Session management controls how long an Empuls sign-in stays valid, how many simultaneous sessions a user can hold across platforms, and how to invalidate sessions when needed. Empuls issues encrypted JWT tokens backed by Redis-stored sessions; you tune their lifetime and concurrency rules here. This is a sub-page of security settings.Documentation Index
Fetch the complete documentation index at: https://empuls.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Before you start
- You must be a Super Admin.
- Tightening session rules invalidates ongoing sessions — communicate the change before applying org-wide.
- Session rules interact with password policy and SSO — review all three together.
What you can configure
Session token expiry
Empuls’s auth token has a default lifetime; idle sessions are revoked after this period. Configure separately per platform:| Platform | Default | Common values |
|---|---|---|
| Web | 8 hours | 1h (high-security), 4h, 8h, 24h |
| Mobile | 30 days | 7d, 14d, 30d |
| MS Teams app | Inherits Teams session | Not directly configurable |
| Slack app | Inherits Slack session | Not directly configurable |
Concurrent login limits
Cap how many simultaneous sessions a user can hold:- Global maximum — Total active sessions across all platforms (default unlimited).
- Per-platform maximum — Different cap for web vs mobile (e.g., 2 web sessions, 3 mobile sessions).
Blocked platforms
Optionally disable login from specific platforms entirely:- Web only
- Mobile only
- Web + mobile only (no MS Teams or Slack)
- All platforms allowed
Session duration override (per company)
For tenants serving multiple companies (rare in standard Empuls deployments), you can override session duration per company.Configure session rules
Set concurrent login limits
Enter the global maximum and per-platform maximums. Leave blank for unlimited.
Force logout all sessions
For immediate enforcement after a policy change, or in response to a security incident:Click Force logout all
A confirmation dialog explains the impact — all users sign back in on next page load.
Token tracking and proxy logins
Sessions tied to admin Login As (impersonation) are tracked separately. The admin’s own session and the impersonation session both have unique IDs; ending one doesn’t affect the other. For diagnostics, the Active Sessions table shows:- User
- Platform (web, mobile, teams, slack)
- IP address
- Started at
- Last activity
- Session ID (truncated)
Limits and gotchas
- Setting a very short web session (e.g., 30 minutes) significantly increases sign-in friction. Pair with SSO to soften.
- Empuls’s session storage is in Redis. Brief Redis hiccups can transiently look like session failures — the system retries automatically.
- Concurrent login limits trigger oldest-session eviction, not denial. New sign-ins always succeed; old ones get kicked.
- Per-company session overrides require a support request to configure.
Related
- Security settings — Other security controls.
- SSO overview — Federation typically inherits the IdP’s session lifetime.
- Login As — Admin impersonation that creates a separate tracked session.
- Password policies — Pair with session rules.