Skip to main content

Session Management

Hub uses stateless JWT-based sessions with an 8-hour time-to-live. This page explains how sessions work and what controls are available.

How Sessions Work

When you sign in, Hub issues a signed JWT stored as an HttpOnly cookie on the .theonestack.com domain. This token is automatically sent with every request to any product.

PropertyValue
Cookie namehub_session
TTL8 hours
Domain.theonestack.com
HttpOnlyYes (not accessible to JavaScript)
SecureYes (HTTPS only)
SameSiteLax

Session Expiry

Sessions expire exactly 8 hours after login. There is no sliding window — if you logged in at 9:00 AM, your session expires at 5:00 PM regardless of activity.

When your session expires:

  1. Your next action triggers a redirect to the login page
  2. Any unsaved work in the current page is preserved in local storage (where supported)
  3. After re-authenticating, you're returned to the page you were on
ℹ️The 8-hour TTL is a security measure and cannot be extended. It aligns with a typical workday, ensuring sessions don't persist overnight.

Multi-Device Sessions

You can be signed in on multiple devices (laptop, desktop, phone) simultaneously. Each device has its own independent session token.

Signing Out

To sign out manually:

  1. Click your avatar in the top-right corner
  2. Click Sign Out

This clears the hub_session cookie and any locally stored session data. You'll need to re-authenticate with Microsoft Entra to sign in again.

Elevated Sessions (Sudo Mode)

For sensitive operations like changing billing settings or modifying roles, Hub may prompt you to re-authenticate. This is called "sudo mode" — it verifies your identity before allowing high-impact changes, even if your session is still valid.

Security Considerations

  • No "Remember Me" — every session is exactly 8 hours, no exceptions
  • HttpOnly cookies — the session token cannot be read by client-side JavaScript, protecting against XSS
  • Secure flag — the cookie is only sent over HTTPS
  • Account lockout — 5 failed login attempts trigger a 15-minute lockout (see SSO Login)
💡If you suspect your session has been compromised, sign out immediately and contact your Hub administrator. They can review the audit log for suspicious activity.