Solved

Difference between session timeout descriptors in web.xml and weblogic.xml

Posted on 2008-06-10
1
10,913 Views
Last Modified: 2013-12-10
Given example below - please elaborate on how you expect the timeout for a web app to behave
given the  configuration below exists in both files (web.xml and weblogic.xml).   Please elaborate -
appreciate the detail.  Thanks.

from web.xml  (30 minutes)
  <session-config>
       <session-timeout>30</session-timeout>
  </session-config>

from weblogic.xml (60 minutes)
<session-param>
   <param-name>TimeoutSecs</param-name>
   <param-value>3600</param-value>
</session-param>
0
Comment
Question by:booksplus
1 Comment
 
LVL 35

Accepted Solution

by:
girionis earned 500 total points
ID: 21780221
The value in the web.xml *always* overrides (takes precedence over) the value in the weblogic.xml. So the session should time out in 30 minutes. For more information

http://edocs.bea.com/wls/docs81/webapp/web_xml.html#1017275
http://edocs.bea.com/wls/docs81/webapp/weblogic_xml.html#1038173
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most of the developers using Tomcat find it easy to configure the datasource in Server.xml and use the JNDI name in the code to get the connection.  So the default connection pool using DBCP (or any other framework) is made available and the life go…
Upgrading Tomcat – There are a couple of methods to upgrade Tomcat is to use The Apache Installer is to download and unzip and run the services.bat remove|install Tomcat6 Because of the App that we are working with, we can only use Tomcat 6.…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question