Determining your actively logged in users is a little tricky in ISM.
Security History (Frs_ops_logon_history)
Security sessions are derived from the security history business object (Frs_ops_logon_history) and used the status value and logout time to determine “security session” by event type and login type.
This makes identifying the number of active sessions challenging as aggregate functions do not allow use of the distinct function. This limits the use of dashboard parts, as you will get false counts per user.
a19 Consulting – Best Practice System
An advanced workaround would be to create a summarized table similar to the a19 Consulting Best Practice System‘s implementation. More on that on a future blog post.
ISM Administration Tip
PS: Remember one of the culprits for users staying logged in is the dashboard setting for auto-refresh. Setting your security session timeout alone does not solve the issue, you must ensure that the Auto refresh (in minutes) on your dashboards is disabled or set higher than the session timeout number.

You must be logged in to post a comment.