account creation pages, or pass-through authentication (PTA). PTA is described in Configuring Pass-Through Authentication.
No
CP_COOKIES_ENABLED Defines if the customer portal tries to set cookies on a visitor’s browser. Yes
CP_FORCE_PASSWORDS_ OVER_HTTPS Requires all login operations to be performed over HTTPS.

Pages that use passwords within standard widgets are automatically redirected to HTTPS.

Yes
CP_LOGIN_COOKIE_EXP The time (in minutes) before the customer portal login cookie expires. Set the value to -1 if you want the cookie to expire when the browser is closed. Set the value to 0 if you never want the cookie to expire. 60
CP_MAX_LOGINS Defines the total number of concurrent users that can be logged in to your support site at any given time.

A value of 0 means there is no limit. If you set a value for this setting, you must also set a non-zero value for CP_LOGIN_MAX_TIME.

0
CP_MAX_LOGINS_PER_ CONTACT Defines the total number of active, concurrent logins a single user can be logged in with. A value of 0 means there is no limit.

If you set a value for this setting, you must also set a non-zero value for CP_LOGIN_MAX_TIME.

0