Clarity all versions
This is working as designed because Clarity is Project Management tool and the ability to maintain multiple sessions is generally viewed as a feature of the workflow rather than a flaw. However, from a cybersecurity perspective (like an OWASP audit), this is often flagged as a "finding."
Here’s a breakdown of why Clarity handles sessions this way and how to balance the risks.
Why it's Working as Designed: Project management is rarely a linear, single-tab task. Most users in Clarity rely on multiple sessions for several reasons
The Security Perspective: While convenient, security auditors flag unlimited concurrent sessions because of two main risks
How to Manage This: If your organization needs to tighten the screws without breaking the workflow, you usually don't do it within Clarity’s native settings. Instead, you handle it at the Identity Provider (IdP) level
| Method | How it Works | Impact |
| SSO / SAML 2.0 | Use Okta, Azure AD, or Ping to manage the login. These tools can be configured to limit concurrent logins to the portal itself. | High Security, Low User Friction. |
| Session Timeouts | Set a shorter "Inactivity Timeout" in Clarity (e.g., 30 or 60 minutes). | Cleans up "ghost" sessions automatically. |
| MFA (Multi-Factor) | Require a push notification for every new login. | Deters account sharing even if multiple sessions are allowed. |
| Audit Portlets | Create a custom portlet to monitor active sessions and identify users with an "excessive" number of concurrent logins. | Good for oversight without being restrictive. |
Conclusions: Clarity is built for multi-tasking. Forcing a "one session per user" rule would likely result in a revolt from your Project Management Office (PMO). Most enterprises accept this "risk" as a necessary trade-off for usability, opting instead to secure the entry point (via SSO) rather than the application session