No Session Reuse (-nosessionreuse) (for STS capability)
Use No Session Reuse (-nosessionreuse) when you do not want to reuse a Secure Sockets Layer (SSL) session ID to reconnect to the same SSL-enabled database server or to reconnect to the OpenEdge Authentication Gateway STS server.
Operating system and syntax
UNIX / Windows
-nosessionreuse
Use with
Maximum value
Minimum value
Single-user default
Multi-user default
Client Connection, Authentication Gateway STS
—
—
—
—
While your database connection may or may not be running with SSL enabled for communication to its remote clients, the communication to the Authentication Gateway STS Server is always run with SSL enabled.
If the database is running with SSL enabled, No Session Reuse (-nosessionreuse) is set the same for both the OpenEdge Server SSL communication as well as for the STS Server communication.
For more information, see OpenEdge Getting Started: Core Business Services - Security and Auditing.
Note: OpenEdge SSL turns on SSL session reuse by default. So, after the initial connection to a given host (-H) and port (-S), each subsequent connection to the same host and port restarts the SSL session and ignores any different connection parameters that are specified for the subsequent connection, including -nosessionreuse. If you want to change SSL socket options (such as -nohostverify) for each subsequent connection to a given host and port, be sure to specify the -nosessionreuse parameter on the initial SSL socket connection to that same host and port.