We've configured our JIRA instance with an internal user directory with ldap authentication (Delegated Authentication Directory)
In front of our JIRA server, there's some network security infrastructure which handles the authentication for all our webbased applications (with single-signon) by asking the user credentials through a webbased form the first time a users enters the application. From that moment an "authorization" http header is added to the request when forwarded to the JIRA server.
We noticed that when we access JIRA through this system, for instance going to the dashboard, generates a lot of TCP connections to our ldap server, and this for every request even when we are already logged in. Going to one dashboard with 14 gadgets generates 60 TCP connections from the JIRA server to LDAP.
When we bypass that authentication system and go directly to the JIRA server and log in by in JIRA, we don't see those connections appear.
I've found similar behaviour posted in the bug report :
https://jira.atlassian.com/browse/JRA-28714, but this is with an Apache server running in front of JIRA.
The questions are :
- What's the reason for these extra ldap connections, although we're already logged in (there is a jsessionid)
- Is it possible to configure connection pooling for an internal user directory with ldap authentication
- Those ldap connections appear to be very fast and only used for a very short time, but on the JIRA server we see a lot of these TCP connections going into a TCP status "TIME_WAIT" and remains there for 4 minutes until these TCP sockets are back available (default Windows 2008 R2 server timeout). Is this normal behaviour?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.