Try OpenEdge Now
skip to main content
Core Business Services - Security and Auditing
Security : Secure Sockets Layer (SSL) : SSL session components : Session caching
 
Session caching
By setting an option on the SSL server, it can cache the SSL session (identified by its session ID) for a specified period of time after a given connection between the SSL client and server has terminated. During this specified period of time, if the same SSL client attempts to reconnect to this SSL server and requests a resumption of a previous SSL session (by ID), the usual authentication and hand-shaking required to establish an SSL session is dispensed with, and the SSL server reactivates the SSL session that is cached from the previous connection with this same client.
Note: The SSL server must be configured to allow session reuse. It might not be. The default OpenEdge configuration is to allow the SSL server to grant session reuse within three minutes. The default configuration for many SSL servers has session reuse turned off.
All the session components that were used in the previous connection are reused for this new connection except for those that are unique to a given connection (see Keys and certificates). This helps to minimize negative SSL performance impacts.