You can change the module used for sessions identifier generation. To do, add <code>generateModule</code> key in the configured session backend options.
</p>
<p>
We recommend the use of <code>Lemonldap::NG::Common::Apache::Session::Generate::SHA256</code>.
@ -49,7 +49,13 @@ To configure sessions, go in Manager, <code>General Parameters</code> » <code>S
<ul>
<liclass="level1"><divclass="li"><strong>Opening conditions</strong>: rules which are evaluated before granting session. If a user does not comply with any condition, he is prompted a customized message. That message can contain session data as user attributes or macros. The conditions are checked in alphabetical order of comments.</div>
</li>
<liclass="level1"><divclass="li"><strong>Sessions Storage</strong>: see <ahref="../../documentation/1.4/start.html#sessions_database"class="wikilink1"title="documentation:1.4:start">sessions database configuration</a>.</div>
<liclass="level1"><divclass="li"><strong>Sessions Storage</strong>: you can define here which session backend to use, with the backend options. See <ahref="../../documentation/1.4/start.html#sessions_database"class="wikilink1"title="documentation:1.4:start">sessions database configuration</a> to know which modules you can use. Here are some global options that you can use with all sessions backends:</div>
<ul>
<liclass="level2"><divclass="li"><strong>generateModule</strong>: allows to override the default module that generates sessions identifiers. For security reasons, we recommend to use Lemonldap::NG::Common::Apache::Session::Generate::SHA256</div>
</li>
<liclass="level2"><divclass="li"><strong>IDLength</strong>: length of sessions identifiers. Max is 32 for MD5 and 64 for SHA256</div>
</li>
</ul>
</li>
<liclass="level1"><divclass="li"><strong>Multiple sessions</strong>, you can restrict the number of open sessions:</div>
We found that the default session identifier generation may be too simple and can allow to do brute force attack to find a valid session identifier (see <ahref="https://jira.ow2.org/browse/LEMONLDAP-695"class="urlextern"title="https://jira.ow2.org/browse/LEMONLDAP-695"rel="nofollow">https://jira.ow2.org/browse/LEMONLDAP-695</a>).
</p>
<p>
We recommend that you use a new generate module. Add <code>generateModule</code> key inside your sessions backend options and use <code>Lemonldap::NG::Common::Apache::Session::Generate::SHA256</code> as value.