As a platform administrator, I experience a fixed, non-configurable authentication token TTL enforced at the JS-SDK level, which results in an inability to align session lifetimes with site-specific security and user experience policies β forcing either premature re-authentication or longer-than-desired session windows that cannot be tuned per environment or audience.
As a platform administrator, I want to configure the authentication token TTL from the platform settings, so that the JS-SDK consumes that configuration and enforces the desired session lifetime without requiring code changes or redeployments.
β Given an account owner configures a custom session duration in the platform settings, when a user signs in, then their session remains active for exactly the configured duration.
β Given the account owner updates the session duration setting, when users sign in afterward, then the new duration is automatically applied without requiring frontend code changes or deployments.
β Given the session duration setting UI is displayed, when configuring the value, then:
The admin can enter a numeric value.
The admin can select a duration unit (e.g., days or months).
The minimum accepted value must be a positive number.
Upper-bound limitations are validated based on platform-defined security constraints.
β This change will impact:
Admin Platform β a new setting allowing configuration of authentication/session duration.
Authentication System β token/session issuance based on configured TTL.
Frontend JS-SDK β consumption and enforcement of the configured token lifetime.
Website User Experience β sessions automatically respect the configured duration.
Documentation β updated implementation and configuration guidance.
Please authenticate to join the conversation.
In Progress
Pelcro Product
About 7 hours ago

Rana Haleem
Get notified by email when there are changes.
In Progress
Pelcro Product
About 7 hours ago

Rana Haleem
Get notified by email when there are changes.